Exam paper Flashcards
Identify one possible target of a cyber security attack. (1 mark)
- Individual (1)
- Data / information (1)
- Equipment (1)
- Organisation (1)
Identify two purposes of cyber security. (2 marks)
- To protect information / data (1)
- To keep information / data confidential (1)
- To maintain the integrity of information / data (1)
- To maintain the availability of information / data (1)
Some of the data stored in an accounts spreadsheet has been deliberately changed.
Identify the type of cyber security incident that has occurred. (1 mark)
Data modification
Many organisations use the cloud to store files and folders.
Identify one reason why files and folders stored in the cloud should be kept secure.
To prevent them from being accessed by unauthorised users. (1)
A delivery company holds details of its customers in a database. The company has recently been
the target of a cyber-attack on its customer database.
During the attack, some of the data held in the customer database was deliberately removed.
Identify the type of cyber-attack that occurred. (1 mark)
• Data destruction (1)
OR
• Data theft (1)
A delivery company holds details of its customers in a database. The company has recently been
the target of a cyber-attack on its customer database.
During the attack, some of the data held in the customer database was deliberately removed.
Describe two impacts of this cyber-attack on the delivery company (4 marks)
• Loss of reputation and trust from customers (1)
who feel the company cannot be trusted with
their personal details (1)
• Customer decrease (1) as customers begin to use
alternative companies that have good security measures in place (1)
• May have to pay compensation (1) to customers
whose details have been removed/ affected (1)
In a cyber attack, some of the customers of the delivery company have been sent an email asking them to click a link to view delivery details of an order.
Which type of cyber attacker would use this method? (1 mark)
Phisher (1)
In a cyber attack, some of the customers of the delivery company have been sent an email asking them to click a link to view delivery details of an order.
Identify and describe the type of threat that has occurred during this cyber-attack. (3 marks)
Fake / hoax emails (1st)
One from:
• The link in the email can link to a fake website (1) that
contains malware / virus / (1)
• Customers can be asked to reveal private / personal
details (1) that can then be used for identity theft (1)
In a cyber attack, some of the customers of the delivery company have been sent an email asking them to click a link to view delivery details of an order.
Legislation could be used to prosecute these cyber attackers.
Identify one act of legislation that could be used to prosecute these cyber attackers. (1 mark)
Computer Misuse Act (1)
Following the cyber-attacks, it has been recommended that the delivery company review its organisational policy on access management.
Describe two ways in which access management could be used to increase the safety of data held in the customer database. (4 marks)
• User/names (1) could be used to determine the level of
access to the database (1)
• Could be used to determine the actions that can be
carried out on the database (1) e.g. read
only/write/amend (1)
• Audit trails (1) could show who accesses the
database/what actions were carried out (1)
Progress Pets is an online shop that is run from the owner’s home. The broadband connection
is provided wirelessly through a router. The router provides the broadband access for the
family and does not require a password to join.
Orders from the online shop are placed via email with the order form as an attachment. The order form includes the customer contact and payment details as well as details of the goods
they wish to order.
. The website could be used as a platform by cyber attackers.
Describe the following type of cyber attacker and provide an example of how they could exploit the website.
Phisher (with example) (3 marks)
• Someone who pretends to be a business /
organisation/person (1) to try to get personal information from someone (1)
• Example: Pretends to be from the business asking for
clarification of payment details for an order (1)
Progress Pets is an online shop that is run from the owner’s home. The broadband connection
is provided wirelessly through a router. The router provides the broadband access for the
family and does not require a password to join.
Orders from the online shop are placed via email with the order form as an attachment. The order form includes the customer contact and payment details as well as details of the goods
they wish to order.
. The website could be used as a platform by cyber attackers.
Describe the following type of cyber attacker and provide an example of how they could exploit the website.
Scammer (with example) (3 marks)
• Someone who sets up a fraudulent website /business (1)
that may be very similar to the real website business (1)
• Example: Could copy the website but have a slightly
different web address, giving contact details of the fake
business (1)
Data theft is one type of cyber security incident that might affect Progress Pets
Identify two other types of cyber security incidents that might affect it. (2 marks)
- Data destruction (1)
- Data manipulation (1)
- Malware (1)
- Social engineering/accept examples (1)
- Unauthorised access (1)
To increase the level of cyber security and reduce vulnerabilities, different measures can be
taken by Progress Pets.
Identify one possible vulnerability of the Progress Pets website. (1 mark)
- Hacking (1)
- DoS (1)
- Virus (1)
Describe how using a password to access the wireless router will increase the level of
cyber security for Progress Pets. (2 marks)
• When combined with user name (1) the password and
user name need to be correct (1)
• People who do not live at the house / passers-by (1) will
not be able to access the connection (1)