Data Security (Copy)
Cheat Sheet: A Level Computer Science – Data Security, Privacy, and System Protection
1. Key Terms: Security, Privacy, Integrity
| Term | Definition |
|---|---|
| Security | Protection of data and systems from unauthorized access, modification, or destruction |
| Privacy | Ensuring personal or sensitive information is not disclosed without consent |
| Integrity | Ensuring data is accurate, complete, and unaltered during storage or transmission |
2. Need for Data & System Security
- Prevent unauthorized access, theft, data loss, and misuse
- Protect systems from disruption or damage
- Ensure confidentiality, availability, and integrity (CIA triad)
3. Security Measures (Standalone PC to Networks)
| Measure | Description |
|---|---|
| User Accounts | Individual profiles with customized permissions |
| Passwords | Used to restrict access; should be strong and regularly updated |
| Authentication Techniques | |
| → Digital Signatures | Verify authenticity and integrity of data or sender |
| → Biometrics | Use of unique physical traits (fingerprint, retina) for access |
| Firewall | Monitors and filters incoming/outgoing traffic to prevent unauthorized access |
| Anti-Virus Software | Detects and removes malicious programs (viruses, worms) |
| Anti-Spyware | Identifies and removes software that secretly monitors user activity |
| Encryption | Converts data into unreadable form unless decrypted with a key |
4. Threats to Computer and Data Security
| Threat | Description |
|---|---|
| Malware | Malicious software including: |
| → Virus | Replicates and spreads, often corrupting data |
| → Spyware | Secretly gathers user information |
| Hackers | Gain unauthorized access to systems |
| Phishing | Fraudulent emails or messages to steal credentials |
| Pharming | Redirects users to fake websites to steal information |
5. Risk Mitigation Methods
| Method | Purpose |
|---|---|
| Use of Firewalls | Blocks unauthorized network access |
| Up-to-date Anti-virus/Anti-spyware | Protects from known threats |
| Email Filtering | Blocks phishing attempts and spam |
| User Education | Teaches safe internet usage practices |
| Regular Updates | Patches software vulnerabilities |
| Strong Password Policies | Prevents brute-force access attempts |
6. Data Protection Methods
| Method | Function |
|---|---|
| Encryption | Secures data by making it unreadable to unauthorized users |
| Access Rights (Permissions) | Controls who can read, write, or execute files/folders |
| Backups | Protects against data loss by maintaining copies of data |
