IT Security & Data Integrity Guide
IT Security & Data Integrity Guide
A computer program makes use of data validation routines and verification of data input.
(a) Complete these two sentences about data validation and verification.
2. ................................................. checks that the data entered is the same as the original. One
example is .................................................... . [4]
(b) The program is installed on a computer system that has security measures in place to protect its
data.
Question 2
(d) The company needs to keep the data on its servers secure from online threats.
(i) Describe how a firewall will help to protect the data on the servers from online threats.
..................................................................................................................................................................
..................................................................................................................................................................
..................................................................................................................................................................
..............................................................................................................................................................[2]
388
Papers dock
(ii) Give one additional security measure that the company can use to protect the data on the
servers from online threats.
................................................................................................................................................. [1]
Question 3
(a) He wants to make sure the source code is secure on his laptop. Explain how encrypting the
source code can keep it secure.
..................................................................................................................................................................
..................................................................................................................................................................
..................................................................................................................................................................
..................................................................................................................................................................
..................................................................................................................................................................
............................................................................................................................................................. [3]
Question 4
(b) The software development company uses data backup and disk-mirroring to keep their data
secure. Explain how data backup and disk-mirroring allow the company to recover from data loss.
Disk-mirroring .........................................................................................................................................
..................................................................................................................................................................
..................................................................................................................................................................
..............................................................................................................................................................[4]
Question 5
Frankie is a software developer. He is developing a program to manage customer records for a client
with an online retail business. He must ensure that data stored about each customer are both secure
and private.
389
Papers dock
(a) State the difference between security and privacy.
..................................................................................................................................................................
..................................................................................................................................................................
..................................................................................................................................................................
............................................................................................................................................................ [2]
(b) Computer systems can be protected by physical methods such as locks. Describe two non-
physical methods used to improve the security of computer systems.
1 .............................................................................................................................................................
..................................................................................................................................................................
..................................................................................................................................................................
..................................................................................................................................................................
..................................................................................................................................................................
..................................................................................................................................................................
2 .............................................................................................................................................................
..................................................................................................................................................................
..................................................................................................................................................................
..................................................................................................................................................................
..................................................................................................................................................................
............................................................................................................................................................. [6]
(i) Describe how a parity block check can identify a bit that has been corrupted during transmission.
..................................................................................................................................................................
..................................................................................................................................................................
..................................................................................................................................................................
..................................................................................................................................................................
390
Papers dock
..................................................................................................................................................................
..................................................................................................................................................................
.................................................................................................................................................................
........................................................................................................................................................... [4]
(ii) Give a situation where a parity block check cannot identify corrupted bits.
.............................................................................................................................................................
......................................................................................................................................................... [1]
Question 6
ii) The supermarket is concerned about the security and integrity of the data on the server. Identify
two methods that can be used to minimise the security risk to the data, and one method to protect
the integrity of the data.
Security 1 ..........................................................................................................................................
...........................................................................................................................................................
Security 2 ..........................................................................................................................................
...........................................................................................................................................................
Integrity ...........................................................................................................................................
.................................................................................................................................................... [3
Question 7
391
Papers dock
(c) The data received can contain errors that are not detected using parity bits.
(d) Parity is not the only method to verify the data has been sent correctly. Name and describe one
other method of data verification during data transfer.
Name .....................................................................................................................................................
Description .............................................................................................................................................
..................................................................................................................................................................
..................................................................................................................................................................
..................................................................................................................................................................
392
Papers dock
...............................................................................................................................................................
............................................................................................................................................................ [3
Answer 8
393
Papers dock
Question 9
394
Papers dock
Question 10
(a) (i) Describe how the data logger calculates the parity bit for each of the bytes in the data block.
..................................................................................................................................................................
.................................................................................................................................................................
.............................................................................................................................................................[2]
A = ..............................
B = .............................. [1]
(iii) Describe how the computer uses the parity byte to perform a further check on the received data
bytes. ......................................................................................................................................................
...............................................................................................................................................................
...........................................................................................................................................................[2]
395
Papers dock
(ii) Explain how you arrived at your answers for part (b)(i).
..................................................................................................................................................................
..................................................................................................................................................................
..................................................................................................................................................................
..............................................................................................................................................................[3]
Question 11
A Local Area Network is used by staff in a hospital to access data stored in a Database Management
System (DBMS). (a) Name two security measures to protect computer systems.
1 ............................................................................................................................................................
2 ........................................................................................................................................................ [2]
(b) A frequent task for staff is to key in new patient data from a paper document. The document
includes the patient’s personal ID number. (i) The Patient ID is a seven digit number. The database
designer decides to use a check digit to verify each foreign key value that a user keys in for a Patient
ID. When a user assigns a primary key value to a Patient ID, the DBMS adds a modulus-11 check
digit as an eighth digit. The DBMS uses the weightings 6, 5, 4, 3, 2 and 1 for calculating the check
digit. It uses 6 as the multiplier for the most significant (leftmost) digit.
Show the calculation of the check digit for the Patient ID with the first six digits 786531.
396
Papers dock
Complete Patient ID ..........................................................................................................................[4]
(ii) Name and describe two validation checks that the DBMS could carry out on each primary key
value that a user keys in for a Patient ID.
Description .............................................................................................................................................
.................................................................................................................................................................
Description ...........................................................................................................................................
............................................................................................................................................................ [4]
Question 12
A Local Area Network is used by school staff who access data stored in a Database Management
System (DBMS).
(a) (i) Explain the difference between security and privacy of data.
..................................................................................................................................................................
..................................................................................................................................................................
..................................................................................................................................................................
..................................................................................................................................................................
..................................................................................................................................................................
............................................................................................................................................................. [3]
(ii) Give an example for this application where privacy of data is a key concern.
................................................................................................................................................................
............................................................................................................................................................[1]
(b) Name and describe two security measures the Network Manager has in place to protect the
security of the data held in the DBMS.
1 ..............................................................................................................................................................
..................................................................................................................................................................
..................................................................................................................................................................
..................................................................................................................................................................
397
Papers dock
2 ..............................................................................................................................................................
..................................................................................................................................................................
..................................................................................................................................................................
............................................................................................................................................................. [4]
(c) A task for staff at the start of the school year is to key in new pupil data from a paper document.
The data is entered to a screen form and includes the data verification of some fields.
Question 13
A school stores a large amount of data that includes student attendance, qualification and contact
details. The school is setting up a relational database to store these data.
398
Papers dock
Describe three factors to consider when planning a backup procedure for the data.
1 ..............................................................................................................................................................
..................................................................................................................................................................
..................................................................................................................................................................
2................................................................................................................................................................
..................................................................................................................................................................
..................................................................................................................................................................
3................................................................................................................................................................
..................................................................................................................................................................
...............................................................................................................................................................6]
Question 14
A bank holds personal data about its customers and their financial data.
..................................................................................................................................................................
..................................................................................................................................................................
..................................................................................................................................................................
..................................................................................................................................................................
..................................................................................................................................................................
..................................................................................................................................................................
.................................................................................................................................................................
............................................................................................................................................................[4]
(b) Describe three security measures that the bank could implement to protect its electronic data.
Description ............................................................................................................................................
.................................................................................................................................................................
................................................................................................................................................................
Description .............................................................................................................................................
399
Papers dock
................................................................................................................................................................
...............................................................................................................................................................
Description ..............................................................................................................................................
................................................................................................................................................................
...........................................................................................................................................................[6]
Question 15
(c) Employees using the new computers receive training. At the end of the training, each employee
completes a series of questions.
..................................................................................................................................................................
..................................................................................................................................................................
..................................................................................................................................................................
…………………….......................................................................................................................................[2]
(ii) “Data validation is used to make sure that data keyed in are the same as the original data
supplied.”
..................................................................................................................................................................
..................................................................................................................................................................
..................................................................................................................................................................
.............................................................................................................................................................[2]
(iii) “The use of passwords will always prevent unauthorised access to the data stored on the
computers”
..................................................................................................................................................................
..................................................................................................................................................................
..................................................................................................................................................................
............................................................................................................................................................[2]
400
Papers dock
Question 16
(a) Give the definition of the terms firewall and authentication. Explain how they can help with the
security of data.
Firewall ....................................................................................................................................................
..................................................................................................................................................................
..................................................................................................................................................................
..................................................................................................................................................................
..................................................................................................................................................................
..................................................................................................................................................................
Authentication ........................................................................................................................................
..................................................................................................................................................................
..................................................................................................................................................................
............................................................................................................................................................. [3]
(b) Describe two differences between data integrity and data security.
..................................................................................................................................................................
..................................................................................................................................................................
..................................................................................................................................................................
..................................................................................................................................................................
..................................................................................................................................................................
............................................................................................................................................................. [2]
(c) Data integrity is required at the input stage and also during transfer of the data.
(i) State two ways of maintaining data integrity at the input stage. Use examples to help explain
your answer.
..................................................................................................................................................................
..................................................................................................................................................................
..................................................................................................................................................................
..................................................................................................................................................................
..................................................................................................................................................................
............................................................................................................................................................ [3]
401
Papers dock
(ii) State two ways of maintaining data integrity during data transmission. Use examples to help
explain your answer.
..................................................................................................................................................................
..................................................................................................................................................................
..................................................................................................................................................................
..................................................................................................................................................................
..................................................................................................................................................................
............................................................................................................................................................. [3]
Question 17
Validation ..............................................................................................................................................
.................................................................................................................................................................
.................................................................................................................................................................
Verification .............................................................................................................................................
.................................................................................................................................................................
.............................................................................................................................................................[2]
(b) Data are to be transferred between two devices. Parity checks are carried out on the data.
Explain what is meant by a parity check. Give an example to illustrate your answer.
..................................................................................................................................................................
..................................................................................................................................................................
..................................................................................................................................................................
..................................................................................................................................................................
..................................................................................................................................................................
..................................................................................................................................................................
..................................................................................................................................................................
..................................................................................................................................................................
............................................................................................................................................................ [4]
402
Papers dock
Question 18
(a) Explain the term computer virus.
..................................................................................................................................................................
..................................................................................................................................................................
..................................................................................................................................................................
.............................................................................................................................................................[2]
.................................................................................................................................................................
2 ..............................................................................................................................................................
........................................................................................................................................................... [2]
Question 19
403
Papers dock
(i) There is one error in the transmission.
Indicate the byte number and bit number of the bit which has been incorrectly transmitted.
..................................................................................................................................................................
..................................................................................................................................................................
..................................................................................................................................................................
............................................................................................................................................................[2]
Describe what is meant by these terms. For each method, explain why it is needed.
Verification .............................................................................................................................................
..................................................................................................................................................................
..................................................................................................................................................................
..................................................................................................................................................................
Validation …………….................................................................................................................................
.................................................................................................................................................................
...............................................................................................................................................................
...........................................................................................................................................................[4]
404
Papers dock
Question 20
405
Papers dock
Question 21
406
Papers dock
Question 22
407
Papers dock
Question 23
408
Papers dock
Question 24
409
Papers dock
410
Papers dock
411