Computer-science_A-level_Cie
-
computers-and-components6 主题
-
logic-gates-and-logic-circuits2 主题
-
central-processing-unit-cpu-architecture6 主题
-
assembly-language-4 主题
-
bit-manipulation1 主题
-
operating-systems3 主题
-
language-translators2 主题
-
data-security3 主题
-
data-integrity1 主题
-
ethics-and-ownership3 主题
-
database-concepts3 主题
-
database-management-systems-dbms-1 主题
-
data-definition-language-ddl-and-data-manipulation-language-dml1 主题
-
computational-thinking-skills1 主题
-
algorithms14 主题
-
data-types-and-records2 主题
-
arrays2 主题
-
files1 主题
-
introduction-to-abstract-data-types-adt1 主题
-
programming-basics1 主题
-
constructs2 主题
-
structured-programming1 主题
-
program-development-life-cycle2 主题
-
program-design-2 主题
-
program-testing-and-maintenance3 主题
-
user-defined-data-types1 主题
-
file-organisation-and-access-3 主题
-
floating-point-numbers-representation-and-manipulation3 主题
-
protocols2 主题
-
circuit-switching-packet-switching1 主题
-
processors-parallel-processing-and-virtual-machines5 主题
-
boolean-algebra-and-logic-circuits4 主题
-
purposes-of-an-operating-system-os3 主题
-
translation-software3 主题
-
encryption-encryption-protocols-and-digital-certificates3 主题
-
artificial-intelligence-ai4 主题
-
recursion1 主题
-
programming-paradigms4 主题
-
object-oriented-programming7 主题
-
file-processing-and-exception-handling2 主题
-
data-representation5 主题
-
multimedia3 主题
-
compression2 主题
-
networks-and-the-internet11 主题
data-protection
Data security techniques
Access rights
-
Access rights control what users can see or do on a network
-
They ensure that users can access the files and resources they need for their role, and can’t access information they shouldn’t
-
Access rights are assigned based on a user’s role, responsibilities, or security clearance
|
Access right |
What it means |
|---|---|
|
Full access |
The user can open, create, edit, and delete files or folders |
|
Read-only access |
The user can open and view files but cannot edit or delete them |
|
No access |
The user cannot see or interact with the file or folder at all |
Example: access rights on a school network
|
User group |
Access rights |
|---|---|
|
Administrators |
Unrestricted access – Can access and control all files, folders, and settings |
|
Teaching Staff |
Partially restricted access – Can access student data but not other staff files |
|
Students |
Restricted access – Can only access their own files and folders |
-
Users can be grouped (e.g. “Year 11”, “Staff”, “Admin”) and given access rights as a group
-
Access rights can be assigned to files, folders, or whole systems
-
This helps protect confidential data, improves network security, and supports efficient collaboration
Encryption
-
Encryption is a method of scrambling data before being transmitted across a network in order to protect the contents from unauthorised access
-
While encryption is important on both wired and wireless networks, it’s even more critical on wireless networks due to the data being transmitted over radio waves, making it easy to intercept
How is wireless data encrypted?
-
Wireless networks are identified by a ‘Service Set Identifier’ (SSID) which along with a password is used to create a ‘master key‘
-
When devices connect to the same wireless network using the SSID and password they are given a copy of the master key
-
The master key is used to encrypt data into ‘cipher text‘, before being transmitted
-
The receiver uses the same master key to decrypt the cipher text back to ‘plain text‘
-
To guarantee the security of data, the master key is never transmitted. Without it, any intercepted data is rendered useless
-
Wireless networks use dedicated protocols like WPA2 specifically designed for Wi-Fi security

How is wired data encrypted?
-
Wired networks are encrypted in a very similar way to a wireless network, using a master key to encrypt data and the same key to decrypt data
-
Encryption on a wired network differs slightly as it is often left to individual applications to decide how encryption is used, for example HTTPS
Responses