Skip to content

Security

6.1 Data Security

Candidates should be able to:

  1. Explain the difference between the terms security, privacy and integrity of data
  2. Show appreciation of the need for both the security of data and the security of the computer system
  3. Describe security measures designed to protect computer systems, ranging from the stand-alone PC to a network of computers

Notes and guidance

Including user accounts, passwords, authentication techniques such as digital signatures and biometrics, firewall, anti-virus software, anti-spyware, encryption

  1. Show understanding of the threats to computer and data security posed by networks and the internet

Notes and guidance

Including malware (virus, spyware), hackers, phishing, pharming

  1. Describe methods that can be used to restrict the risks posed by threats
  2. Describe security methods designed to protect the security of data

Notes and guidance

Including encryption, access rights

6.2 Data Integrity

Candidates should be able to:

  1. Describe how data validation and data verification help protect the integrity of data
  2. Describe and use methods of data validation

Notes and guidance

Including range check, format check, length check, presence check, existence check, limit check, check digit

  1. Describe and use methods of data verification during data entry and data transfer

Notes and guidance

During data entry including visual check, double entry During data transfer including parity check (byte and block), checksum