1.
a)
Encryption of email traffic - Email data if intercepted cannot be read
Encryption of passwords // logging-in to “something” - Designed to prevent unauthorised access
Hospital patient records - Will safeguard the privacy/confidentially of data
b) [2]
Plain text - The (message) text/data/ before encryption // unaltered text/original text [1]
Cipher text -The (message) text after encryption
c) [2]
Encryption algorithm ->The calculation/process/sequence of steps for converting the message text/data
Encryption key ->A number/parameter used by the encryption algorithm // e.g. the displacement shift for
transposing characters
d) [3]
The plain text /data is encrypted using an encryption key
Decryption is done using the same/ or by implication key and a matching decryption algorithm/process
e) [3]
Asymmetric Encryption
Private key is known only to the owner//Public key is known by both parties [1]
Public and private keys are obtained from the purchase of a digital certificate //
Keys are generated at the start of a secure (e.g. web or email) session [1]
EITHER …
Sender will use their own private key [1]
Receiver decrypts using the sender’s public key
OR
Sender uses the recipient s public key [1]
Receiver decrypts using their own private key
f) [2]
Authorisation
Different permissions granted to different users
Restricted access to certain data files/directories/physical devices - User IDs
Authentication
Passwords
(Digital) signature // (Digital) certificate
Use of biometric data and methods
2.
a) [2]
Filters incoming and outgoing information through a network or PC.
Prevents authorised access to device
b) [4]
Data Privacy refers to the process of preventing unauthorised access to data to maintain confidentiality while data
integrity refers to the process of ensuring that data is reliable and has not been corrupted or tampered with.