Exam paper Flashcards
Identify one possible target of a cyber security attack. (1 mark)
- Individual (1)
- Data / information (1)
- Equipment (1)
- Organisation (1)
Identify two purposes of cyber security. (2 marks)
- To protect information / data (1)
- To keep information / data confidential (1)
- To maintain the integrity of information / data (1)
- To maintain the availability of information / data (1)
Some of the data stored in an accounts spreadsheet has been deliberately changed.
Identify the type of cyber security incident that has occurred. (1 mark)
Data modification
Many organisations use the cloud to store files and folders.
Identify one reason why files and folders stored in the cloud should be kept secure.
To prevent them from being accessed by unauthorised users. (1)
A delivery company holds details of its customers in a database. The company has recently been
the target of a cyber-attack on its customer database.
During the attack, some of the data held in the customer database was deliberately removed.
Identify the type of cyber-attack that occurred. (1 mark)
• Data destruction (1)
OR
• Data theft (1)
A delivery company holds details of its customers in a database. The company has recently been
the target of a cyber-attack on its customer database.
During the attack, some of the data held in the customer database was deliberately removed.
Describe two impacts of this cyber-attack on the delivery company (4 marks)
• Loss of reputation and trust from customers (1)
who feel the company cannot be trusted with
their personal details (1)
• Customer decrease (1) as customers begin to use
alternative companies that have good security measures in place (1)
• May have to pay compensation (1) to customers
whose details have been removed/ affected (1)
In a cyber attack, some of the customers of the delivery company have been sent an email asking them to click a link to view delivery details of an order.
Which type of cyber attacker would use this method? (1 mark)
Phisher (1)
In a cyber attack, some of the customers of the delivery company have been sent an email asking them to click a link to view delivery details of an order.
Identify and describe the type of threat that has occurred during this cyber-attack. (3 marks)
Fake / hoax emails (1st)
One from:
• The link in the email can link to a fake website (1) that
contains malware / virus / (1)
• Customers can be asked to reveal private / personal
details (1) that can then be used for identity theft (1)
In a cyber attack, some of the customers of the delivery company have been sent an email asking them to click a link to view delivery details of an order.
Legislation could be used to prosecute these cyber attackers.
Identify one act of legislation that could be used to prosecute these cyber attackers. (1 mark)
Computer Misuse Act (1)
Following the cyber-attacks, it has been recommended that the delivery company review its organisational policy on access management.
Describe two ways in which access management could be used to increase the safety of data held in the customer database. (4 marks)
• User/names (1) could be used to determine the level of
access to the database (1)
• Could be used to determine the actions that can be
carried out on the database (1) e.g. read
only/write/amend (1)
• Audit trails (1) could show who accesses the
database/what actions were carried out (1)
Progress Pets is an online shop that is run from the owner’s home. The broadband connection
is provided wirelessly through a router. The router provides the broadband access for the
family and does not require a password to join.
Orders from the online shop are placed via email with the order form as an attachment. The order form includes the customer contact and payment details as well as details of the goods
they wish to order.
. The website could be used as a platform by cyber attackers.
Describe the following type of cyber attacker and provide an example of how they could exploit the website.
Phisher (with example) (3 marks)
• Someone who pretends to be a business /
organisation/person (1) to try to get personal information from someone (1)
• Example: Pretends to be from the business asking for
clarification of payment details for an order (1)
Progress Pets is an online shop that is run from the owner’s home. The broadband connection
is provided wirelessly through a router. The router provides the broadband access for the
family and does not require a password to join.
Orders from the online shop are placed via email with the order form as an attachment. The order form includes the customer contact and payment details as well as details of the goods
they wish to order.
. The website could be used as a platform by cyber attackers.
Describe the following type of cyber attacker and provide an example of how they could exploit the website.
Scammer (with example) (3 marks)
• Someone who sets up a fraudulent website /business (1)
that may be very similar to the real website business (1)
• Example: Could copy the website but have a slightly
different web address, giving contact details of the fake
business (1)
Data theft is one type of cyber security incident that might affect Progress Pets
Identify two other types of cyber security incidents that might affect it. (2 marks)
- Data destruction (1)
- Data manipulation (1)
- Malware (1)
- Social engineering/accept examples (1)
- Unauthorised access (1)
To increase the level of cyber security and reduce vulnerabilities, different measures can be
taken by Progress Pets.
Identify one possible vulnerability of the Progress Pets website. (1 mark)
- Hacking (1)
- DoS (1)
- Virus (1)
Describe how using a password to access the wireless router will increase the level of
cyber security for Progress Pets. (2 marks)
• When combined with user name (1) the password and
user name need to be correct (1)
• People who do not live at the house / passers-by (1) will
not be able to access the connection (1)
Identify two other logical protection measures which could be implemented and explain how these
could be used by the owner of Progress Pets (4 marks)
• Anti-virus software (1st) to scan all incoming emails/
attachment and move any suspicious files (1)
• Encryption (1st) to ensure that all information and data
held on the computer system is kept secure and if
intercepted cannot be understood (1)
• Firewall (1st) to control the data that can/cannot enter
the system and protect it from threats and attacks (1)
• Secure backups of data (1st) should be carried out
regularly with the backup stored away from the system in
a safe place (1)
Identify one physical protection measure that could be implemented and explain how this
could be used by the owner of Progress Pets. (2 marks)
• Locks on doors (1st) to keep computer equipment used
for Progress Pets secure (1)
• Device locks (1st) to ensure that no-one can use a flash
drive/memory stick etc. that may contain a virus (1)
Discuss the impacts on customers of Progress Pets if their order forms were hacked. (9 marks)
• Personal data is held on the order form, so identity theft
may occur
• Payment details can lead to theft of money if card details
are provided
• Customers may not use the business again as they have
no trust in the security
• Identity theft can lead to, for example, debts being run
up passports being issued in error identity being used for
criminal activity etc.
• Credit/debit cards/bank accounts etc. may need to be changed, this can take time and cause financial upset
/inconvenience
• Passwords/user names on other websites may need to be changed, this can take time and cause distress/
inconvenience
• Customers could sue the owner of the online shop for
distress and inconvenience caused
Identify two reasons why cyber security is important to an individual 2 marks)
- To protect personal data / keep data safe (1)
- To stay safe online (1)
- To avoid financial loss (1)
- To avoid identity theft(1)
- Stops unauthorised access (1)
- Protect hardware (1)
Data in a sports club database has been deleted without authorisation.
Identify the type of cyber security incident which has occurred. (1 mark)
• Data destruction (1)
Identify two motivations of a cyber criminal (2 marks)
- Financial gain (1)
- Publicity (1)
- Fraud (1)
- Espionage (1)
A cafe offers customers free Wi-Fi access. Customers do not need to enter a password to access the Wi-Fi.
Identify and describe one intentional cyber security incident which may occur at the cafe. (3 marks)
- Hacking (1st) by an individual (1) into the unsecured Wi-Fi(1)
- DoS (1st) by bombarding the servers (1) with (useless) traffic(1)
A cafe offers customers free Wi-Fi access. Customers do not need to enter a password to access the Wi-Fi.
Customers may download files from unauthorised websites when using the Wi-Fi.
Identify and describe one other accidental cyber security incident which may occur when the Wi-Fi at the cafe is used. (3 marks)
• Responding to a fake email (1st) which triggers an attack (1) e.g. virus / malware / spyware (1)
• Clicking on a hyperlink (1st) in an email / fake website (1) which can download a virus (1)
Use of a portable storage device (1st) which may contain a virus (1) which could spread to the network (1)
The owners of a cafe have been advised to increase the cafe’s cyber security.
Explain two reasons why the owners would increase the cafe’s cyber security. (4 marks)
- To protect (1) information / data (1)
- To keep information / data (1) confidential (1)
- To maintain (1) the integrity / availability of information / data (1)
- To protect the network / data / computer equipment (1) from cyber attacks / hacking / infection from viruses (1)
- To prevent unauthorised users (1) gaining access (1)
Other than customers, identify two possible targets at a cafe for a cyber security attack. (2 marks)
- Data / Information (1)
- Equipment (1)
- Staff (1)
- Owner (1)
Cyber security can be increased by providing customers with a strong password for access to the Wi-Fi.
Describe one characteristic of a strong password (2 marks)
- Mixture (1) of upper and lower case letters (1)
- Includes (1) numbers / special characters (1)
- Cannot be linked to the cafe (1) eg. the name (1)
- not recognisable word (1) e.g. XYP9!F