Paper 1 - Unit 6 - Security, privacy and data integrity

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/47

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 4:15 PM on 4/9/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

48 Terms

1
New cards

Data Security

The protection of data against unauthorised access, corruption, or accidental loss.

Focuses on keeping data safe from external threats and ensuring it is recoverable.

Methods:

  • User authentication: Passwords, biometrics

  • Firewalls: Hardware or software that filters network traffic based on predefined rules to block unauthorised access.

  • Encryption: data unreadable without decryption key

  • Backups & disaster recovery: creating regular copies of data, stored in separate physical locations, to ensure it can be restored if the original is lost.

  • Anti-malware, pen testing, auditing

2
New cards

Data Privacy

The ability of an individual or organisation to control how their personal information is collected, used, and shared with third parties.

Methods:

  • User Access Levels (UALs): Assigning different permissions so users only see data that is needed for their job role.

  • Data Protection Legislation: UK Data Protection Act / GDPR mandates fair and lawful data processing

  • Privacy Policies: Formal agreements that define what data is collected and how it will be used.

3
New cards

Data Integrity

The requirement for data to be accurate, consistent and up to date. Ensures data remains unaltered during storage or transmission.

Methods:

  • Validation: Ensures data is sensible and meets criteria, e.g. range/length/format checks

  • Verification: Ensures data matches original source, e.g. double entry / visual check

  • Transmission checks: Mathematical checks to detect errors during data transfer, e.g. parity bits, checksums, check digits

4
New cards

Security vs Privacy

Security is the protection of data from authorized access or loss, whereas privacy is the legal and ethical control over how that data is shared and used.

Security: Stops the “bad guys” from getting in

Privacy: Stops the “good guys” from seeing too much.

A system can be secure but not private and vice versa.

5
New cards

Security vs Integrity

Security is the protection of data from unauthorized access or loss, whereas integrity is the assurance that the data remains accurate, consistent, and free from errors.

Security stops people from stealing the data, integrity stops the data from being wrong.

6
New cards

Threats to Data Security

Internal mismanagement

Natural disasters

Unauthorised intrusion into the system by an individual

Malicious software entering the system.

7
New cards

Authentication

Process of determining whether somebody is who/what they claim to be before granting access

Frequently done through log on passwords/biometrics / digital certification

Prevents unauthorised access to data

8
New cards

Digital signature

A means of electronically signing a document with data that cannot be forged

  1. Sender hashes message.

  2. Hashed message encrypted using sender’s private key. This is the digital signature.

  3. Digital signature attached to original message and sent.

  4. Receiver decrypts the digital signature using the sender’s public key.

  5. Receiver hashes the original message.

  6. Receiver compares this with the result of decryption of digital signature.

    • If they match, message is authentic and has not been altered

    • If they don’t match, message has been tempered with / sent by someone else

Ensures document is authentic // came from a trusted source

Ensures document has not been altered during transmission (Integrity)

9
New cards

Firewall

Prevents unauthorised access to computer systems from external sources

Sits between the computer or LAN and the Internet/WAN and permits or blocks traffic to/from the network

Can make precise decisions about what to allow or block as it can detect attempts by specific software to connect to Internet

Can help to block hacking and prevent viruses from reaching a computer

Can be software and/or hardware

Software firewall:

  • Protects only the specific device it is installed on.

  • Consumes host CPU/RAM

  • Transmission/data must enter the system/network before it can be inspected.

Hardware firewall:

  • Secures all devices within a network.

  • A physical filtering component that inspects data packets from the network before they reach computers and other devices on a network.

  • Free-standing unit - does not use the resources of the computers it is protecting, so there is no impact on processing performance.

10
New cards

Packet filtering

Uses various fields in a packet's IP and TCP headers to decide what to do with the packet

Packets of data are inspected by the firewall to check which port they are attempting to access

<p>Uses various fields in a packet's IP and TCP headers to decide what to do with the packet</p><p>Packets of data are inspected by the firewall to check which port they are attempting to access</p>
11
New cards

Access rights

e.g. read and write / read only // no access

Giving different users / accounts / logins access to different elements / views of the system.

12
New cards

Audit trails

• Logging all actions/changes to the system

• In order to identify any unauthorised use

13
New cards

Concurrent Access Controls/Record locking

Closes/locks a record to the second user until first update complete

Prevent simultaneous updates being lost

14
New cards

Secure passwords

Use a minimum of 12 characters

Use a mixture of numbers, lowercase and uppercase characters

Include symbols such as &, !, #, %

Do not include your name, DOB or personal details

Create a password based on a memorable phrase and exchange letters for numbers or symbols e.g. Brdu8#Jw4g

15
New cards

Encryption

The act of encoding a plaintext message so that it cannot be deciphered unless you have a numerical key to decrypt it

16
New cards

Malware

Software that is intended to damage or disable computers and computer systems.

17
New cards

Computer virus

  • Malware

  • Replicates / copies itself

  • Can cause loss of data / corruption of data on the computer

  • Can cause computer to "crash" / run slowly

  • Can fill up hard disk with data

18
New cards

Anti-virus software

Detect / remove / quarantine viruses / key-loggers etc.

Carry out regular scans

19
New cards

When a virus checker should be run

  • when machine is first turned on, checks for boot sector viruses.

  • when an external storage device is connected

  • checks a file when it is downloaded

  • checks a web page when it is accessed

20
New cards

Worm

A standalone malware program that does not require a user to run it in order for it to spread

Exploit vulnerabilities in the destination system and spreads automatically

Could corrupt user's computer // delete data // consume bandwidth

21
New cards

Trojan Horse

Malicious pieces of software that masquerade as something seemingly innocuous or useful

Cannot self-replicate

Often they serve to open up back doors in your computer to the Internet so that the processing power, Internet bandwidth and data can be exploited remotely

22
New cards

Spyware

Software that enables someone to obtain covert information about another person’s computer

Examples: keylogger, webcam hack, transmitting data covertly from their hard drive

23
New cards

Spam

User's inbox is filled by large amounts of unwanted email

User / email server employs filtering software that can divert / delete spam email

24
New cards

Phishing

Using email to manipulate a victim into visiting a fake website and giving away personal information

25
New cards

Pharming

Redirects website to fake website even when right URL is entered

Domain name server compromised/Proxy server compromised

Need to check digital certificate

26
New cards

Code Quality

Improving code quality, together with monitoring attempts to gain unauthorised access and protection can significantly reduce threats from malware

27
New cards

Avoiding accidental data loss

Frequent backup EITHER to secondary media/to cloud

Disk-mirroring strategy/RAID

UPS (uninterruptable power supply)/backup generator

28
New cards

Protection of data - Physical measures

Locked doors/keyboards etc.

Secure methods of access, keypads/ biometric scans etc.

Security guards

29
New cards

Protection of data - Backup of data

Regular copies of the data are made

If the data is corrupted it can be restored

30
New cards

Protection of data - Monitoring

User access logs/audit trails - list of all the requests for individual files that people have requested from a server/website etc

Packet sniffers - tool that intercepts data flowing in a network and analyses it for malicious content

31
New cards

Protection of data - Software maintenence

Up-to-date patches to the operating system and application programs - reduce vulnerabilities in the system

Up-to-date anti-malware software can prevent the spread of infection

32
New cards

Buffer Overflow

When a program accidentally writes data to a location too small to handle it.

Overflowed data may end up in a neighbouring instruction space

Malware can deliberately cause and manipulate overflow data which may then be read as a malicious 'instruction'

33
New cards

SQL Injection

An attack that targets SQL servers by injecting commands to be manipulated by the database.

34
New cards

Error detection methods

Parity bits

Majority voting

Check digits

Checksums

35
New cards

Parity bits

uses even or odd parity which is decided before data sent

• each byte has a parity bit

• parity bit is set to 0 or 1 to make parity for byte correct

• after transmission, parity of each byte re-checked

• if it is different, then an error is flagged

36
New cards

Using parity bytes for additional check

• Each byte has a parity bit // horizontal parity

• An additional parity byte is sent with vertical (and horizontal) parity

• Each row and column must have an even/odd number of 1s

• Identify the incorrect row and column

• The intersection is the error

<p>• Each byte has a parity bit // horizontal parity</p><p>• An additional parity byte is sent with vertical (and horizontal) parity</p><p>• Each row and column must have an even/odd number of 1s</p><p>• Identify the incorrect row and column</p><p>• The intersection is the error</p>
37
New cards

How the incorrect bit is determined

Consider each row in sequence

Identify any row with incorrect parity

Repeat the process for each column in sequence

Identify where a row and column with incorrect parity intersect

<p>Consider each row in sequence</p><p>Identify any row with incorrect parity</p><p>Repeat the process for each column in sequence</p><p>Identify where a row and column with incorrect parity intersect</p>
38
New cards

Check digits

An additional digit at the end of a string of other numbers designed to check for mistakes in input or transmission

Printed books and other products have a unique barcode with a ISBN or EAN

The first 12 digits of the barcode are the unique item number...

...the 13th is the check digit calculated by an algorithm based on the other 12 digits

This can be calculated using the Modulo 10 system

<p>An additional digit at the end of a string of other numbers designed to check for mistakes in input or transmission</p><p>Printed books and other products have a unique barcode with a ISBN or EAN</p><p>The first 12 digits of the barcode are the unique item number...</p><p>...the 13th is the check digit calculated by an algorithm based on the other 12 digits</p><p>This can be calculated using the Modulo 10 system</p>
39
New cards

Checksum

a calculation is carried out on the data to be sent (checksum)

• the result is sent, along with data to recipient

• checksum is re-calculated at receiving end

• if both sums are the same, no error has occurred

• if the sums are different, the data has been corrupted during transmission

• request is sent to re-send data

40
New cards

Validation

Needed to check that the data entered is sensible/reasonable/acceptable/matches required criteria

Automatic check by computer

Examples include range, type, length, etc.

Does not check data is correct

41
New cards

Validation checks

Uniqueness check - data is not pre-exiting in the system

Length check

Format check- e.g. Checks postcode is in the correct format

Type check - e. g. Checks the number has digit characters only

Presence check - data must be entered

Range check

Existence check - Checks data inputted is part of pre-defined acceptable values

42
New cards

Verification

Needed to ensure that the data entered exactly matches the original source/data is consistent

Comparison of two versions of the data

Examples include double entry, visual checking, proof reading etc...

Does not check data is sensible/acceptable

43
New cards

Backup Strategy questions

How often should the data be backed up? e.g. at the end of each day - When have most changes occurred

What medium should the data be backed up to? e.g. external hard disk drive - capacity? write speed?

Where should the backups be stored? e.g. off-site - building damage/natural disasters

What is backed up? e.g. only updated files ... - Large files could take a long time

When should the backup take place? e.g. overnight - not likely to be used

Who is responsible for performing the backup? - skilled staff, may not be done otherwise

Make sure the procedure is written down and understood by staff - may not be carried out or done properly

44
New cards

Back up methods

Cloud storage

Removable devices

On-Site server

Disk mirroring/RAID

UPS

45
New cards

UPS

Uninterruptable power supply/backup generator

Avoids data being lost as generator will kick in in event of power failure

46
New cards

Disk mirroring

Process by which data is written simultaneously to two or more disk drives.

Read and write speed is decreased but redundancy in case of catastrophe is increased.

47
New cards

List of security measures

Passwords/biometrics

Encryption of data

Installation and use of up to date anti-malware/anti-virus

Give different access rights to different users

Firewall/proxy

Physical methods/lock doors and use secure entry devices/CCTV

Two-step authentication

48
New cards

Implications of poor security

Unauthorised to confidential information

Potential to lose money e.g. brand reputation diminished, investment to fix issues

Stop computers working - ransomware, corrupt files etc

Make computers bots - to perform DDOS attacks