A software development company wants to protect their computer systems and data from unauthorised access.
Identify two methods of physical security that the company could use to protect their computer systems.
Did this page help you?
A software development company wants to protect their computer systems and data from unauthorised access.
Identify two methods of physical security that the company could use to protect their computer systems.
Did this page help you?
State the definition of the term 'social engineering'.
Did this page help you?
Identify the threat penetration testing can be used to help prevent.
Did this page help you?
Identify and describe two software-based security methods that the company can use to protect their computer systems and data.
Method | Description |
---|---|
Did this page help you?
A hospital stores patients’ details on its computer network.
The hospital is concerned about the security of its patients’ details.
Staff already use strong passwords to protect systems.
Explain, with reference to system security, three other ways that the hospital could protect the network system.
1 | |
---|---|
2 | |
3 |
Did this page help you?
A hospital stores patients’ details on its computer network.
The hospital is concerned about the security of its patients’ details.
Staff already use strong passwords to protect systems.
Identify three errors that hospital staff could make that may endanger the security of the network.
Outline a procedure that could be put in place to prevent each error.
Error | Procedure |
---|---|
Did this page help you?
A university want to protect their data against threats when connected to the Internet.
Describe the threat malware can pose to the university’s network and give a prevention method that the university can use.
Description | |
---|---|
Prevention |
Describe the threat a brute force attack can pose to the university’s network and give a prevention method that the university can use.
Description | |
---|---|
Prevention |
Did this page help you?
Data in computer systems is valuable and at risk of loss, damage or being stolen.
The table has four potential threats to data.
Write one prevention method for each threat in the table.
Each prevention method must be different.
Threat | Prevention method |
---|---|
Unauthorised access to a computer | |
Virus | |
Phishing | |
Data interception |
Name two other threats to the data in a computer system and give a method of preventing each.
Threat | Prevention |
---|---|
Did this page help you?
Hamish stores confidential documents on his laptop.
Hamish needs his computer to be secure from unauthorised access when connected to a network.
Describe the problems that can arise from unauthorised access to his laptop and confidential documents.
Did this page help you?
Describe two ways Hamish can help prevent unauthorised access to his laptop.
1 | |
---|---|
2 |
Did this page help you?
A house owner is concerned about potential threats to the network from being connected to the Internet.
Describe three possible threats to the computers connected to the network and give one way each threat can be reduced or prevented.
Threat | Description | Prevention |
---|---|---|
Did this page help you?
Analyse the potential consequences of a successful Distributed Denial of Service (DDoS) attack on a major e-commerce website and explain how this type of attack differs from a standard Denial of Service attack (DoS).
Did this page help you?
Evaluate the effectiveness of penetration testing as a method for preventing network attacks. Discuss potential limitations and explain how organisations can maximise their benefits
Did this page help you?