6 Risks to Data and Personal Information
1 Which one of these is used to control internet traffic entering a network? (1)
A Server
B Backup
C Firewall
D Encryption
C Firewall
2 Explain why CAPTCHA tests work. (2)
CAPTCHA tests are used to make sure that data is entered by a human and not by an automatics software program or a bot or web robot.
3 State the purpose of pharming and phishing. (1)
The purpose of pharming and phishing is to gain users' personal information and payment details without their permission.
4 List three pieces of data from a bank card that a user is asked to enter when making an online payment. (3)
a) Card number
b) Expiry date of the card
c) Name on the card
5 Describe one way in which incremental backup differs from differential backup. (2)
Incremental backup only backs up the data that has changed since the last backup, while differential backup backs up all the data that has changed since the last full backup.
6 Describe how encryption secures data on a network. (2)
Encryption ensures that unauthorized users cannot read data without the key. Encryption uses a key to scramble data into an unreadable form. If encrypted data is intercepted on the network, it is useless unless the interceptor has or can identify the key.
7 State two methods used by an online system to authenticate a user. (2)
a) Password based authentication involves users entering a password.
b) Biometric authentication uses a physical characteristic of the user, such as a fingerprint or facial recognition.
8 State two methods used by criminals to get users to visit fake sites. (2)
a) Domain name spoofing involves creating fake sites with similar names to legitimate sites.
b) Redirecting traffic involves malware or other techniques to redirect users from a legitimate site to a fake site.
9 Explain one disadvantage of using online storage for backups rather than local storage. (2)
Using online storage for backups rather than local storage has a disadvantage of slower data access and restoration due to reliance on an internet connection.
Comments
Post a Comment