Security Measures (Cambridge (CIE) A Level Computer Science) : Revision Note

Robert Hampton

Written by: Robert Hampton

Reviewed by: James Woodhouse

Updated on

Security, privacy, integrity

What is the difference between data security, privacy and integrity?

Term

Definition

Key focus

Example

Data Security

Protecting data from unauthorised access, theft, or attacks

Preventing breaches or leaks

Using encryption, firewalls, and passwords to protect stored data

Data Privacy

Ensuring data is collected, stored, and shared in a way that respects the user’s rights

Controlling who can access and use personal data

Asking for user consent before collecting or sharing personal information

Data Integrity

Ensuring data is accurate, complete, and unaltered during storage or transfer

Maintaining correctness and reliability

Using checksums or validation rules to detect accidental or unauthorised changes

  • Security = keeping data safe from threats (e.g. hackers)

  • Privacy = making sure data is used fairly and with consent

  • Integrity = making sure data stays accurate and unchanged

Protection techniques

User accounts

  • User accounts are designed to control access to computer systems

  • They help protect data and system resources by ensuring only authorised individuals can log in and perform specific tasks

Passwords

  • Passwords are a digital lock to prevent unauthorised access to an account

  • They are often stored as an encrypted/ciphered text entry in a database, ensuring that even with unauthorised access to a database, a hacker would not be able to gain access to the individual passwords of users

Authentication

  • Authentication is the process of ensuring that a system is secure by asking the user to complete tasks to prove they are an authorised user of the system

  • Authentication is done because bots can submit data in online forms

  • Authentication can be done in several ways, including:

    • Digital signatures

    • Biometrics

Digital signatures

  • A digital signature is a secure way to prove that a digital message or document was sent by a specific person and that it has not been altered

  • It acts like a digital stamp of approval, confirming:

    • Who sent the data (authentication)

    • That the data hasn’t been changed (integrity)

Biometrics

  • Biometrics are an individuals personal characteristics used to identify them, such as

    • Fingerprints

    • Iris/retina scans (eyes)

    • Voice recognition

  • Biometrics provide a very secure method of confirming a users identity before allowing access/permission to a computer system

  • Biometric measures are often used on mobile devices to provide secure access

Firewall

  • A firewall is a barrier between a network and the internet

  • A firewall prevents unwanted traffic from entering a network by filtering requests to ensure they are legitimate

  • It can be both hardware and software and they are often used together to provide stronger security to a network

    • Hardware firewalls will protect the whole network and prevent unauthorised traffic

    • Software firewalls will protect the individual devices on the network, monitoring the data going to and from each computer

Anti-virus software

  • Anti-virus software is a term used to describe a combination of different software to prevent computers from being susceptible to viruses and other malicious software

  • Anti-virus scans through email attachments, websites and downloaded files to search for issues

  • Anti-virus software has a list of known malware signatures to block immediately if they try to access your device in any way

  • Anti-virus will also perform checks for updates to ensure the database of known issues is up to date

Anti-spyware software

  • Anti-spyware is a type of security software designed to detect, block, and remove spyware from a computer system

  • Spyware is a type of malicious software (malware) that secretly gathers information about a user without their knowledge

  • It can:

    • Record keystrokes (e.g. passwords, credit card numbers)

    • Monitor browsing habits

    • Access files and send them to a third party

Encryption

  • Encryption is the process of converting data into a secret code so that only authorised users can read it

  • It protects sensitive information (like passwords, personal data, or messages) from unauthorised access, especially when data is stored or sent over a network

Type

Description

Symmetric

The same key is used to encrypt and decrypt. Fast but key must be shared securely

Asymmetric

Uses a public key for encryption and a private key for decryption. More secure for sending data

You've read 0 of your 5 free revision notes this week

Unlock more, it's free!

Join the 100,000+ Students that ❤️ Save My Exams

the (exam) results speak for themselves:

Did this page help you?

Robert Hampton

Author: Robert Hampton

Expertise: Computer Science Content Creator

Rob has over 16 years' experience teaching Computer Science and ICT at KS3 & GCSE levels. Rob has demonstrated strong leadership as Head of Department since 2012 and previously supported teacher development as a Specialist Leader of Education, empowering departments to excel in Computer Science. Beyond his tech expertise, Robert embraces the virtual world as an avid gamer, conquering digital battlefields when he's not coding.

James Woodhouse

Reviewer: James Woodhouse

Expertise: Computer Science Lead

James graduated from the University of Sunderland with a degree in ICT and Computing education. He has over 14 years of experience both teaching and leading in Computer Science, specialising in teaching GCSE and A-level. James has held various leadership roles, including Head of Computer Science and coordinator positions for Key Stage 3 and Key Stage 4. James has a keen interest in networking security and technologies aimed at preventing security breaches.