Chapter 8

A student has set up a password for his laptop computer. The password he has chosen is Px2zY!Cg3?bd

(a) Discuss the benefits and drawbacks of using this password.

Benefits

  • It is a strong password

  • Hard to crack

  • More secure

  • Password is long therefore shoulder surfing is reduced

  • Does not contain personal information so harder to crack

Drawbacks

  • Easy to forget as it has many different characters

  • Even though it is still strong it is easy for a computer to crack

  • The user would have to look at the keyboard when entering the password

  • The user may have to write it down to remember it Letters and numbers could be confused… …such as 1 and I, 2 and Z, 5 and S

  • As it is long/complex it could be mis-typed

(b) The student could have protected his laptop computer by using two-factor authentication. This could have combined his password with a biometric method. State two examples of biometric methods he could use.

1 retina scan

2 Fingerprint

—> Iris scan, facial recognition, voice recognition

A company requires its employees to regularly change their login passwords for the company’s computer systems. Passwords must be strong and cannot be reused.

(a) Explain three problems that may occur when the employees change their passwords regularly

1 The passwords could become similar hence security/passwords could be weakened

2 May be more difficult to find a different password so the passwords/security could be weakened

3 Users could easily forget the current password leading to system lock out

—> It may be typed incorrectly as the password is like the previous one which could lead to login errors

—> Users may have to write the passwords down so they are not forgotten and this may lead to others seeing the passwords

(b) The company has a website which uses a digital certificate. Explain the purpose of the digital certificate.

  • To ensure a website is trusted/authentic/genuine

  • Verifies if the company owns the website

  • To share a public key for encryption when communicating with the website

(c) A digital certificate is attached to an email. State three items contained in a digital certificate.

1 Company/owner's name

2 Date issued

3 Expiry date

—> Owner's/company public key

—> Company/owner's digital signature

—> Issuer's/Sender’s name

—> Serial number

Two-factor authentication can use a number of different forms of identification. One form of identification is to use ‘where the user is’. An example of this would be the user’s GPS location.

(a) State two other forms of identification. Give an appropriate example of each

Form of identification: something the user owns:

Example: card reader / pen drive / dongle / mobile phone

Form of identification: something the user knows:

Example: password / PIN / TAN / email address / CVV on back of a credit card / answers to security questions

Form of identification: something the user has:

Example: biometrics

(b) Explain the purpose of two-factor authentication

  • To protect user’s data / credentials

  • To reduce the possibility of unauthorised access

  • Combines two different forms of identification

  • Makes it more secure by adding an extra layer of security

Social media can be used to communicate with friends. Give four precautions that young people should take when using social media.

  1. Block/report unwanted users

  2. Do not arrange to meet online strangers face to face

  3. Do not meet people you do not know alone

  4. Do not disclose personal data

—>Do not use your real name for the social media name, Do not post images that can link directly to you, Do not post inappropriate images, Do not use inappropriate language, Respect people's confidentiality/privacy, Set status to private

A student has downloaded a file which contains a virus.

(a) Describe the possible effects on his computer system if he opens the file

  • Pop up messages can appear on the computer screen

  • Causes the computer processing to slow down

  • Causes the computer to crash

  • Deletes/corrupts files/programs/data

(b) Explain how the student could prevent the computer from being infected by viruses.

  • Download/use up to date anti-virus software

  • Regularly scan the computer for viruses

  • Only open email attachments from people you trust

  • Scan all portable storage media before downloading files/software

(c) Some files containing viruses have to be quarantined as they cannot be deleted.

(i) State the type of files that may have to be quarantined rather than deleted.

System files

(ii) Explain how the software detects and quarantines the file.

  • Scan the computer for viruses

  • If a virus is found in the file it alerts the user that the file needs to be quarantined

  • Re-scan the computer to check for further viruses

  • Allows the user to accept/reject the quarantining of the file/

  • The file is moved to a hidden directory

  • The user does not have access to the quarantined file

Some confidential personal data can be classed as sensitive data.

Name three items of personal data that could also be sensitive data.

  1. Ethnic/racial origin

  2. Religion/philosophical beliefs

  3. Political views/opinions

—> Membership of a political party, Membership of a trade union, Sexual orientation, Criminal record, Health/medical record, Genetic data/DNA, Biometric data

A student uses social media to keep in contact with other people. Describe four strategies that the student could use to stay safe when using social media to communicate with others.

  • Don’t give out other people’s personal information such as address or phone number

  • Don’t send inappropriate images to anyone

  • Don’t open/click on suspicious links/adverts on social media

  • Don’t become online ‘friends’ with people you do not know//don’t contact/chat to people you do not know

  • Never arrange to meet someone in person who you only met online

  • If anything you see or read online worries you, you should tell someone about it/block them

  • Use appropriate language

  • Set security so only friends can contact you

According to research carried out on passwords the top three most used passwords are 12345, qwerty and sunshine. Describe, using other examples, the difference between a weak password and a strong password.

  • Weak password is easy to guess

  • Weak passwords consist of all letters or all digits or all digits with one letter/all

  • letters with one digit/words found in a dictionary/Strong passwords use a

  • mixture of upper case, lower case, symbols and digits

  • Weak password is one that has less than 8 characters

  • Weak password has repeated characters

  • Weak password has characters next to each other on a QWERTY keyboard

  • Weak passwords are ones that are similar to the username

  • Weak passwords can use personal information

  • All of the examples given in the question are weak passwords

There have been major issues regarding the accuracy of facial recognition systems for identifying suspects by the police. Tawara Airport has installed biometric security including facial recognition systems to help the police recognise known criminals entering and leaving the country. Previously video was taken of all passengers and then checked manually.

(a) Discuss the effectiveness of using facial recognition systems rather than the manual video system to increase security in this way.

For

  • Face can be identified faster

  • Face can be identified by electronic comparison therefore relative higher level of accuracy

  • Facial recognition can uniquely identify individuals

  • Can automatically compare faces from older images

  • System can work continuously but a human checker would need to take breaks

Against

  • Dark glasses/facial hair/face coverings may cause the facial recognition systems to not work

  • More difficult to change biometric data

  • Recognising a person can be slower as more checking is carried out

  • Harder to set up the facial recognition system

  • Takes longer to add new people to the system

  • Biometrics can use a lot of memory to store the data

  • Intrusive as personal details have to be stored

  • More likely to be affected by the environment

  • With the video system each frame needs to be checked with known images which can lead to errors

(b) Give three examples of biometric data

  1. Finger print

  2. Hand print

  3. Vein geometry

—> Retina, Iris, Speech/Voice

Instant messaging involves users sending text messages to each other. Evaluate how you would use eSafety strategies in your own use of instant messaging.

  • I block unwanted messages/suspicious users and report the sender

  • Before using the messaging system, I check how to block and report unwanted users, this stops predators

  • I never arrange to meet strangers alone

  • I always tell a responsible adult if I plan to meet someone

  • I always meet in a public place

  • I avoid giving away personal information

  • I report abusive messages from a sender of the messages

  • I report cyber-bullying

  • When sending messages I always use appropriate language

  • If someone messages me with private and personal information about themselves I respect their confidentiality/privacy

  • I always read carefully the messages before I send

  • I avoid sarcasm

  • I am not offensive when replying

  • I carefully check that I am replying to the correct person

  • I do not enable my location when messaging

Due to data protection laws, personal data should be kept confidential and secure. Explain why personal data should be kept confidential and secure.

  • The data will have the name/medical information attached therefore it needs protecting

  • The data is confidential as it links directly to the person

  • The data will be sensitive

  • To prevent blackmail/bullying from using medical results

  • To prevent fraud from using financial information

  • To prevent identity theft using contact details

  • To avoid the doctor’s surgery getting fined if it got made public

  • The doctor’s surgery’s reputation would suffer

  • Patients would lose trust

Workers in an office log onto the office computer network using a password. Aaron is using his name as his password.

(a) Give reasons why this is not a good idea.

  • Password is too short

  • Easy to guess

  • Contains personal information

  • Doesn’t contain a mixture of uppercase, lowercase letters, numbers, and

  • symbols

  • Contains repeated letters

(b) One method that hackers use to find people’s passwords is to install key-logging spyware onto computers. Give methods that could be used to safely enter passwords even if key-logging spyware has been installed on a computer.

  • Use drop-down lists

  • Use biometric passwords

  • Use one use tokens/OTP

  • Use a device instead of a password

As our use of the cloud increases, new ways of accessing it safely need to be developed. The use of typed passwords is being replaced by biometric methods.

Discuss the benefits and drawbacks of using biometric methods.

Benefits

  • Faster way of accessing systems

  • Cannot forget the biometric data

  • Must be physically at the device to access it

  • More secure as it uses unique data

  • Difficult to copy/forge

Drawbacks

  • Invasion of privacy

  • User may not know they have logged off

  • Biometrics may change therefore data will need to be kept up to date

  • Expensive method/technology to set up

  • Environment can affect measurements

  • Over usage can affect the measurements

  • Difficult to reset once compromised

  • Difficult to set up

  • Time consuming to set up as measurements must be taken

  • Facial coverings/changes can prevent system from working

An organisation has changed the way in which members of staff can enter the building. Previously they typed in a four-digit code on a keypad; now they use a device that reads a handprint.

Discuss the effectiveness of using a handprint to enter the building rather than keying in a code.

Positives

  • Data can be read/identified faster

  • Data can be read/identified by electronic comparison therefore relative higher

  • level of accuracy

  • Increases security as the hand is unique whereas a four-digit code easier to guess

  • Can’t forget your handprint, unlike a code

  • The person must be present to enter the building

Negatives

  • If the hand is damaged, then may not work

  • More difficult to change biometric data

  • Only works with one hand therefore difficult for right-handed people

  • Recognition could be slower as system is more complex

  • Harder to set up the biometric system

  • Takes longer to add new people/change biometric data to the system

  • Biometrics can use a lot of memory to store the data

  • Intrusive as personal details must be stored in biometrics

  • More likely to be affected by the environment

Handprint scans are an example of a biometric method to enter a building.

(b) Give other examples of biometric methods that could be used in this scenario.

  • Fingerprint

  • Vein geometry

  • Retina

  • Iris

  • Face

A teacher is concerned that students are playing online computer games at home without considering eSafety. The teacher is going to create a set of rules that he feels they should be following. Write down a list of eSafety rules that he could include

  • Do not give away personal information

  • Do not use your real name as your username

  • Do not use your face image as your avatar

  • If you receive messages from unwanted users block and report them

  • Do not meet unknown users in real life/use a chaperone

  • Do not give financial information to other users

  • If you receive unwanted and abusive messages report the sender of the messages

  • When sending messages always us appropriate language

  • Think before you reply to a message

Describe what is meant by the term encryption and why it is used.

what is meant:

  • Scrambling data

  • Changing plain text into cipher

  • Encryption converts text into a meaningless form

why it is used:

  • To prevent data/information from being understandable to people who

  • access/intercept the data

  • Protects data

Arjun can log directly into his office system from his home computer. The office system only requires users to enter their user id and a password

(a) Explain why this is not very secure.

  • User id and password can sometimes be easily guessed

  • Passwords can be hacked with key logging software

  • Passwords can be hacked by using random password generators

  • Others can see the details being typed in

  • If the home computer saves the log in information, then anyone can access

  • If the user does not logout, then others can access data

(b) Describe the other ways the office system could identify the user securely.

Way 1: One-use code/token

  • Arjun logs in then software generates a one-use code/token

  • Arjun enters the code/token into the system

  • Even if hacker intercepts code/token is no use as can only be used once

  • Token is time limited

Way 2: Card/dongle

  • The user has a dongle/card which is inserted into the computer

  • The dongle/card is read by the computer

  • The dongle/card data is unique

Way 3: Biometrics

  • Using biometric scanner to capture digital image of fingerprint/retina/iris/face

  • Each biometric is unique

  • Biometrics are nearly impossible to forge

Protocols are associated with the internet and an intranet. Identify the protocols and for each one, identify a use.

HTTP/HyperText Transfer Protocol

Transfer data between a webserver and the browser displays/loads pages/connect to a webpage

HTTPS/ HyperText Transfer Protocol Secure variant

  • Transfer data between a webserver and the browser securely//display/loads

  • secure pages//connect to a secure webpage

  • Secure variant of HTTP

FTP/File Transfer Protocol

Transfers files between computers/website

VOIP/Voice Over Internet Protocol

Makes phone calls over the internet

SSL/TLS

determines variables of the encryption for both the link and the data being transmitted

SMTP

Communication protocol for email

SLS

Protocol used on the internet

When customers shop online, they can pay using a debit card. Describe measures that customers could use to reduce fraud when using a debit card online.

  • Use up to date anti-spyware/anti-virus to stop phishing and pharming attacks

  • Using websites that encrypt data when sent/green padlock/use HTTPS/SSL

  • Ensuring that strong passwords are used

  • Passwords used for the online shopping account should be different to other passwords you use

  • Check all transactions carried out with the store/receipts

  • Type in the web address of the supermarket rather than copy and paste/click on links from an email

  • Do not buy from untrusted websites/apps

  • Ensure that the wireless password to the router is strong

  • Report any phishing attempts

  • Disable cookies/delete cookies frequently

Smishing, pharming and phishing are three security threats that can occur when using the internet for shopping. Tick whether the following statements refer to pharming, phishing or smishing

An employee in a company has used QWERTY123 as his login password for some time.

(a) Give three reasons why this is not advisable

  • Password is not strong

  • It is easy to guess

  • The letters and numbers are in sequence on the keyboard

  • Easy to shoulder surf

  • It should be changed regularly to secure his login

(i) A method which scrambles the data so that it cannot be understood is

Encryption

(ii) A fingerprint is an example of

Biometrics

(iii) A method of guaranteeing a website is authentic is

A digital certificate

(iv) A hardware device that filters the information coming through the Internet connection into a LAN is

Firewall

An employee in the company uses his company password for other accounts. Explain why this is not a good idea.

  • If someone finds the password for one of the systems/accounts other systems/accounts are compromised

  • If someone finds the password for one of the systems/accounts then he has gained the company password

A company’s computer system is protected by both a user ID and a password.

(a) Explain how a user ID and a password are used to increase the security of data

  • User IDs and passwords combined protect against unauthorised access.

    Combined user ID and password is unique to the computer system.

  • The user ID ensures the correct account is accessed, the password then protects the account

  • If someone knew the user ID they could only gain access with the correct password

  • Typing in incorrect user ID/password a number of times could lock the user out

  • User IDs give different access levels in the computer system

  • User IDs are unique and allow the system manager to monitor usage on the system

  • The password is masked and displayed as stars

  • A strong password is a combination of upper and lower case characters/numbers/symbols

  • Passwords could be biometrics ensuring greater security

  • Passwords increase security as they are only known by the user

The company plans to improve the security of its computer system by using biometric methods. Describe what is meant by biometric methods. Give two examples of biometrics.

Description

  • Uses parts of the body/physical attributes as a password

  • Unique to the user

  • Form of authentication

Examples

  • Fingerprint

  • Retina

  • Voice

  • Face

Tick (✓) whether the following are examples of personal data.

The data stored on the computer system needs to be protected from unauthorised access. Discuss the effectiveness of different methods of increasing security of this data.

Factors increasing effectiveness

  • Strong passwords are difficult to crack

  • Biometric passwords are harder to crack

  • Regularly changing passwords increases security

  • Use of two-factor authentication

  • Using different passwords for parts of the computer system makes it more

  • difficult to gain access to the full system

  • Firewall required to stop attacks from computers

  • Firewall stops fraudulent sites attacking the computer

  • Anti-spyware stops passwords being seen when typed in

Factors reducing effectiveness

  • Too complex a password can be easily forgotten

  • Passworded files may not be backed up

  • Using a number of different passwords can become cumbersome

  • Regularly changing passwords means that passwords may be forgotten

  • May be difficult to choose unique password if it is changed every few weeks

  • Passwords may become more easy to guess if regularly changed

  • Hackers can breach most passwords

  • The firewall can affect the operation of the computer and stop some uploads

  • The firewall may need to be shut down at times to upload files therefore making computer unsafe

  • Some legitimate software can be blocked by the firewall

To gain full marks both sides of the discussion are needed

Data stored on a computer system is at risk of being hacked.

Explain what is meant by the term hacking. Include in your answer two examples of the effects this can have on the computer system

Gaining unauthorised access to a computer system – 1 mark

Examples

  • Can lead to the identity theft of data

  • Can lead to the misuse of/access to personal data

  • Data can be deleted

  • Data can be changed

  • Data can be corrupted

  • Place malicious files/software

Describe the measures that could be taken to protect the data from being hacked

  • Use of firewalls to block unauthorised computer systems

  • Use of passwords

  • Use of intrusion detection software/anti-spyware

  • Use two-factor authentication

  • Switch off WiFi/computer when not in use

A common use of home computers is online gaming. Describe the e-Safety measures which should be taken when playing games on the internet.

  • Report/block cyberbullies

  • Respect other players

  • Check game ratings for age

  • Reduce the amount of time spent gaming

  • Be careful of in-app purchases

  • Turn on privacy settings

  • Don’t use your real name//use a nick name

  • Don’t give away personal information

In order to log onto online gaming a user ID and password is needed. Explain what is meant by a user ID and password and why they are needed

Max two from:

  • Part of the authentication system

  • Needed to improve security

Max three from:

  • Combined they are unique

  • User ID is an identifier for the user

  • Password is a string of characters

  • Passwords verify the user in the authentication process

Many young people play online games. One problem with online gaming is that it is easy to give out personal details accidentally. Some users create weak passwords which could lead to their personal details being accessed.

(a) Name two pieces of personal data that could be accessed

  • Email address

  • Real names

  • DOB

  • Home address

  • Contact phone number

  • Membership card number

  • Location data

  • Internet Protocol (IP) address

  • Picture of yourself

  • Gender

(b) Write down three rules that should be applied when setting a strong password

  • Password should not relate to personal details

  • Should be a long password

  • Not previously used password

  • Should not include repeating/obvious patterns//predictable words

  • Password should be strong

(c) Describe safety measures that should be taken by gamers to ensure their data is safe other than using strong passwords.

  • Use anti-spyware/up to date antivirus software

  • Play the games with the firewall operational

  • Play only with authorised versions of games which you have purchased from

  • the correct sources and for which you have a licence

  • Download/buy files and new software from reputable sources

  • Do not forget to delete your account details when you are not playing again

  • Keep the game software up to date.

  • When disposing of your gaming device ensure all of your personal information has been deleted.

  • Choose a username that does not reveal any personal information

  • Be aware of criminals buying or selling ‘property’ that exists inside a computer game, in the real world

Discuss the disadvantages of policing the internet.

  • Removes freedom of speech

  • International therefore would be difficult to police

  • Laws are different in each country/state

  • The dark net would increase

  • Electronic crimes would move away from the internet to other places, making

  • them harder to intercept

  • Internet users can be anonymous therefore it will be difficult to track down

  • Who chooses what is blocked could affect day to day browsing

  • Concern that everything you do is being watched therefore privacy is lost

  • Could be breaches in sending/receiving confidential/personal data as others

  • could not see it

  • Increase in cost of security

  • Reduction in speed of browsing/search

  • Could lead to corruption/bribery//police may use the data

  • No one owns the internet so it would be impossible to police effectively

  • Very expensive to police the internet as extra police force has to be set up

  • As the internet it so big it is hard to keep track on all the activity

  • As the internet is dynamic it would be impossible to check everything

The internet has both moderated and unmoderated forums. Explain what is meant by a moderated forum

  • Online discussion forum/social platform/website

  • Where the posts are controlled/monitored by an administrator

  • Those that break the rules are banned

  • Filters out inappropriate posts

  • Moderated forums have rules/policy

Students in Tawara College are using the internet to find information for a project. They have been told that the college has a firewall.

(a) Explain what is meant by a firewall and why it is used.

Two from:

  • Could be hardware or software

  • Sits between the computer/network and the router

  • Filters/controls/monitors data/traffic coming in and out of the college network

Four from:

  • Checks whether the data passing through it meets a given set of rules

  • Blocks data that does not satisfy the rules

  • Alerts user about unwanted data

  • Can log all incoming and outgoing data/traffic to check later

  • Can prevent/block access to undesirable/inappropriate websites/IP addresses

  • Keeps a list of undesirable IP addresses

  • Can prevent hackers gaining access to the system

  • Can send out warnings

  • Can block the unwanted traffic in and out of the network

  • Keeps a list of desirable IP addresses/websites

  • It can block IP addresses

The students visit different websites to get information for their project.

(b) Explain why it is not always easy for the students to find reliable information on the internet.

  • Anyone can post information on the internet

  • Websites may contain incorrect information

  • Any information found will need to be checked against reliable sources

  • Similar websites may have conflicting data on the same topic

  • The search engines tend to be generalised

  • Search engines do not necessarily give the most reliable searches at the top

  • of the list//paying to have information at the top of the list

  • Data on the website could be out of date

Complete the sentences below using the most appropriate word from the list.

cookies hacking pharming phishing smishing spam spyware virus

(a) The act of gaining unauthorised access to a computer system is called

Hacking

(b) The software that gathers data by monitoring key presses on a user’s keyboard is called

Spyware

(c) A fake text message, that could contain a link, sent to a mobile phone is called

Smishing

When an email is sent, it could have a digital certificate attached. Explain why a digital certificate is required. Include in your answer items that could be found in a digital certificate.V

Max four from:

  • Adds a level of security

  • Verifies the email comes from a known and trusted source

  • Provides the receiver with a means of reply/private key

  • Used for initialising secure SSL connections between web browsers and web servers

Max three from:

  • Details of the owner of the digital certificate

  • Serial number

  • Public key

  • Digital signature

  • Subject name

  • Valid from

  • Valid to//Expiry date

One way of communicating with other people is to use emails. It is very important that when you send and receive emails you are aware of esafety. Evaluate your own use of email in terms of esafety and describe the strategies you will need to minimise the potential esafety risks.

  • I never send personal data to people I do not know because people can use it against me as other people can access my personal details

  • I do not reply by using reply button unless I know the person because it may be a scam

  • I use a list of known email addresses so I don’t accidently send it to the wrong email address

  • I check before opening an email/email attachment because it might be a phishing attack

  • I scan both the email and attachment in order to avoid viruses

  • I never send images of myself to people I do not know so they cannot recognise me in the street

  • I do not set auto reply to my email system as this could alert a spammer that the email is active

  • I use email filtering this stops spam emails

  • I always report any phishing emails so the authorities can take action

  • I change my email password regularly so that others cannot access my email account

  • I use a strong password so that others cannot access my email account

  • I logout of email after I have finished using it to stop others gaining access to my emails

  • I keep my password safe so that others cannot access my account

A parent is concerned about his children sending texts. When sending a text, it is important to follow netiquette.

(a) Explain what is meant by the term netiquette.

  • Internet etiquette

  • Set of social conventions

  • They show common courtesy when communicating online

(b) The parent is planning to produce a number of rules to ensure that his children follow etiquette when texting other people.

  • Write down rules that he could include in his list.

  • Do not use capital letters as it relates to shouting

  • Do not use abusive/vulgar language/threatening behaviour

  • Be clear in the text sent

  • Always check spelling and grammar

  • Remember that sarcasm does not communicate well

  • Respect other’s privacy

  • Respect other people’s views

  • Do not use too many emoticons

  • Do not use text language/slang

  • Do not spam

  • Do not send inappropriate links

A company has placed a firewall between their Local Area Network (LAN) and their internet connection. This is used to increase security in their computer systems.

Discuss the effectiveness of using this firewall to increase security

Benefits

  • Monitors traffic into and out of the network to make sure that all data passing is safe.

  • Checks whether the data passing through it meets a given set of rules if they do not then the data is blocked

  • Can block the unwanted traffic in and out of the network

  • It can log all incoming and outgoing traffic to check later

  • Can block certain undesirable websites/IP addresses

  • Keeps a list of desirable IP addresses/websites

  • It can block IP addresses to stop hackers

Drawbacks

  • It cannot stop individuals on internal networks by-passing the firewall

  • It cannot stop employees hacking the computer from within the system

  • Users own devices can by-pass the firewall therefore meaning the

  • computer/network is in danger

  • It cannot stop hackers only devices that hackers are using

To gain full marks on the question at least one benefit and drawback are needed

Data stored in a computer needs to be protected. Describe what is meant by encryption.

  • This is the scrambling of data

  • Makes the data not understandable/meaningless

  • This system uses an encryption key to encrypt the data

  • This system uses an encryption/decryption key to decrypt the data

  • Protects sensitive data

There have been a number of incidents where laptop computers containing highly sensitive data have been left on trains. Manufacturers are now developing new ways of protecting laptop computers and their data. Discuss the effectiveness of different methods which could be used to protect the data.

Portable devices and cloud

  • Storing the data on a portable hard/SSD/Pen drive/cloud means that the device is with you at all times and not with the laptop computer

  • No data is stored on the laptop computer if a portable SSD/HDD/pen drive/cloud is used so if the laptop computer is stolen nothing is lost

  • If the pendrive is lost then all your data is lost

  • The access to the cloud can be password protected

  • If the laptop gets stolen the data will be safe on the cloud

Passwords and encryption

  • The data on the computer can be encrypted to increase security

  • Data can use strong passwords making it more secure

  • Passwords to the data can be forgotten and lost especially if the laptop password needs to be remembered

  • Security methods prevent users who do not know password from gaining access

  • Passwords could be difficult to remember which could lock the device

Physical security

  • Use of a dongle to log onto the laptop ensures that only the person with the

  • device gains access

  • Devices like pendrives/dongles tend to be small and can easily be lost/stolen

  • If the dongle is stolen/lost then access to the laptop is difficult

  • Security software may malfunction rendering the laptop impossible to access

Biometrics

  • Biometrics can be used to access the laptop/data this means that the user

  • needs to be present

  • Difficult to fake/replicate biometrics

  • Biometric data cannot be reset once compromised

  • Biometrics are unique therefore it is an added security method

robot