7d Combatting ICT Crime * Flashcards

0
Q

Miss Jones is aware of the need to secure her ICT system.
(a) Identify three software methods Miss Jones could use to secure her ICT system. For each
method, explain how it prevents data being stolen.(6 marks)

A

Three from eg:
Passwords (1) only allow authorised users (1)
Firewall (1) prevent unauthorised external access (1)
Anti virus (1) prevent viruses from entering system (1)
Anti spyware (1) to prevent malicious code sending data out of system (1)
Access rights (1) prevent access to parts of the system if not correct [6] credentials (1)
Software update (1) prevent software holes being exploited (1).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
1
Q

(b) Describe two security methods the committee could implement to prevent data being stolen from its computer in the future (4 marks)

A
Two from, 1st for identification, 2nd for description: Passwords/biometric [to system](1) alphanumeric characters/prevent access to the data (1)
Firewall (1) stops unauthorised user from internet/hacking (1) Security Guard (1) patrols and physically prevents (1)
Locks on doors (1) cannot get in without the key (1)
Software updates/patches (1) prevents misuse of programming holes (1)
Anti virus (1) stops virus on computer (1)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

EJO is concerned that the information they hold on their computers is vulnerable to theft. (a) Explain how the following methods protect ICT systems.
Encryption (2 marks)
Firewall (2 marks)
Software Patches (2 marks)

A

2 marks per explanation:
Encryption: turns the clear text into unintelligible text (1) means that if intercepted, cannot be read without code (1)
Firewall: designed to permit/deny network transmissions based upon a set of rules (1) any traffic that does not conform to the rules/hackers is not allowed access (1) stops unauthorised users/allows authorised users (1) Stops programs running (1) if not authorised (1)
Software patches: repairs/removes holes in the software (1) stops hackers exploiting them and gaining access (1).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Explain how passwords and firewalls can be used to protect the data. (Jan 09)
Passwords (2 marks)
Firewalls (2 marks)

A

Passwords
Stop individuals from accessing the data (1) unless they have the correct password (1)
Without the correct password (1) presented with just a screen (1)
Can record invalid attempts (1) so system manager can find out when/where/who (1)
Three attempts and then the file locks preventing access (1) Firewalls
Contains levels of access allocated to different users (1) only data at a certain level can be seen by certain individuals (1) Can only accept connections from allowed network connections (1) ties down who can access data (1)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Explain how the airline can use biometric security systems to protect access to data (3 marks June 09)

A

3 from:
Fingerprint/DNA/Voice/Retina scans (1)
How works up to a max 2 – scans fingerprint, finds identifying unique marks (1) matches/does not match to record in system (1) Used to protect customer data/employee data (1)
Could change voice over time/lose finger/eye and not access data (1)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly