6.1 Data Security (3)

Resources | Revision Questions | Computer Science

Login to see all questions

Click on a question to view the answer

1.

Question 1

Describe and evaluate three different security methods designed to protect the confidentiality and integrity of data stored on a server. Consider the advantages and disadvantages of each method, including potential vulnerabilities.

2.

Consider a database containing sensitive patient medical records. Describe how security, privacy, and integrity are relevant to protecting this data. Provide specific examples of measures that could be implemented for each.

3.

Question 2: Explain the difference between symmetric and asymmetric encryption. For each type, describe a typical algorithm and outline a scenario where it would be most appropriate to use that type of encryption.