chapter 8 worksheet
chapter 8 worksheet
Chapter 8
....................................................................................................................................... [1]
...................................................................................................................................... [1]
...................................................................................................................................... [1]
2. The student could have protected his laptop computer by using two-factor
authentication. This could have combined his password with a biometric
method.
………………………………………………………………………………………………………
………………………………………………………………………………………………………
[2]
3. A company requires its employees to regularly change their login passwords for
the company’s computer systems. Passwords must be strong and cannot be
reused. The company has a website which uses a digital certificate.
…………………………………………………………………………………………………[1]
b) A digital certificate is attached to an email. State three items contained in a digital
certificate.
………………………………………………………………………………………………………
………………………………………………………………………………………………………
………………………………………………………………………………………………………
[3]
………………………………………………………………………………………………………
Example:
………………………………………………………………………………………………………
Form of identification:
………………………………………………………………………………………………………
Example:
………………………………………………………………………………………………………
Form of identification:
………………………………………………………………………………………………………
Example:
………………………………………………………………………………………………………
[4]
………………………………………………………………………………………………………
………………………………………………………………………………………………………
[2]
2022
5. Many company computer network systems use WiFi as a communication system
to help prevent the issue of tripping over trailing cables. For each of the
following physical safety issues describe two ways of helping to prevent them.
(i) Fire
Prevention 1
………………………………………………………………………………………………………
Prevention 2
………………………………………………………………………………………………………
[2]
(ii) Electrocution
Prevention 1
………………………………………………………………………………………………………
Prevention 2
………………………………………………………………………………………………………
[2]
6. A common use of home computers is online gaming. Describe three eSafety
measures which should be taken when playing games on the internet.
………………………………………………………………………………………………………
………………………………………………………………………………………………………
………………………………………………………………………………………………………
[3]
7. In order to log onto online gaming a user ID and password is needed. Explain
what is meant by a user ID and password and why they are needed.
Meaning:
………………………………………………………………………………………………………
………………………………………………………………………………………………………
………………………………………………………………………………………………………
[4]
8. Emails are used by people to communicate with each other. Copyright and
using acceptable language in the email are two of the constraints that affect the
use of email.
(i) Describe four other constraints that may affect the use of email.
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
[4]
………………………………………………………………………………………………………
………………………………………………………………………………………………………
[2]
9. A patient has an injury and the doctor treating him needs to find out information
about the patient. Most of the data he needs to collect is personal data. The data
collected is protected by data protection legislation. Most data protection acts
include the principle that data should be kept confidential and secure.
………………………………………………………………………………………………………
………………………………………………………………………………………………………
………………………………………………………………………………………………………
………………………………………………………………………………………………………
[4]
(b) Explain what is meant by personal data. Include two examples of personal data in
your answer.
Explanation
………………………………………………………………………………………………………
Example 1
………………………………………………………………………………………………………
Example 2
………………………………………………………………………………………………………
[3]
(b) Explain why personal data should be kept confidential and secure.
………………………………………………………………………………………………………
………………………………………………………………………………………………………
………………………………………………………………………………………………………
………………………………………………………………………………………………… [4]
10. The protection of personal data is important as many transactions are carried
out online.
(a) Explain how to avoid inappropriate disclosure of personal data.
………………………………………………………………………………………………
………………………………………………………………………………………………………
………………………………………………………………………………………………………
…………………………………………………………………………………………………[4]
(b) Controlling the freedom of speech is part of policing the internet. Discuss whether
the internet should be policed or not
………………………………………………………………………………………………………
………………………………………………………………………………………………………
………………………………………………………………………………………………………
…………………………………………………………………………………………………[4]
11. There have been major issues regarding the accuracy of facial recognition
systems for identifying suspects by the police. 6 Tawara Airport has installed
biometric security including facial recognition systems to help the police
recognise known criminals entering and leaving the country. Previously video
was taken of all passengers and then checked manually.
A) Discuss the effectiveness of using facial recognition systems rather than the
manual video system to increase security in this way
…………………………………………………………………………………………………
………………………………………………………………………………………………………
………………………………………………………………………………………………………
………………………………………………………………………………………………………
………………………………………………………………………………………………………
………………………………………………………………………………………………………
………………………………………………………………………………………………………
………………………………………………………………………………………………………
[8]
12. There have been major issues regarding the accuracy of facial recognition
systems for identifying suspects by the police. 6 Tawara Airport has installed
biometric security including facial recognition systems to help the police
recognise known criminals entering and leaving the country. Previously video
was taken of all passengers and then checked manually.
A) Discuss the effectiveness of using facial recognition systems rather than the
manual video system to increase security in this way
…………………………………………………………………………………………………
………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
[8]
13. Instant messaging involves users sending text messages to each other.
Evaluate how you would use eSafety strategies in your own use of instant
messaging.
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
[6]
14. Due to data protection laws, personal data should be kept confidential and
secure.
(a) Explain why personal data should be kept confidential and secure.
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
………………………………………………………………………………………………[6]
15. One method that hackers use to find people’s passwords is to install key-
logging spyware onto computers. Give two methods that could be used to
safely enter passwords even if key-logging spyware has been installed on a
computer.
………………………………………………………………………………………………………
……………………………………………………………………………………………………. [2]
16. As our use of the cloud increases, new ways of accessing it safely need to be
developed. The use of typed passwords is being replaced by biometric
methods. Discuss the benefits and drawbacks of using biometric methods.
………………………………………………………………………………………………………
……………………………………………………………………………………………………..
………………………………………………………………………………………………………
……………………………………………………………………………………………………..
………………………………………………………………………………………………………
……………………………………………………………………………………………………..
………………………………………………………………………………………………………
……………………………………………………………………………………………………..[8]
17. An organisation has changed the way in which members of staff can enter the
building. Previously they typed in a four-digit code on a keypad; now they use a
device that reads a handprint. Discuss the effectiveness of using a handprint to
enter the building rather than keying in a code.
………………………………………………………………………………………………………
……………………………………………………………………………………………………..
………………………………………………………………………………………………………
……………………………………………………………………………………………………..
………………………………………………………………………………………………………
……………………………………………………………………………………………………..
………………………………………………………………………………………………………
……………………………………………………………………………………………………. [8]
18. Handprint scans are an example of a biometric method to enter a building. Give
two other examples of biometric methods that could be used in this scenario.
………………………………………………………………………………………………………
……………………………………………………………………………………………………..[2]
19. The use of email has replaced many forms of communication. Describe the
constraints that you need to consider when writing and sending an email.
………………………………………………………………………………………………………
……………………………………………………………………………………………………..
………………………………………………………………………………………………………
……………………………………………………………………………………………………..
………………………………………………………………………………………………………
……………………………………………………………………………………………………..[6]
20. A teacher is concerned that students are playing online computer games at
home without considering eSafety. The teacher is going to create a set of rules
that he feels they should be following. Write down a list of eSafety rules that he
could include.
………………………………………………………………………………………………………
……………………………………………………………………………………………………..
………………………………………………………………………………………………………
……………………………………………………………………………………………………..
………………………………………………………………………………………………………
……………………………………………………………………………………………………..[6]
21. Describe what is meant by the term encryption and why it is used.
………………………………………………………………………………………………………
……………………………………………………………………………………………………..
……………………………………………………………………………………………………[3]
2021
22. Tick (✓) whether the following are examples of personal data.
23. The data stored on the computer system needs to be protected from
unauthorised access. Discuss the effectiveness of different methods of
increasing the security of this data.
………………………………………………………………………………………………………
……………………………………………………………………………………………………..
………………………………………………………………………………………………………
……………………………………………………………………………………………………..
………………………………………………………………………………………………………
……………………………………………………………………………………………………..
………………………………………………………………………………………………………
……………………………………………………………………………………………………. [8]
24. Data stored on a computer system is at risk of being hacked. Explain what is
meant by the term hacking. Include in your answer two examples of the effects
this can have on the computer system.
………………………………………………………………………………………………………
……………………………………………………………………………………………………..
……………………………………………………………………………………………………[3]
25. Describe three measures that could be taken to protect the data from being
hacked.
………………………………………………………………………………………………………
……………………………………………………………………………………………………..
……………………………………………………………………………………………………[3]
26. Complete the sentences below using the most appropriate word from the list.
cookies hacking pharming phishing smishing spam
spyware virus
(b) The software that gathers data by monitoring key presses on a user’s keyboard is
called
....................................................................................................................................... [1]
(c) A fake text message, that could contain a link, sent to a mobile phone is called
....................................................................................................................................... [1]
27. Students often use IT equipment; therefore, it is important to have a good
physical safety strategy. Evaluate your own use of IT equipment, in terms of
physical safety, and describe the strategies you will need to minimise the
potential physical safety risks.
………………………………………………………………………………………………………
……………………………………………………………………………………………………..
………………………………………………………………………………………………………
……………………………………………………………………………………………………..
………………………………………………………………………………………………………
……………………………………………………………………………………………………..[6]
28. When an email is sent, it could have a digital certificate attached. Explain why a
digital certificate is required. Include in your answer items that could be found
in a digital certificate.
……………………………………………………………………………………………………..
………………………………………………………………………………………………………
……………………………………………………………………………………………………..
………………………………………………………………………………………………………
……………………………………………………………………………………………………..[5]
29. One of the parents in the family works for a government department and sends
sensitive data from their home computer to the office. The data is encrypted
before being sent to ensure it is harder to understand if it is intercepted.
Describe four other preventative measures that could be taken to avoid network
security issues.
………………………………………………………………………………………………………
……………………………………………………………………………………………………..
………………………………………………………………………………………………………
……………………………………………………………………………………………………..[4]
30. One way of communicating with other people is to use emails. It is very
important that when you send and receive emails you are aware of e-safety.
Evaluate your own use of email in terms of esafety and describe the strategies
you will need to minimise the potential e-safety risks.
………………………………………………………………………………………………………
……………………………………………………………………………………………………..
………………………………………………………………………………………………………
……………………………………………………………………………………………………..
………………………………………………………………………………………………………
……………………………………………………………………………………………………..
………………………………………………………………………………………………………
……………………………………………………………………………………………………..[8]
31. Employees in the organisation are allowed to access the intranet using their
smartphones. The employees are required to secure their smartphones using
either facial recognition, passwords, or voice recognition.
(a) Tick (3) whether the following statements refer to facial recognition, password, or
voice recognition.
32. Many young people play online games. One problem with online gaming is that
it is easy to give out personal details accidentally. Some users create weak
passwords which could lead to their personal details being accessed.
……………………………………………………………………………………………… [2]
33. Write down three rules that should be applied when setting a strong password.
………………………………………………………………………………………………………
……………………………………………………………………………………………………..
……………………………………………………………………………………………………[3]
34. Describe safety measures that should be taken by gamers to ensure their data
is safe other than using strong passwords.
………………………………………………………………………………………………………
……………………………………………………………………………………………………..
……………………………………………………………………………………………………
………………………………………………………………………………………………………
……………………………………………………………………………………………………..
……………………………………………………………………………………………………[6]
……………………………………………………………………………………………………..
……………………………………………………………………………………………………[2]
……………………………………………………………………………………………………..
………………………………………………………………………………………………………
………………………………………………………………………………………………………
……………………………………………………………………………………………………..
……………………………………………………………………………………………………[6]
36. The Internet of Things (IoT) is a computer network which allows users to control
household devices remotely. It has many benefits, for example, a user can turn
on the house central heating via a smartphone. The IoT can use WiFi and
Bluetooth which can cause problems regarding data security. Describe the
methods that could be taken to protect the user’s data.
………………………………………………………………………………………………………
……………………………………………………………………………………………………..
……………………………………………………………………………………………………..
………………………………………………………………………………………………………
……………………………………………………………………………………………………..
……………………………………………………………………………………………………[6]
37. Keeping data secure is very important in any computer system. Many
organisations use encryption when sending data.
(a) Describe the term encryption.
………………………………………………………………………………………………………
………………………………………………………………………………………………………
……………………………………………………………………………………………………..
……………………………………………………………………………………………………[4]
………………………………………………………………………………………………………
………………………………………………………………………………………………………
……………………………………………………………………………………………………..
……………………………………………………………………………………………………[4]
39. Many young people now use social media rather than other forms of
communication. Evaluate your own use of social media and explain any eSafety
strategies you could use to help minimise the potential dangers.
………………………………………………………………………………………………………
………………………………………………………………………………………………………
………………………………………………………………………………………………………
………………………………………………………………………………………………………
……………………………………………………………………………………………………..
……………………………………………………………………………………………………[6]
2020
40. Phishing and pharming can affect the security of a user’s data. Compare and
contrast phishing and pharming.
………………………………………………………………………………………………………
………………………………………………………………………………………………………
………………………………………………………………………………………………………
………………………………………………………………………………………………………
……………………………………………………………………………………………………..
……………………………………………………………………………………………………[6]
41. Smishing is another security issue. Describe the methods which can be used to
help prevent smishing.
………………………………………………………………………………………………………
………………………………………………………………………………………………………
………………………………………………………………………………………………………
………………………………………………………………………………………………………
……………………………………………………………………………………………………..
……………………………………………………………………………………………………[6]
42. Following recent data protection issues the personal data we allow
organisations to share about us may be reduced. Discuss the benefits and
drawbacks of trying to keep personal data confidential and secure.
………………………………………………………………………………………………………
………………………………………………………………………………………………………
………………………………………………………………………………………………………
………………………………………………………………………………………………………
……………………………………………………………………………………………………..
……………………………………………………………………………………………………[6]
43. Fingerprints are one example of biometrics. Identify three other examples of
biometrics.
………………………………………………………………………………………………………
……………………………………………………………………………………………………..
……………………………………………………………………………………………………[3]
44. Most data protection acts include the principle that data should be accurate
and, where necessary, kept up to date. List four other principles of a typical data
protection act.
………………………………………………………………………………………………………
………………………………………………………………………………………………………
……………………………………………………………………………………………………..
……………………………………………………………………………………………………[4]
45. Smishing and phishing can affect the security of a user’s data. Compare and
contrast smishing and phishing.
………………………………………………………………………………………………………
………………………………………………………………………………………………………
………………………………………………………………………………………………………
………………………………………………………………………………………………………
……………………………………………………………………………………………………..
……………………………………………………………………………………………………[6]
46. Describe the methods which can be used to help prevent phishing.
………………………………………………………………………………………………………
………………………………………………………………………………………………………
………………………………………………………………………………………………………
………………………………………………………………………………………………………
……………………………………………………………………………………………………..
……………………………………………………………………………………………………[6]
47. A train company is improving security on its journeys. They are planning to
introduce a facial recognition system for passengers using their trains. Discuss
the advantages and disadvantages of using facial recognition systems rather
than manually checking tickets.
………………………………………………………………………………………………………
………………………………………………………………………………………………………
………………………………………………………………………………………………………
………………………………………………………………………………………………………
……………………………………………………………………………………………………..
……………………………………………………………………………………………………[6]
………………………………………………………………………………………………………
……………………………………………………………………………………………………..
……………………………………………………………………………………………………[3]
49. When customers shop online, they can pay using a debit card. Describe
measures that customers could use to reduce fraud when using a debit card
online.
………………………………………………………………………………………………………
………………………………………………………………………………………………………
………………………………………………………………………………………………………
……………………………………………………………………………………………………..
……………………………………………………………………………………………………[5]
50. Smishing, pharming, and phishing are three security threats that can occur
when using the internet for shopping.
Tick (3) whether the following statements refer to pharming, phishing, or smishing.
51. A legal document is sent as a file attachment. Explain the steps that need to be
taken to ensure that if a virus is attached to the file, it cannot infect the
computer.
………………………………………………………………………………………………………
………………………………………………………………………………………………………
……………………………………………………………………………………………………..
……………………………………………………………………………………………………[4]
Rule.1
………………………………………………………………………………………………………
Reason
………………………………………………………………………………………………………
Rule.2
………………………………………………………………………………………………………
Reason
………………………………………………………………………………………………………
Rule.3
……………………………………………………………………………………………………..
Reason
……………………………………………………………………………………………………[6]
53. The e-ticket will link to a database containing personal data. Give two examples
of personal data that could be stored.
……………………………………………………………………………………………………..
……………………………………………………………………………………………………[2]
2019
54. John has realised that his younger sister is using social media websites. During
her use, she may reveal personal data.
(a) Explain what is meant by personal data.
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
………………………………………………………………………………………………[4]
(b) Describe the strategies that John would suggest to his sister so that she can
minimise the potential dangers whilst using social media websites.
………………………………………………………………………………………………………
………………………………………………………………………………………………………
………………………………………………………………………………………………………
………………………………………………………………………………………………………
……………………………………………………………………………………………………..
……………………………………………………………………………………………………[6]
55. As our use of the internet increases e-safety becomes essential. Discuss why e-
safety is needed.
………………………………………………………………………………………………………
……………………………………………………………………………………………………..
………………………………………………………………………………………………………
……………………………………………………………………………………………………..
……………………………………………………………………………………………………
………………………………………………………………………………………………………
……………………………………………………………………………………………………..
……………………………………………………………………………………………………[8]
56. Email is a service provided by the internet. For each of the following problems,
associated with email, describe methods of protecting your data.
(i) Viruses
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
………………………………………………………………………………………………[4]
57. Name three physical safety issues associated with the use of ICT equipment,
and for each one, suggest a possible method to help to prevent the issue. The
methods should be different in each case.
Issue1
…………………………………………………………………………………………………
Method
…………………………………………………………………………………………………
Issue 2
…………………………………………………………………………………………………
Method
…………………………………………………………………………………………………
Issue 3
…………………………………………………………………………………………………
Method
…………………………………………………………………………………………………
[6]
58. Phishing, pharming, and smishing can affect the security of your data. For each
of these security issues describe the methods which you could use to try to
prevent them.
(a) Phishing
…………………………………………………………………………………………………
…………………………………………………………………………………………………[2]
(b) Pharming
…………………………………………………………………………………………………
…………………………………………………………………………………………………[2]
(c) Smishing
…………………………………………………………………………………………………
…………………………………………………………………………………………………[2]
59. E-safety is very important when using the internet. It is very easy to accidentally
reveal personal data to others when using social networking sites. Describe
three strategies, giving reasons for each one, which you would take to avoid
revealing personal information when using social networking sites.
Strategy 1
…………………………………………………………………………………………………
Reason 1
…………………………………………………………………………………………………
Strategy 2
…………………………………………………………………………………………………
Reason 2
…………………………………………………………………………………………………
Strategy 3
…………………………………………………………………………………………………
Reason 3
…………………………………………………………………………………………………
[6]
60. Biometrics are now commonly used to increase the security of computer
system access. Discuss the effectiveness of using biometric methods to
increase security.
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
………………………………………………………………………………………………[8]
2018
61. Emails are a very popular way of communicating. Tick four statements, relating
to emails that are true.