0% found this document useful (1 vote)
474 views9 pages

Information Technology: Howard Campbell

Uploaded by

Nicholas Charles
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (1 vote)
474 views9 pages

Information Technology: Howard Campbell

Uploaded by

Nicholas Charles
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 9

Information

Technology
for CSEC® Examinations 2nd Edition

Howard Campbell

CSEC® is a registered trade mark of the Caribbean Examination Council (CXC).


INFORMATION TECHNOLOGY for CSEC® EXAMINATIONS SECOND EDITION is an
independent publication and has not been authorized, sponsored, or otherwise approved
by CXC.
Macmillan Education The author and publishers would like to thank the following for
4 Crinan Street, London, N1 9XW permission to reproduce their photographs:
A division of Macmillan Publishers Limited
Alamy/Art Directors & TRIP p41(b), Alamy/Pashkov Andrey
Companies and representatives throughout the world. p22(br), Alamy/Art Directors & TRIP p23, Alamy/Ted Foxx
p39(a), Alamy/David Hancock p115(tcl), Alamy/Jiri Hera p8,
www.macmillan-caribbean.com Alamy/ D. Hurst p116(cl), Alamy/Brian Jackson p116(cr), Alamy/
Konstantin Iliev p49(l), Alamy/ Image Source p116(tl), Alamy/
ISBN
ISBN:978-0-230-48336-1
978-0-230-42694-8AER
AER Indigo Photo Agency p31(brc), Alamy/Christopher King p27(i),
Alamy/ Christopher King p17, Alamy/Marek Kosmal p31(blc),
Text © Howard Campbell 2014 Alamy/ Ilene MacDonald p115(tl), Alamy/ Oleksiy Maksymenko
Design and illustration © Macmillan Publishers Limited 2014 p38, Alamy/Nenov Brothers Photography p50(bc), Alamy/
The author has asserted his rights to be identified as the author of Niels Poulsen p39(c), Alamy/NUAGE p50(a), Alamy/Guy Primo
this work in accordance with the Copyright, Design and Patents p115(bc), Alamy/Jeremy Sutton-Hibbert p115(tcr), Alamy/
Act 1988. Aleksandr Ugorenkov p31(bll), Alamy/Finnbarr Webster p22(bl),
Alamy/Westend61 GmbH p27(iv), Alamy/Shaun Wilkinson
First published 2010 p49(r), Alamy/ ZUMA Press, Inc. p37(bl); Art Directors/Helene
This edition published 2014 Rogers p129(bl); Howard Campbell p30(a); Corbis/Chris
Collins p3(desktop), Corbis/ JLP/Jose L. Pelaez p232(c), Corbis/
All rights reserved; no part of this publication may be reproduced, Ocean p46(fig1), Corbis/Edward Rozzo p37(cl), Corbis/ Gonçalo
stored in a retrieval system, transmitted in any form, or by any Silva/Demotix p41(c), Corbis/ Wavebreak Media LTD p35;
means, electronic, mechanical, photocopying, recording, or Getty Images pp86, 232(b), Getty/AtomA p3(phone), Getty/
otherwise, without the prior written permission of the publishers. Pawea Bartkowski p32(tl), Getty/Michael Bodmann p20, Getty/
Keith Brofsky p116(c), Getty/Peter Dazeley pp34(blt), Getty/
Typeset by E Clicks Enterprise, Malaysia Felbert+Eickenberg/STOCK4B p115(br), Getty/Maciej Frolow
Designed by Macmillan Education p3(tablet), Getty/Halfdark p33(bl), Getty/Jetta Productions
Illustrated by TechType p33(tl), Getty/Howard Kingsnorth p3(laptop), Getty/Stephen
Cover design by Clare Webber Krow p27(ii), Getty/Ryan McVay p31(bl), Getty/Edgaras Marozas
Cover image by Corbis/JGI/Jamie Grill/Blend Images and pp32(b), 46(fig 2), Getty/Marek Mnich p31(lc), Getty/Greg
Devon Shaw Nicholas p39(b), Getty/Neustockimages p130(tl), Getty/nullplus
Picture research by Catherine Dunn p34(blb), Getty/Oktaydegirmenci p33(b), Getty/George Pchemyan
p27(iii), Getty/Chris Pritchard p95, Getty/Rouzes p39(t), Getty/
The author and publishers would like to thank the following Baris Simsek p48, Getty/Thinkstock Images p115(tr), Getty/Tsuji
consultants and education professionals for their contribution to p31(br); Macmillan Education pp36(t), p115 (bl); NPG- a
this edition: division of Macmillan Publishers Ltd p58(cr); Science Photo
Consultants: Keith Burkette (St. Mary’s College, Trinidad and Library p51, Science Photo Library/CHASSENET p37(blt),
Tobago), Gareth Byrne (UK) and Alan Wood (UK) Science Photo Library/DAVID PARKER p129, Science Photo
Teachers: Jamaica: Huntley Anderson, Shawnette Dewar, Kesha Library/MARTIN RIEDL p232(a); Superstock/Corbis p36(bl),
Fraser, Meleseia Hawthorne, Janice Jones, Haidie Morant, Aggrie SuperStock/Cusp pp33(a), 46(fig3), 128(tl); Thinkstock p108;
Osbourne; St. Vincent: Sherricea Burgin, Soyini Clarke-Palmer, Theyummytruth.com – a great combination of eye-grabbing
Sheddie Conliff, Veneisha Daniel, Suzanna Leigertwood Ollivierre, imagery and easy-to-navigate functionality p58(cl).
Michael Scott
Special thanks to Channyatt Bullock-Ramsamooj, Ministry of These materials may contain links for third party websites. We
Education, St. Vincent and the Grenadines, for facilitating a team have no control over, and are not responsible for, the contents of
review. such third party websites. Please use care when accessing them.
Contents
Page Finder v

About this book vi

Part 1: Theory 8 Data security 107


Introduction to data security 107
1 The computer system 2
Common vulnerabilities and threats 109
What is a computer? 3
Data misuse 111
Categories of computer systems 4
Protecting your computer system 114
Components of a typical computer system 6
Operational procedures 118
Interpreting computer specifications 8
2 Primary and secondary storage 13 9 The impact of ICT on jobs, skills and careers 124
How do primary and secondary storage differ? 14 The impact of Information Technology on jobs 124
How is storage capacity measured? 14 Computer-related professions 125
Types of primary storage devices 16 Career opportunities for hardware support
Secondary storage media 18  professionals 125

Comparing secondary storage media 23 Career opportunities related to the Internet 127
Career opportunities in IT-related industries 127
3 Input and output devices 28
Computer applications in business and industry 127
Data collection basics 29
Computer-aided design 128
Input, input devices and input media 29
Computers in science and technology 129
Input devices in the home 31
Computers in education 130
Input devices in the retail trade 32
Computer applications in recreation and
Output devices 37
entertainment 131
4 The Internet and communications technology 47
Telework – telecommuting and telemarketing 131
Data communication and networks 48
The World Wide Web (WWW) 55
Part 2: Problem-solving and
Communicating globally using network-based tools 57
programming
5 Data storage and manipulation 62
Number systems 63 10 Problem-solving and program design 135

Binary addition 67 Introduction to problem-solving 136

Binary subtraction 69 BVI Boat Hire 137

Representing integers 69 Problem partitioning (Creating an I-P-O chart) 137

Storing text data 73 Constants and variables 138


Data types 140
6 System programs and application programs 77
The concept of an algorithm 140
The difference between system programs and
  applications programs 78 Ways of representing algorithms 141
System software 78 Developing algorithms to solve simple problems 145
Functions of an operating system 79 11 Program implementation 168
Processing modes 83 Generations of programming languages 169
Application programs 84 Levels of programming languages 170
7 Information processing 91 Implementing a program: The five steps 171
Data, information and information processing 92 Writing programs in Pascal 173
Data: Sources, verification and validation 95 Testing and debugging techniques 183
File organisation and access 100 Arrays 185

iii
Part 3: Productivity tools 16 Mastering database management 292
Introduction to databases 293
12 Mastering word processing 195
Creating and populating a database 295
Introduction to word processing 196
17 Information integration 336
Creating a document 199
Using data from Microsoft Access in Microsoft Excel 336
Columns and tables 203
Using data from Microsoft Excel in Microsoft
Working with graphics 206
 PowerPoint 338
Document editing 208
Perform a mail merge using an external data source 338
Formatting 216
13 Mastering presentations 231 The School-Based Assessment
Presentations 232
18 Mastering the School-Based Assessment 345
Creating a presentation 235
Requirements of the School-Based Assessment 345
14 Mastering web page design 243
Mark allocation 346
Introduction to web page design 244
Some tips to help you master the SBA 346
Creating simple web pages 244
Practice your way to a high SBA score 346
Creating and hosting your own website 248
Key skills and mark allocation 353
15 Mastering spreadsheets 250
Introduction to spreadsheets 251 Answers to multiple-choice questions 356
Features of spreadsheets 252
Creating and setting up your workbook 254
Glossary 357

Data extraction 279 Index 363

iv
Page finder
This page finder gives you Syllabus sections
the page number for all

Section 6: Word processing,


Section 1: Fundamentals of

Section 4: Applications and

presentation and web page


Section 2: Problem-solving
the objectives from each
section in the new CSEC®

Section 7: Spreadsheets
hardware and software

Section 5: Information
Information Technology

and program design

Section 8: Database
Section 3: Program

implications of ICT
syllabus at your fingertips.

implementation

management
processing

design
Objective 1  3 137 170  48  92 196 251 293
Objective 2  6 138 169  53  93 208 252 293
Objective 3 16 139 171  53  95 216 267 293
Objective 4 15 140 184 107  97 221 270 295
Objective 5 23 140 173 109  99 201 261 295
Objective 6 18 141 174 127 100 210 262 298
Objective 7 29 145 175 128 100 203 266 319
Objective 8 37 157 180 126 216 267 302
Objective 9 63 159 185 125 215 259 313
Objective 10 8 183 338 262 313
(within the syllabus sections)

Objective 11 78 172 213 274 321


Objective 12 80 201 279
Specific objectives

Objective 13 83 232 276


Objective 14 84 233 282
Objective 15 80 235 282
Objective 16 236
Objective 17 236
Objective 18 236
Objective 19 239
Objective 20 237
Objective 21 237
Objective 22 239
Objective 23 239
Objective 24 244
Objective 25 244
Objective 26 246
Objective 27 247
Objective 28 247

v
About this book
This book isn’t just words on a page.
This book contains a range of different features to introduce, teach and highlight key

11
information throughout the course. These pages explain how to use them. The larger column
contains the main text and diagrams; you can read straight down it without interruption.
The smaller column contains other useful facts, so make sure you use it to check your
understanding. You should remember to spend time studying The computer
the figures and diagrams as well as
the text.
system
A list of objectives at the beginning of
each chapter tells you what topics you will By the end of ✓ define what a computer is
this chapter
be covering. They will help you to plan By the end
✓ describe a general-purpose computer system
✓ define what a computer is
youof should
✓ identify the major components that make up a typical computer system
and measure your learning. this chapter
to: describe a general-purpose computer system
be able ✓
you should
✓ explain
✓ identify the the function
major components thatofmake
the central processing
up a typical unit
computer system
be able to:
explain
✓ explain the
✓ the
function function
of the central of memoryunit
processing
✓ explain the function of memory
✓ explain the function of storage
explain the function of storage
✓ explain the function of input and output devices
✓ ✓ the
explain function of input and output devices
✓ ✓ interpret
interpret thespecifi
the hardware hardware
cationsspecifi cations
of a computer of a computer system.
system.

4 • The Internet and communications technology

The concept maps represent knowledge Answers to ITQs ITQ1 (a) A telecommunications
Concept map
ITQ3 (a) Fibre optic; (b) fibre optic;
organisation visually to help you learn technology providing wireless data,
General-purpose (c) twisted pair.
more meaningfully and enhance your Computer Systems
voice and video over long distances; ITQ4 To download multimedia
(b) Digicel; (c) (i) facilitates more
knowledge integration. You can use them commercial activities as e-commerce
content such as music and movies.
include major components ITQ5 Any THREE of: (a) to
as tools to help connect prior knowledge perform major functions
facilities can be made available in
examples communicate using electronic data
with new information. places not served by wired telephone
interchange (b) to publish catalogues
processing input storage service or wired
output CPU: network; (ii) storage:
secondary provides input/output
control
for wholesalers and trade partners
opportunities CD-ROM
forunitthe development of devices
3 • Input and output devices ALU DVD (c) to share training programmes
more innovative products/services. hard disk (d) to provide team collaboration
ITQ2 (a) A hub is a passive flash drives
device, such as
environments.
IT portfolio general-purpose:
switch memory cards
is intelligent; (b) switch
desktops ITQ6 Any THREE of:.biz.com,.info.
forwards data packets between
1 In this activity you will explore printers. laptops primary memory: output devices: name,.net.org,.pro
input devices:
computers
notebooks on one network, ROM router printers keyboard
a Interview at least five persons andforwards find outdata
netbooks the make
packets and
RAM model ofmonitors
between the printer they use. For example, if you
mouse
smartphones PROM speakers microphone
interviewed me, I would tell you computer I use a Samsung
networks. ML-2165W).
multimedia projectors scanner
b Conduct research to get more details about each of the printers based on the make bar code and
readersmodel supplied.
c Copy the following table in your portfolio and complete it. Note that I have completed the first row based on
research done about my printer.
Make & Model Impact or Non-Impact Type Print Speed Print Resolution (dpi)
The expanded IT Portfolio now provides Samsung ML-2165W Non-Impact Laser 21 PPM 1200
more opportunities for you to extend IT portfolio
and reinforce the knowledge and skills 1 This activity will explore the concepts related to data communications and networking.
d Paste a picture of each of the printers.
introduced throughout the chapter. Most a Check out the computer lab at school (make sure to get permission from your teacher before you do so); ask the
2 In this activityquestions:
following you will explore input and output devices.
of the activities involve field or web-based a2 Visiti Are
thethe
webcomputers
site of an networked?
online computer store (www.cdw.com, www.provantage.com or www.newegg.com).
investigations. b Download
ii What types
at least TWO pictures
of cabling of EACH of the following devices.
are used?
i barcode
iii Is there reader
a server? iv optical mouse
iiiv electronic signature
Is the central capture
connecting device
device v wireless
a hub, switch keyboard
or router?
iiiv optical
Is theremark reader
Internet (OMR)
access?
cb Print
Record all the
yourimages
findingsandinpaste
your them into your portfolio, complete with a brief description (make, model, price
portfolio.
2 Inand
thiskey features).
activity you will explore concepts related to Wi-Fi and the Internet. Conduct research (read books, use search
dengines
Compare your
on the Webpictures with at least
and interview twoand
people) other people
record yourin your class.
findings Note
in your the similarities and differences.
portfolio:
a What is the name of the organisation that owns the Wi-Fi trademark?
A wide assortment of game-based and Instructions.indd 1
b When was the term ‘Wi-Fi’ first used commercially?
1/21/14 11:17 AM

real-world problems is presented for Group activities


c What wireless networking standard is used by Wi-Fi?
small groups to complete. You and d Describe
1 This the THREE
is a small-group mostforrecent
activity variations of the Wi-Fi standard. Ensure that you make mention of distance
3–4 people.
limitations.
your classmates can improve on ideas a Each group member should collect at least TWO source documents generated in each of the following scenarios:
e What does the logo look like? Have you ever seen the logo on a product or its packaging? Paste an image of the
as you share in finding solutions in an • a classroom environment
logo in your portfolio.
• a home
environment where the group evaluates its f Visit your local Internet café and find out if they offer VoIP telephone calls. What hardware and software
• a micro or small business (ask the Principles of Business teacher at your school what this is)
components are required?
own success. • a meeting of a sports team or co-curricular activity (Cadet, Key Club, etc.)
g Download Skype and make a VoIP telephone call. How does the cost and call quality compare with a call made
b Compare the documents collected from each area. Note their similarities and differences.
via a fixed line or mobile telephone?
c Classify all the documents as either human-readable or machine- readable.
d Suggest which device(s) are ideal for reading the documents categorised as machine-readable.
e Paste the documents in your portfolio and record your findings next to each of them.
2 Your local police station has just received a donation of a digital camera and US$800 to purchase a printer suitable for
printing crime-scene photos. The officer in charge of the station has sought your help to select a suitable printer. You
1 • The computer system
have to co-opt two of your classmates to undertake this task. You are required to:
This is the style of question you may a Assess the needs of the police station and make a list of the TWO types of printers that the group believe are
Examination-style questions TEST BANK
most suitable.
come across in your exam. Your teacher b For EACH type, identify TWO named printers available for sale at a local computer store or online retailer.
will suggest how you can use them, but Multiple-choice questions 7 The component that stores the program and data
Complete the table below. currently being executed is:
Instructions: Each of the following questions has four
they will measure what you have learnt Type 1 (A), (B), (C) or (D). Read Type 2 (A) arithmetic logic unit
suggested responses labelled
59
and help to identify any gaps in your each question carefully then1select the most
Printer Printersuitable
2 Printer 3 (B) floppy diskette
Printer 4
knowledge so you can revisit the relevant response.
Brand (C) main memory
1 Model
____________ is an area of a computer that temporarily (D) secondary storage
sections of the book. holds data that is waiting to be processed, stored, or
Resolution 8 Which of the rows in the following table does NOT
output.
Print speed contain the correct information?
(A) Memory
Memory capacity
(B) Storage Computer Hardware component
Price
(C) Input specification
c Based on your findings, make a recommendation to the officerI in2.4
(D) Output charge.
GHz Clock speed
2 Place a copy of the recommendation
The microprocessor’s ____________ unitin your each
fetches portfolio. II 2 GB DDR Memory speed and type
instruction. III 500 GB Hard drive capacity
44
vi (A) instruction
(B) integrated
IV 5,400 RPM Hard drive speed
(A) I and II
(C) circuit (B) II ONLY
(D) control (C) II and III
There are a wide variety
The first time an important new word appears in
of activities to complete so
the text, it is highlighted at the side. Sometimes
that you can reinforce and
a short definition is given in the main text. An
extend your knowledge and
in-depth explanation is provided in the glossary
skills that are covered in
at the back of the book.
each chapter.

8 • Data security 8 • Data security

Grandfather, father and son.


Activity 8.4 Log on to FirstCaribbean International bank’s website at www.cibcfcib.com, then Grandfather: backup of the system from 2 weeks ago
search for ‘Improving your own security’. Read some of the important steps that Father: last week’s backup
you can take to protect yourself online. Son: this week’s backup.
Next week all the backups are older so the father becomes the grandfather, the son becomes
the father, and a new son backup is created.

Sign in to Online Banking Archiving data


archive ❯ An archive comprises the files created or received by an institution or
User ID: organisation during the course of routine business that are stored because of
Password:
their value.
Sign In >
Depending on the nature of the data, some companies may archive data
Figure 8.12 Passwords are a sequence of letters, numbers and special characters that must monthly, others quarterly or annually. These files are usually stored on
be supplied to access a resource. Passwords and usernames can be used so that only authorised removable media such as DVDs or magnetic tapes and kept in a secure location.
users can log on to the system. In a secure system each individual user or group of users will be Files in an archive will be kept for a period of time and then destroyed.
allocated privilege to access only the files and resources they need to perform their jobs.

Summary
Operational procedures • Data security is all about identifying and assessing computer security risks.
Figure 8.11 Windows Firewall is • A computer security risk is any event, action or situation – intentional or not – that could lead to the loss of
implemented as a software-only file security
Backing up data computer systems and the data they contain.
mechanism and is a component of the It is unwise to rely on a single storage device for storing important data. • Data integrity is concerned with ensuring the accuracy, completeness and internal consistency of the data stored in
operating system. The device and the data it contains may fall prey to one of the accidental or a database.
deliberate actions or events mentioned earlier. To safeguard data, it is good • Physical access restrictions can prevent unauthorised personnel from damaging the computer hardware.
ITQ15 practice to copy data to another storage device or media.
• Access to IT systems can be restricted by requiring all legitimate users to input a valid username and password
List THREE potential threats to a backup Adopting a regular backup system such as the Grandfather-Father-Son
before being able to gain access to the system.
media? System means that if disaster should strike the organisation can recover almost
all of its data quickly and business can continue as usual. It is important to • A firewall acts as a barrier between a computer system and an external network.
keep each generation of backup separate from the rest. The son can be kept • Encryption, overwrite protection, password, and making a file read-only access are mechanisms that may be used
in the computer room, the father in a fireproof cabinet and the grandfather to help maintain file integrity.
A backup is a safety copy of files that can be
in another building. For a fast-moving business backups may be taken every • Individual files can be protected using encryption techniques that require the reader to have a correct password to
used to recover data in case of an event that
causes data damage or loss. day rather than every week. If a hard disk drive fails the most recent backup, decrypt the file.
the son, can be used to restore the data. In the event of a fire in the computer
• Viruses, Trojans and worms are malicious program that may infect and do harm to a computer system and its data;
room destroying the son backup and the computer system, the father backup
up-to-date antivirus software can protect computer systems from virus attacks.
can be used to restore the company data. In the worst case, a whole building
may be flooded but the grandfather backup can still be used to restore the data. • Computer fraud involves the use of computers to illegally obtain money, goods or services. There are many types
of computer fraud including identity theft, credit card fraud, electronic eavesdropping and surveillance.
(a) (b) • Backups are copies of files that can be restored in the event that the original files are lost through hardware failure,
accidental deletion or computer fraud whereas an archive comprises the files created, received and accumulated
over time and retained for historical use.

Answers to ITQs ITQ1 The following are SOME ITQ2 (a) The file containing
possible situations: (a) hard disk the credit card details OR the file
failure caused by intermittent power containing the student’s assignment.
outages causes partial data loss; (b) (b) The file with credit card details
hard disk failure caused by a power may have been accidentally selected
surge causes total data loss; (c) laptop and copied to the USB drive; the file
containing the data is stolen from a with the assignment may have been
parked motor vehicle; (d) the file with intentionally copied to the USB flash
the data is copied by an unauthorised drive by the accounting clerk. (c) Any
person without the knowledge of the reasonable explanation consistent
Figure 8.13 (a) The Backup or Restore tool is one of the Windows operating system accessories. (b) A user may choose what to back up and also owner; (e) an employee copies data with the answer in (b).
what device to store the data on. from the file for his/her personal use.

118 119

Suggested Summaries of the key facts from


The smaller column can Each image has
answers to the each module will help you check
contain key facts. It is a caption and a
In-Text Questions your understanding.
good practice to spend figure number to
will allow you to
time reading this column help with cross-
assess yourself.
as well as the main text so referencing.
that you don’t miss any
important information.

ITQ1 Where you see this icon, you will


find an In-Text Question (ITQ).
These are spread throughout each chapter
and will help you to check your progress. If
you can’t answer the ITQ, you should refresh
your knowledge by re-reading the relevant
paragraphs in the main text.
Answers to the ITQs are found at the end of
each chapter.

vii
8 Data security

By the end of ✓ identify common threats to the security of data


this chapter identify common threats to the integrity of data

you should
✓ outline ways by which information can be misused
be able to:
✓ describe measures to secure data
✓ describe measures to maintain data integrity.

Concept map

Data

subject to may be protected using

misuse:
computer fraud laws software restrictions: hardware access procedures:
credit card fraud encryption restrictions: archiving
electronic eavesdropping firewall biometric systems backup and recovery
identity theft overwrite protection guards disaster recovery mechanisms
industrial espionage passwords locks
propaganda read-only access fire/waterproof cabinets
software piracy restricted access
storage of inaccurate information virus protection
surveillance
violation of privacy

Introduction to data security


Why is there a need for data security?
Existing manual systems are often computerised to improve the efficiency
of an organisation. As the system becomes operational, data is captured,
processed, stored and disseminated. Organisations and their customers – other
organisations and individuals – become dependent on computer systems and
the information they provide. There are some drawbacks to computerisation.
These include:
• data theft or loss
• loss of data integrity
• increased exposure of data and information to misuse
data security ❯ Data security is all about identifying and assessing computer security risks.
8 • Data security

computer security risk ❯ A computer security risk is any event, action or situation – intentional or
not – that could lead to the loss of computer systems and the data they contain.
Data security allows individuals and organisations to assess the risks
to which their computer systems and data is exposed, and determine and
implement suitable countermeasures. It is important that an organisation
protects its data adequately. Data that is damaged, lost, stolen or misused can
cost the business money, its reputation or even the life of the business itself.
The business may eventually have to close!

What are the main elements of data security?


Element Meaning Example # 1 Example # 2
ABC Pharmacy Customer Jan Doyle
Vulnerability Exposure to the possibility of being Computer system is connected to a wide Customer fills prescriptions at the
attacked or harmed area network. It is also used to access pharmacy and makes payments using
their insurance company’s extranet. credit and debit cards.
Threat A statement of an intention to inflict Data may be intercepted as it transmitted Credit card data and personal data may be
damage from the pharmacy to the insurance accessed by an unauthorised person.
company.
Attack Actual action that causes damage Credit card data stolen over a period of Unauthorised purchases made with credit
weeks by an eavesdropper. card.
Countermeasure An action taken to prevent an attack or Encrypt data before transmission. Use a credit or debit card with chip-and-
minimise its effect pin technology.
Table 8.1  Main elements of data security.

What kind of data is at risk?


Data in every format and at every stage of the processing cycle is vulnerable.
• Data being captured
• Data collected and awaiting processing
• Data being processed
• Data stored on removable media
• Data stored on networks
• Data in file libraries
• Data being transmitted over a communications network
Figure 8.1  A credit card with a microchip • Data that has been backed up
may help to prevent credit card fraud. • Data that has been archived

How are data security and integrity related?


Data security and data integrity are two different concepts. Whereas data security
data integrity ❯ is concerned with identifying and assessing risk, data integrity is concerned with
ensuring the accuracy, completeness and internal consistency of the data stored in
a database.
ITQ1 Data security plays a key role in maintaining data integrity as it provides the
Briefly describe THREE situations that mechanism to safeguard files from corruption and unauthorised access.
may result in the damage, loss, theft Consider the following scenario.
or misuse of data that is stored on the An accountant creates an electronic spreadsheet containing the credit card
hard disk of a computer system. details of 500 customers and saves this file on the desktop of his computer. He
leaves his desk for a few hours to attend to company business. In his absence,
an accounting clerk seizes the opportunity to use the computer to complete
a school assignment. She creates a few files in the process and saves them
on the desktop. When she is finished, she copies the assignment files, and

108

You might also like