Hamish needs his computer to be secure from unauthorised access to his laptop - OCR - GCSE Computer Science - Question 3 - 2019 - Paper 1
Question 3
Hamish needs his computer to be secure from unauthorised access to his laptop.
(i) Describe the problems that can arise from unauthorised access to his laptop and c... show full transcript
Worked Solution & Example Answer:Hamish needs his computer to be secure from unauthorised access to his laptop - OCR - GCSE Computer Science - Question 3 - 2019 - Paper 1
Step 1
Describe the problems that can arise from unauthorised access to his laptop and confidential documents.
96%
114 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Data Theft: Sensitive or confidential documents could be stolen, leading to the exposure of personal or business information.
Data Manipulation: An intruder could alter or delete files, affecting the integrity of the data.
Malware Installation: Hackers could install malicious software, compromising the security of the system and potentially affecting other connected devices.
Step 2
Describe two ways Hamish can help prevent unauthorised access to his laptop.
99%
104 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Strong Passwords: Hamish should use strong, unique passwords for his laptop and accounts, making it difficult for unauthorized users to gain access.
Encryption: By encrypting sensitive files, even if an intruder gains access to the laptop, they would not be able to read the contents of the encrypted documents without the decryption key.
Step 3
Explain how encryption helps to protect Hamish's documents.
96%
101 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Encryption enhances data security by converting readable information into coded texts that can only be accessed by authorized personnel with the appropriate decryption key. This means that even if unauthorized parties access the documents, they will be unable to interpret the data without the key.
Step 4
Complete the pseudocode algorithm to perform a Caesar cipher.
98%
120 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!