0% found this document useful (0 votes)
22 views1 page

Data Security

Notes on Data security

Uploaded by

belaldulloo1
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
22 views1 page

Data Security

Notes on Data security

Uploaded by

belaldulloo1
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 1

1.

a)
 Encryption of email traffic - Email data if intercepted cannot be read
 Encryption of passwords // logging-in to “something” - Designed to prevent unauthorised access
 Hospital patient records - Will safeguard the privacy/confidentially of data

b) [2]
 Plain text - The (message) text/data/ before encryption // unaltered text/original text [1]
 Cipher text -The (message) text after encryption

c) [2]
 Encryption algorithm ->The calculation/process/sequence of steps for converting the message text/data
 Encryption key ->A number/parameter used by the encryption algorithm // e.g. the displacement shift for
transposing characters

d) [3]
 The plain text /data is encrypted using an encryption key
 Decryption is done using the same/ or by implication key and a matching decryption algorithm/process

e) [3]
Asymmetric Encryption

 Private key is known only to the owner//Public key is known by both parties [1]
 Public and private keys are obtained from the purchase of a digital certificate //
 Keys are generated at the start of a secure (e.g. web or email) session [1]

EITHER …

 Sender will use their own private key [1]


 Receiver decrypts using the sender’s public key

OR

 Sender uses the recipient s public key [1]


 Receiver decrypts using their own private key

f) [2]
Authorisation

 Different permissions granted to different users


 Restricted access to certain data files/directories/physical devices - User IDs

Authentication

 Passwords
 (Digital) signature // (Digital) certificate
 Use of biometric data and methods

2.
a) [2]
 Filters incoming and outgoing information through a network or PC.
 Prevents authorised access to device

b) [4]
 Data Privacy refers to the process of preventing unauthorised access to data to maintain confidentiality while data
integrity refers to the process of ensuring that data is reliable and has not been corrupted or tampered with.

You might also like