Oxford Cambridge and RSA
GCSE (9-1) Computer Science
Computer Systems
J277/01
Topic: Unit 1.4 User Security
Time allowed: 40 minutes
Centre number Candidate number
First name Last name
INSTRUCTIONS INFORMATION
Turn over
1
A school stores sensitive data about students and staff.

(a) Identify two methods of physical security the school could use to restrict access to the server room.
[2]

(b) The school implements User Access Levels.
Explain what is meant by 'User Access Levels' and how this improves the security of the school's data.
[3]
2
A company requires employees to set a Strong Password for their accounts.

(a) State three characteristics that would make a password "strong".
[3]

(b) Some employees struggle to remember complex passwords and write them on sticky notes attached to their monitors.
Explain how Biometric measures could solve this problem and improve security.
[2]

(c) Even with strong passwords, the company is worried about Brute-force attacks.
Describe one software-based rule the company could enforce to prevent a brute-force attack from succeeding against a user's password.
[2]
Turn over
3
A lawyer travels with a laptop containing confidential client files.

(a) The lawyer uses Encryption software on the laptop's hard drive.
Explain how encryption helps protect the client files if the laptop is stolen.
[2]

(b) Encryption uses an algorithm to scramble data.
Complete the sentence below:
[2]
Data that has not yet been encrypted is known as text, and data that has been encrypted is known as text.
4
A hospital uses a network to store patient records.

(a) Different staff members have different User Access Levels.
Complete the table below to suggest appropriate access rights (Read-Only, Read-Write, or No Access) for the following staff members regarding the "Patient Medical History" database.
[3]
Staff Role Access Level Reason
Doctor Needs to view and update patient diagnosis.
Receptionist Needs to confirm patient appointment times but not medical details.
Cleaner Does not need to use the computer system.

(b) The hospital is concerned about Physical Security for the computers in the public waiting area.
Describe one physical method that could prevent the theft of the actual computer hardware (e.g., the monitor or tower).
[2]
Turn over
5
A software developer is designing a login system for a banking app.

(a) The developer decides to implement Two-Step Verification (2SV) (also known as Multi-Factor Authentication).
Describe how Two-Step Verification works to prevent unauthorised access, even if a hacker knows the user's password.
[3]

(b) The bank wants to prevent Shoulder Surfing at their ATMs.
Suggest one physical design feature of an ATM or its environment that helps prevent shoulder surfing.
[1]
6
Extended Response
A large office building uses a combination of Physical Security and User Access Levels to protect its systems.

Discuss how these two methods work together to protect the company's data. In your answer, you should consider:
  • How physical security stops access to hardware.
  • How user access levels stop access to software/data.
  • The consequences if only one of these methods was used.
[6]
END OF QUESTION PAPER