WB Chapter 5 The Internet and Cyber Security-Answers
WB Chapter 5 The Internet and Cyber Security-Answers
WB Chapter 5 The Internet and Cyber Security-Answers
b i https
ii www
iii .com
iv comp_science_sample
c Three from:
• They have a home page.
• They can store a user’s favourite websites/web pages (used as a bookmark).
• They keep a history of websites visited by the user (user history).
• They have the ability to allow the user to navigate forwards and backwards through
websites/web pages already opened; many webpages can be open at the same time
(navigation).
• They make use of hyperlinks that allow navigation between websites and web pages;
links are shown in one of two ways:
• either the website is underlined and requires <ctrl> + <click> to follow the link
• or a small pointed finger shows under the name of the website link to highlight it
• They make use of cookies.
• Data is stored as a cache.
• They translate HTML and display the result of the translation on the user’s device.
• They make use of JavaScript.
• They use an address bar.
2 order: 2, 4, 5, 1, 6, 3
Page 1 of 7
.
Cambridge IGCSE O Level Computer Science answers
New hash values are only generated when data in a block is altered
b In any order:
• data (for example, name of sender/recipient)
• hash value (a unique ‘fingerprint’)
• previous hash value (pointing back to previous block in the chain)
c i 0000 A4BF 6AB1 34EE FF12 AA00
ii Any changes to block '4' will cause the hash value (FF12) to be changed. This means
that blocks '5' and '6' and beyond will now be invalid because the chain was broken
between '4' and '5' (previous hash value FF12 is no longer valid).
d • Cryptocurrency uses cryptography to track transactions.
• Digital currency uses a central banking system; whereas cryptocurrency is
decentralised.
• Cryptocurrency uses block chaining.
• Cryptocurrency transactions are publicly available and therefore all transactions can be
tracked.
Page 2 of 7
.
Cambridge IGCSE O Level Computer Science answers
Page 3 of 7
.
Cambridge IGCSE O Level Computer Science answers
b i This occurs when a cybercriminal creates a social situation that can lead to a potential
victim ‘dropping their guard’. It involves manipulation of people into breaking their
normal security protocols by:
• instant messaging
• scareware
• email/phishing scams
• baiting
• bogus phone calls
Page 4 of 7
.
Cambridge IGCSE O Level Computer Science answers
7 a i It is software that detects and removes spyware programs installed illegally on a user’s
computer system.
ii Three from:
• It detects and removes spyware already installed on a device.
• It prevents a user from downloading spyware.
• It encrypts files to make the data more secure in case it is ‘spied’ on.
• It encrypts keyboard strokes to help remove the risk posed by the keylogging
aspects of some spyware.
• It blocks access to a user’s webcam and microphone (the software stops the
spyware from taking over the control of a user’s webcam and microphone which
can be used to collect information without the user’s knowledge).
• It scans for signs that the user’s personal information has been stolen and warns
the user if this has happened.
b Biometric
Benefits Drawbacks
technique
Fingerprint • is one of the most • is very intrusive for some people
or developed biometric because it is still related to criminal
thumbprint techniques identification
scans
• has high accuracy • can make mistakes if the skin is dirty or
• is very easy to use damaged (e.g. cuts)
Page 5 of 7
.
Cambridge IGCSE O Level Computer Science answers
8 a order: 4, 5, 2, 6, 3, 1
b They contain ‘patches’ that contain software improvements, for example, removing
glitches or adding new features; updates may contain security fixes, such as improved anti-
malware routines.
9 Four from:
• email address gives clues, for example, no company will use an email such as
‘…@gmail.com’
• email address should contain the company name
• tone of email is a clear indication of a scam
• not only spelling mistakes, but the language used and the way the target victim is
addressed, for example ‘Dear User’
• mis-spelling in a subtle way (i.e. typo squatting)
• suspicious links; the destination address should match the rest of the email
• some links (such as, How To Contact Us) don’t work
• look at the domain; for example, large companies would use .com rather than .co or .org
10 a a type of protocol that:
• allows data to be sent and received securely over a network
• encrypts data
• is active when the connection protocol is https or if there is a small green padlock by
the website address
b order: 2, 4, 1, 5, 3
c Three from:
• online banking and financial transactions
• online shopping/commerce
• when sending out software to a restricted list of users
• sending/receiving emails
• using cloud storage facilities
• using VoIP
• when using instant messaging
• when using social networking sites
11 a • They can filter information in and out of a computer.
• They are the primary defence of any computer system to prevent it from hacking,
malware, phishing and pharming.
• They can be hardware or software.
Page 6 of 7
.
Cambridge IGCSE O Level Computer Science answers
b Four from:
• It is used to examine the ‘traffic’ between a user’s computer (or internal network) and a
public network (for example, the internet).
• It checks whether incoming or outgoing data meets a given set of criteria, and if the
data fails the criteria, the firewall will block the ‘traffic’ and give the user (or network
manager) a warning that there may be a security issue.
• The firewall can be used to log all incoming and outgoing ‘traffic’ to allow later
interrogation by the user (or network manager).
• Criteria can be set so that the firewall prevents access to certain undesirable sites; the
firewall can keep a list of all undesirable IP addresses.
• Alternatively, the firewall can be set to only allow access to known and trusted IP
addresses.
• It is therefore possible for firewalls to help prevent viruses or hackers from entering the
user’s computer (or internal network).
• The user is warned if some software on their system is trying to access an external data
source (for example, automatic software upgrade); the user is given the option of
allowing it to go ahead or request that such access is denied.
Page 7 of 7