Cambridge A-Level Computer Science 9618 – Data Security
6.1 Data Security
Security measures protect the confidentiality, integrity and availability (CIA) of data. The measures differ depending on whether the system is a stand‑alone PC or part of a larger network.
1. Common Threats
Malware (viruses, worms, trojans, ransomware)
Unauthorised access (hacking, insider threats)
Physical damage or theft
Data loss (accidental deletion, hardware failure)
Interception of communications (eavesdropping, man‑in‑the‑middle attacks)
2. Security Measures for a Stand‑Alone PC
Physical security
Lock the computer in a secure location.
Use cable locks or secure enclosures.
Operating system hardening
Apply regular patches and updates.
Disable unnecessary services and ports.
Configure user accounts with the principle of least privilege.
Antivirus / Antimalware
Real‑time scanning of files and email attachments.
Develop a written security policy covering acceptable use, password standards and incident response.
Conduct regular training on phishing, social engineering and safe handling of data.
Implement a clear incident‑reporting process and conduct post‑mortem reviews.
6. Summary
Effective data security requires a layered approach: physical safeguards, system hardening, encryption, network controls, regular updates, and robust policies. The specific measures scale from a single PC to a complex network, but the underlying principles of confidentiality, integrity and availability remain constant.
Suggested diagram: Layered security model showing physical, network, host, application and data layers with corresponding controls.