ICT 0417 – Networks: Privacy and Confidentiality of Data Transfer
Objective
Understand the concepts of privacy and confidentiality when data is transferred over a network, and be able to describe the related hardware, software, security measures, legal/ethical issues and the expectations of IGCSE/AS‑Level exam questions.
1. Network Hardware – The Building Blocks
Device
Primary Function
Typical Use
Key Security Considerations
Router
Routes traffic between different networks (e.g., LAN ↔ WAN)
Check provider compliance with GDPR, ISO 27001, etc.
5. Privacy and Confidentiality of Data Transfer
Privacy – the right of individuals to control who can view their personal information.
Confidentiality – assurance that data is readable only by authorised recipients.
Both are achieved through a blend of technical controls (encryption, authentication, secure protocols) and organisational policies (access control, data classification, staff training).
6. Threat Landscape – Risks to Data Transfer
Eavesdropping / Sniffing – capturing unencrypted packets (e.g., with Wireshark).
Man‑in‑the‑Middle (MitM) – attacker intercepts and may alter communication.
Fines: up to €20 million or 4 % of global turnover (GDPR) plus reputational damage.
Copyright – unauthorised copying or distribution of protected material is illegal; fair dealing may apply for educational use.
Ethical handling: obtain informed consent, collect only necessary data, store securely, and dispose of data safely (shredding, secure erase).
Exam tip: when a question asks about “audience” or “copyright”, briefly note who may view the data (e.g., staff, customers, public) and the legal need to respect intellectual property.
9. Key Exam Verbs (AO1–AO3)
Explain – give a clear description with reasons.
Describe – provide details of how something works or is used.
Compare – highlight similarities and differences.
Evaluate – discuss advantages and disadvantages and make a justified judgement.
Analyse – break a situation into components and examine each.
10. Summary Checklist – Planning a Secure Transfer
Identify the data type (personal, confidential, public).
Classify the data and decide the required confidentiality level.
Select an appropriate encryption method (symmetric for bulk, asymmetric for key exchange).
Choose a secure protocol (HTTPS, SFTP, SSH, VPN) and verify TLS version.
Implement strong authentication (strong passwords + 2FA/MFA) and RBAC.
Mitigate password interception (encrypted channels, anti‑key‑logging, user awareness).
Ensure compliance with legal/ethical policies (GDPR, Data Protection Act, copyright).
Document the process, keep logs, and review after any incident.
11. Suggested Classroom Activities
Packet‑sniffing demo – Capture traffic on an unencrypted Wi‑Fi network with Wireshark, then repeat using HTTPS; students compare visible data.
VPN set‑up – Students configure a site‑to‑site IPsec VPN between two virtual machines and measure latency versus a direct LAN connection.
Case‑study analysis – Provide a recent data‑breach article; groups identify privacy/confidentiality failures, map them to the threat list, and propose mitigation measures.
Password‑policy workshop – Create strong passphrases, test them with a password‑strength tool, and discuss why simple passwords are vulnerable to interception and brute‑force attacks.
Encryption hands‑on – Use an online AES tool to encrypt a short message, then decrypt it using the same key; discuss key‑management and the need for secure key exchange.
Anti‑spyware audit – Scan a computer with a reputable anti‑spyware program, review the report, and discuss how spyware can compromise confidentiality.
12. Suggested Diagram – Flow of Encrypted Data via a VPN
Data flow from a client to a server through a VPN tunnel.
Client device (NIC) → Wi‑Fi access point (WPA3) → Router (firewall/NAT) → Internet → VPN gateway (IPsec encryption) → Server firewall → Application server.
Labels to include:
Authentication: username/password + 2FA at VPN gateway.
Encryption: TLS 1.3 for HTTPS traffic; IPsec (AES‑256) for the VPN tunnel.
Security devices: perimeter firewall, IDS/IPS, anti‑malware on both ends.
Your generous donation helps us continue providing free Cambridge IGCSE & A-Level resources,
past papers, syllabus notes, revision questions, and high-quality online tutoring to students across Kenya.