Describe security measures designed to protect computer systems, ranging from the stand-alone PC to a network of computers
6.1 Data Security
1 Key Concepts
Security (CIA triad) – the set of controls that ensure:
Confidentiality: data are only accessible to authorised users.
Integrity: data are accurate, complete and have not been altered without permission.
Availability: data and services are accessible when required.
Privacy – the right of individuals to decide who may view or use their personal information. In practice it is achieved by applying confidentiality controls.
Integrity (as a separate term) – the assurance that data remain correct and un‑tampered; it underpins the “I” in CIA.
2 Why Security Is Needed
Data are created, stored, processed and transmitted by hardware, operating systems and networks. If any part of the system is compromised, the data it contains become vulnerable. Consequently, protecting the hardware, the OS and the network is a prerequisite for protecting the data itself.
Whether the environment consists of a single PC or a large corporate network, the same CIA principles apply; the controls simply scale to match the system’s complexity.
Suggested diagram: layered security model showing Physical → Network → Host → Application → Data layers, with example controls (locks, firewalls, OS hardening, authentication, encryption) at each level.
Support e-Consult Kenya
Your generous donation helps us continue providing free Cambridge IGCSE & A-Level resources,
past papers, syllabus notes, revision questions, and high-quality online tutoring to students across Kenya.