Question 4, May 2022, 1R, Pearson Edexcel International GCSE (9-1) Information and Communication Technology, Paper-1
Nihal uses the Internet for work.
(a) Nihal uses the Internet to update the skills he needs for his work.
Describe one other way using the Internet has had a positive impact on employment. (2)
The Internet has led to the creation of many new types of jobs that did not exist before. For example, social media managers, online content creators, digital marketers, and e-commerce specialists are some of the job roles that have emerged with the rise of the Internet. As consumer and employer needs continue to evolve, new types of jobs will continue to emerge, creating new opportunities for job seekers.
(b) Nihal's employer uses hosted storage.
(i) Explain one drawback to Nihal's employer of doing this. (2)
One drawback to Nihal's employer of using hosted storage is that they may have less control over their data. Hosted storage services are typically provided by third-party vendors, who may store the data in remote data centres or the cloud.
(ii) Which one of these is the best choice to perform complex processing tasks? (1)
D Mainframe
(c) Describe the role of a web browser when accessing a website. (2)
A web browser requests an IP address from a DNS server to establish a connection to the web server hosting the website, and then requests the data/resource from the web server. It then interprets and read the HTML, along with other web page resources like CSS and JavaScript, to display and format the text, images, and other content of the website for the user.
(d) Nihal uses this word as his password.
Aeroplane
Identify two features that make this a weak password. (2)
1 It does not contain any symbols, numbers, or uppercase letters, which can make it easy to guess or crack the password.
2 Attackers often use dictionary-based attacks where they try commonly used words or phrases to crack passwords. Since 'Aeroplane' is a recognizable word, it can be easily guesses or cracked using such attacks, making it a weak password.
(e) Explain why phishing messages are sent to many users. (2)
Sending phishing messages to many users allows attackers to cast a wider net and target a larger pool of potential victims. By sending a large number of emails, attackers can reach a variety of individuals or organizations, including those who may be more vulnerable to the attack due to their job role, level of technical expertise, or other factors.
(f) State one way the use of batteries can damage the environment. (1)
Leaking chemicals from batteries can damage the environment.
(g) Discuss how ICT is used to protect payment systems. (8)
ICT plays a crucial role in securing payment systems, which are
vulnerable to various forms of cyber attacks. Here are some ways in which ICT
is used to protect payment systems:
1. Encryption: Payment systems use encryption technology to ensure
that sensitive information, such as credit card numbers and personal data, is
transmitted securely. Encryption involves converting data into an unreadable
code that can only be decrypted by authorized parties. This protects payment
systems from eavesdropping and other forms of data interception.
2. Two-factor authentication: Payment systems also use two-factor
authentication to verify the identity of users. This involves using a
combination of two factors, such as a password and a fingerprint, to ensure
that only authorized users can access the system.
3. Firewalls: Firewalls are used to protect payment systems from
unauthorized access. A firewall is a network security system that monitors and
controls incoming and outgoing traffic based on predetermined security rules. It
acts as a barrier between the payment system and the internet, blocking unauthorized
access and protecting against malware attacks.
4. Fraud detection: Payment systems also use advanced fraud
detection systems to identify and prevent fraudulent transactions. These
systems use machine learning algorithms to analyze payment data and identify
patterns of suspicious activity. When a suspicious transaction is detected, the
system will flag it for further investigation or block it entirely.
5. Regular updates and patches: Payment systems must be regularly updated and patched to address any vulnerabilities and prevent cyber attacks. This involves regularly updating software and firmware, and applying security patches to fix any unknown vulnerabilities.
In conclusion, ICT is crucial in protecting payment systems from cyber attacks. The use of encryption, two-factor authentication, firewalls, fraud detection systems, and regular updates and patches helps to ensure that payment systems remain secure and protected from the increasing threat of cyber attacks.
(Total for Question 4 = 20 marks)
Comments
Post a Comment