IGCSE ICT 0417
Chapter 8: Safety and security
    First name & Last Name: _________________________________________
1. Use of computers can lead to health and safety risks.
      a. Name three health risks. For each one, describe what causes the risk and
          suggest a way of reducing or eliminating the risk.
            Health risk               Description               Elimination
                                                                                [9 marks]
       b. Name two safety risks. For each one, describe what causes the risk and suggest
          a way of reducing or eliminating the risk.
            Safety risk               Description               Elimination
                                                                                [6 marks]
2.
       a. What is meant by e-safety?
          ……………………………………………………………………………………………
           …………………………………………………………………………………[1 mark]
      b. Describe five ways of ensuring e-safety.
               i.  ……………………………………………………………………………………
                   ……………………………………………………………………………………
              ii.  ……………………………………………………………………………………
                   ……………………………………………………………………………………
             iii.  ……………………………………………………………………………………
                   ……………………………………………………………………………………
             iv.   ……………………………………………………………………………………
                   ……………………………………………………………………………………
              v.   ……………………………………………………………………………………
                   ………………………………………………………………………[5 marks]
3. Which types of security risks are being described below:
      a. The act of gaining unauthorised access to a computer system with the aim of
          deleting, changing or ‘stealing’ personal data.
                   ……………………………………………………………………………………
      b. Editing the source code of a program, allowing it to be exploited or changed for a
          specific purpose; it is often done to alter how the software works for a malicious
          purpose; always an illegal act.
                   ……………………………………………………………………………………
      c. Software that gathers data by the monitoring of key presses on a user’s
          computer; the gathered data is sent back to the person who sent the malware in
          the first place.
                   ……………………………………………………………………………………
      d. Program code that can replicate itself with the intention of deleting or corrupting
          files on a computer.
                   ……………………………………………………………………………………
      e. Junk email sent out to recipients on a mailing list; the emails can clog up
          bandwidth on the internet and users’ inboxes.
                   ……………………………………………………………………………………
      f. An online discussion group in which all the posts are checked by an administrator
          before they can be posted; this can prevent spam and filter out inappropriate
          messages and websites.
                   ……………………………………………………………………………………
      g. Small files or code stored on a user’s company sent by a web server; this allows
          a website to remember a user’s preferences each time they visit the website.
                   ……………………………………………………………………………………
                                                                                     [7 marks]
4. Explain the following two terms:
       a. Phishing:
           …………………………………………………………………………………………...
           ……………………………………………………………………………………………
           ……………………………………………………………………………………………
       b. Pharming:
           …………………………………………………………………………………………...
           ……………………………………………………………………………………………
           ……………………………………………………………………………………………
                                                                            [4 marks]
5. Indicate ( ) which of the following tasks are carried out by a firewall.
                                 Task                                 Carried out by a firewall
     Firewalls can control employee misconduct or carelessness,
     preventing them divulging passwords
     Firewalls can examine traffic between a user’s computer
     and the public network (e.g. internet)
     Firewalls can help to prevent viruses or hackers entering the
     user’s computer or computer network
     Firewalls can be used to log all incoming and outgoing traffic
     to allow later interrogation by a network manager
     Firewall can prevent individuals on internal networks from
     using their own modems to bypass the firewall
     Firewall warn the user if software on their computer is trying
     to access an external data source (e.g. automatic software
     update)
                                                                                     [4 marks]
6.
      a. Explain the following terms:
            i.  SSL: ……………………………………………………………………………..
                ……………………………………………………………………………………..
                ………………………………………………………………………………….
           ii.  TLS:……………………………………………………………………………...
                ……………………………………………………………………………………
                ………………………………………………………………………[5 marks]
      b. Give two differences between SSL and TLS.
            i.  ……………………………………………………………………………………
                ……………………………………………………………………………………
           ii.  ……………………………………………………………………………………
                ……………………………………………………………………………………
                ……………………………………………………………………….[2 marks]
c. Five stages that occur when a user wants to access a secure website and
   receive/send data from/to it are shown below. Put the five stages in their correct
   order.
       i.  If the web browser can authenticate the SSL certificate, it sends a
           message back to the web server to allow communications to begin.
      ii.  The web server responds by sending a copy of its SSL certificate to the
           user’s web browser.
     iii.  The user’s web browser sends a message so that it can connect with the
           required website which is secured by SSL.
     iv.   Once the message is received, the web server acknowledges the web
           browser and the SSL-encrypted two-way data transfer begins.
      v.   The web browser requests that the web server identifies itself.
           Stages:
                                                                            [5 marks]
7.
     a. What is meant by encryption?
        ……………………………………………………………………………………………
        ……………………………………………………………………………………………
        ……………………………………………………………………………………………
        ……………………………………………………………………………………………
        …………………………………………………………………………………[2 marks]
     b. Complete the diagram by naming the two missing parts A and B.
        A ………………………………………………………………………………………
        B …..………………………………………………………………………[2 marks]
     c. If A = 1, E = 2, I = 3, O = 4, U = 5 and Z = A, Y = B, X = C, …, C = X, B = Y
            i.  What message would produce the following encoded message?
                X4NK5G2I HX32MX2 3H U5M
                ……………………………………………………………………………………
                ……………………………………………………………………………………
                ……………………………………………………………………………………
           ii.  Encode the following message: INFORMATION TECHNOLOGY QUESTION
                ……………………………………………………………………………………..
                ..………………………………………………………………………………...
                ………………………………………………………………………[4 marks]
8.
     a. What is meant by a digital certificate?
               ……………………………………………………………………………………
               ……………………………………………………………………………………
               ………………………………………………………………………[1 mark]
    b. Name three of the parts that make up a digital certificate.
         i.  ……………………………………………………………………………………
                ……………………………………………………………………………………
                ……………………………………………………………………………………
         ii.    ……………………………………………………………………………………
                ……………………………………………………………………………………
                ……………………………………………………………………………………
         iii.   ……………………………………………………………………………………
                ……………………………………………………………………………………
                ………………………………………………………………………[3 marks]
    c. Biometrics is used as a security method in many applications.
       Complete the following table which identifies:
          ● Comparative accuracy
          ● Required input devices
          ● What can interfere with the biometric technique.
          Biometric         Comparative accuracy          Input        What can interfere
          technique                                     devices         with biometric
                          High ( )     Medium ( )       required          technique
     Fingerprinting
     Retina scans
     Voice recognition
     Face recognition
                                           [6 marks]
9. Discuss the issues with cloud security.
   …………………………………………………………………………………………………….
  …………………………………………………………………………………………………….
  …………………………………………………………………………………………………….
  …………………………………………………………………………………………………….
  …………………………………………………………………………………………………….
  …………………………………………………………………………………………………….
  …………………………………………………………………………………………………….
  ……………………………………………………………………………………………………...
  …………………………………………………………………………………………………...
  …………………………………………………………………………………………[6 marks]