Identifying & Preventing Threats to Computer Systems & Networks (OCR GCSE Computer Science)

Topic Questions

1 hour13 questions
12 marks

A software development company wants to protect their computer systems and data from unauthorised access.

Identify two methods of physical security that the company could use to protect their computer systems.

Did this page help you?

22 marks

State the definition of the term 'social engineering'.

Did this page help you?

31 mark

Identify the threat penetration testing can be used to help prevent.

Did this page help you?

16 marks

Identify and describe two software-based security methods that the company can use to protect their computer systems and data.

Method

Description

Did this page help you?

26 marks

A hospital stores patients’ details on its computer network.

The hospital is concerned about the security of its patients’ details.

Staff already use strong passwords to protect systems.

Explain, with reference to system security, three other ways that the hospital could protect the network system.

1

2

3

Did this page help you?

36 marks

A hospital stores patients’ details on its computer network.

The hospital is concerned about the security of its patients’ details.

Staff already use strong passwords to protect systems.

Identify three errors that hospital staff could make that may endanger the security of the network.

Outline a procedure that could be put in place to prevent each error.

Error

Procedure

Did this page help you?

4a3 marks

A university want to protect their data against threats when connected to the Internet.

Describe the threat malware can pose to the university’s network and give a prevention method that the university can use.

Description

Prevention

4b3 marks

Describe the threat a brute force attack can pose to the university’s network and give a prevention method that the university can use.

Description

Prevention

Did this page help you?

5a1 mark

Data in computer systems is valuable and at risk of loss, damage or being stolen.

The table has four potential threats to data.

Write one prevention method for each threat in the table.

Each prevention method must be different.

Threat

Prevention method

Unauthorised access to a computer

Virus

Phishing

Data interception

5b4 marks

Name two other threats to the data in a computer system and give a method of preventing each.

Threat

Prevention

Did this page help you?

63 marks

Hamish stores confidential documents on his laptop.

Hamish needs his computer to be secure from unauthorised access when connected to a network.

Describe the problems that can arise from unauthorised access to his laptop and confidential documents.

Did this page help you?

74 marks

Describe two ways Hamish can help prevent unauthorised access to his laptop.

1

2

Did this page help you?

19 marks

A house owner is concerned about potential threats to the network from being connected to the Internet.

Describe three possible threats to the computers connected to the network and give one way each threat can be reduced or prevented.

Threat

Description

Prevention

Did this page help you?

25 marks

Analyse the potential consequences of a successful Distributed Denial of Service (DDoS) attack on a major e-commerce website and explain how this type of attack differs from a standard Denial of Service attack (DoS).

Did this page help you?

38 marks

Evaluate the effectiveness of penetration testing as a method for preventing network attacks. Discuss potential limitations and explain how organisations can maximise their benefits

Did this page help you?