9618 Computer Science
AS Content
Chpater 1 Information representation
1.1 Data representation
1.2 Multimedia
1.3 Compression
Chapter 2 Communication
2.1 Networking
2.2 The internet
Chpater 3 Hardware
3.1 Computers and their components
3.2 Logic Gates and Logic Circuits
Chapter 4 Processor Fundamentals
4.1 Central Processing Unit (CPU) Architecture
4.2 Assembly Language
4.3 Bit manipulation
Chapter 5 System Software
5.1 Operating Systems
5.2 Language Translators
Chapter 6 Security, privacy and data integrity
6.1 Data Security
6.2 Data Integrity
Chpater 7 Ethics and Ownership
7.1 Ethics and Ownership
Chapter 8 Databases
8.1 Database Concepts
8.2 Database Management Systems (DBMS)
8.3 Data Definition Language (DDL) and Data Manipulation Language (DML)
Chapter 9 Algorithm Design and Problem-solving
9.1 Computational Thinking Skills
9.2 Algorithms
Chapter 10 Data Types and Records
10.1 Data Types and Records
10.2 Arrays
10.3 Files
10.4 Introduction to Abstract Data Types (ADT)
Chapter 11 Programming
11.1 Programming Basics
11.2 Constructs
11.3 Structured Programming
Chapter 12 Software Development
12.1 Program Development Life cycle
12.2 Program Design
12.3 Program Testing and Maintenance
A2 Content
Chapter 13 Data Representation
13.1 User-defined data types
13.2 File organisation and access
13.3 Floating-point numbers, representation and manipulation
Chpater 14 Communication and internet technologies
14.1 Protocols
14.2 Circuit switching, packet switching
Chpater 15 Hardware
15.1 Processors, Parallel Processing and Virtual Machines
15.2 Boolean Algebra and Logic Circuits
Chapter 16 Operating System
16.1 Purposes of an Operating System (OS)
16.2 Translation Software
Chpater 17 Security
17.1 Encryption, Encryption Protocols and Digital certificates
Chpater 18 Artificial intelligence (AI)
18.1 Artificial Intelligence (AI)
Chapter 19 Computational thinking and problem solving
19.1 Algorithms
19.2 Recursion
Chapter 20 Further programming
20.1 Programming Paradigms
20.2 File Processing and Exception Handling
Mr. Theo
-
+
首页
6.1 Data Security
# Data Privacy - privacy prevents unauthorised access ## Why need to protect both data and system - Data needs protecting from someone amending / deleting or taking it - Computer system need protecting to stop people for example, installing malware or damaging the system # Data Security - Security prevents against loss ## Security measures designed to protect computer systems #### User accounts #### Passwords ### Authentication techniques #### Digital signatures ##### Explain how a digital signature is used to authenticate a digital document during transmission over a network. - The sender hashes the document to produce a digest - The sender encrypts the digest to create the digital signature - The message and the signature are sent to the receiver - The receiver decrypts the signature to reproduce the digest - The receiver uses the same hashing algorithm on the document received to produce a second digest - The receiver compares this digest with the one from the digital signature - If both of the receiver's digests are the same the document is authentic ##### How a digital signature ensures the email is authentic - message put through hashing algorithm to produce a digest - Digest encrypted with sender's private key to create the digital signature - the digital signature can only be decrypted with matching sender's public key #### Biometrics #### Firewall - monitors incoming and outgoing packets / traffic - checks against an allow list / deny list of IP addresses - blocks transmissions that do not meet criteria. #### Anti-virus software - scans the computer for viruses and checks against a stored database of viruses, that needs to be updated regularly and then deletes / quarantines them - compares downloaded files to a database of known viruses and prevents the download continuing #### Anti-spyware - scans the computer for spyware and checks against a stored database of viruses, that needs to be updated regularly and then deletes / quarantines them - compares downloaded files to a database of known spyware and prevents the download continuing. #### Anti-malware - scans the computer for viruses and checks against a stored database of viruses, that needs to be updated regularly and then deletes / quarantines them - compares downloaded files to a database of known viruses and prevents the download continuing #### Encryption ## Security methods designed to protect the security of data ### Encryption - Data is turned into cipher text // Data is encoded - Used so that it cannot be understood if intercepted without the decryption key ## Threats to computer and data security posed by networks and the internet ### Malware - Malicious software that replicates and can delete/damage the examination papers - **Protect against threat:** install and run anti-malware ### Hacker/unauthorised access - Unauthorised access to the computer with malicious intent: delete/damage the examination papers - **Protect against threat:** Use a firewall // strong passwords ### Spyware - Records keystrokes and sends the data gathered about the examination papers to a third party - Software installed on the computer without the teacher's knowledge - Malicious software - Run in the background - **Protect against threat:** Use a firewall / install and run anti-spyware / use a virtual (onscreen) keyboard ### Virus - Damage computer data - Replicates itself - Software installed on the computer without the person's knowledge - Malicious software - Run in the background - **Protect against threat:** Anti-virus / Firewall / Anti-malware ### Pharming - redirects a user to a false website - Malicious code installed on a user's hard drive - this code redirects the user to a fake website without their knowledge - This is done to obtain personal or financial data ### Phishing: - Creator of code sends out a legitimate looking email in the hope of gathering personal and financial information from the recipient. - It requires the user to click on the link in the email or attachment.
Theo
2025年5月30日 13:26
转发文档
收藏文档
上一篇
下一篇
手机扫码
复制链接
手机扫一扫转发分享
复制链接
Markdown文件
Word文件
PDF文档
PDF文档(打印)
分享
链接
类型
密码
更新密码
有效期