AR

Security review

Question 1
A computer program makes use of data validation routines and verification of data input.
(a) Complete these two sentences about data validation and verification.
1. ................................................. checks that the data entered is reasonable. One example is
.................................................... .
2. ................................................. checks that the data entered is the same as the original. One
example is .................................................... . [4]
(b) The program is installed on a computer system that has security measures in place to protect its
data.
Question 2
(d) The company needs to keep the data on its servers secure from online threats.
(i) Describe how a firewall will help to protect the data on the servers from online threats.
..................................................................................................................................................................
..................................................................................................................................................................
..................................................................................................................................................................
..............................................................................................................................................................[2]

Papers dock
389
(ii) Give one additional security measure that the company can use to protect the data on the
servers from online threats.
................................................................................................................................................. [1]
Question 3
(a) He wants to make sure the source code is secure on his laptop. Explain how encrypting the
source code can keep it secure.
..................................................................................................................................................................
..................................................................................................................................................................
..................................................................................................................................................................
..................................................................................................................................................................
..................................................................................................................................................................
............................................................................................................................................................. [3]
Question 4
(b) The software development company uses data backup and disk-mirroring to keep their data
secure. Explain how data backup and disk-mirroring allow the company to recover from data loss.
Data backup ............................................................................................................................................
..................................................................................................................................................................
..................................................................................................................................................................
..................................................................................................................................................................
Disk-mirroring .........................................................................................................................................
..................................................................................................................................................................
..................................................................................................................................................................
..............................................................................................................................................................[4]
Question 5
Frankie is a software developer. He is developing a program to manage customer records for a client
with an online retail business. He must ensure that data stored about each customer are both secure
and private.

Papers dock
390
(a) State the difference between security and privacy.
..................................................................................................................................................................
..................................................................................................................................................................
..................................................................................................................................................................
............................................................................................................................................................ [2]
(b) Computer systems can be protected by physical methods such as locks. Describe two non-
physical methods used to improve the security of computer systems.
1 .............................................................................................................................................................
..................................................................................................................................................................
..................................................................................................................................................................
..................................................................................................................................................................
..................................................................................................................................................................
..................................................................................................................................................................
2 .............................................................................................................................................................
..................................................................................................................................................................
..................................................................................................................................................................
..................................................................................................................................................................
..................................................................................................................................................................
............................................................................................................................................................. [6]
(i) Describe how a parity block check can identify a bit that has been corrupted during transmission.
..................................................................................................................................................................
..................................................................................................................................................................
..................................................................................................................................................................
..................................................................................................................................................................

Papers dock
391
..................................................................................................................................................................
..................................................................................................................................................................
.................................................................................................................................................................
........................................................................................................................................................... [4]
(ii) Give a situation where a parity block check cannot identify corrupted bits.
.............................................................................................................................................................
......................................................................................................................................................... [1]
Question 6
ii) The supermarket is concerned about the security and integrity of the data on the server. Identify
two methods that can be used to minimise the security risk to the data, and one method to protect
the integrity of the data.
Security 1 ..........................................................................................................................................
...........................................................................................................................................................
Security 2 ..........................................................................................................................................
...........................................................................................................................................................
Integrity ...........................................................................................................................................
.................................................................................................................................................... [3