6.1 Data Security
Learning objectives
- Define the core security concepts required by the Cambridge AS & A‑Level syllabus: confidentiality, integrity, availability, authentication and privacy.
- Identify the main threats to computer and data security.
- Explain the security measures that protect stand‑alone PCs and networked systems, and link each measure to the relevant security principle.
- Describe simple techniques for ensuring data integrity (validation, checksums, parity).
1. Core security principles
| Principle | What it means | Typical protective measures (exam‑relevant) |
|---|
| Confidentiality | Only authorised users may read the data. | Encryption, strong passwords, access‑control lists, firewalls. |
| Integrity | Data must be accurate, complete and un‑altered. | Hash functions, checksums, digital signatures, validation routines. |
| Availability | Data and services must be accessible when required. | Back‑ups, redundant servers, DDoS mitigation, reliable power. |
| Authentication | Verification of the identity of a user, device or process. | Passwords, two‑factor authentication (2FA), biometrics. |
| Privacy | Protection of personal or sensitive information from unauthorised collection or disclosure, and handling it in accordance with legal/ethical requirements. | Data‑classification, anonymisation, GDPR‑style policies. |
2. Threat landscape (exam focus)
| Threat | Typical effect | Key counter‑measure(s) |
|---|
| Malware (viruses, ransomware, spyware) | Unauthorised modification, loss or encryption of data. | Anti‑virus/anti‑malware software, regular patching. |
| Phishing & social engineering | Credentials or personal data are disclosed to attackers. | User education, email filtering, 2FA. |
| Man‑in‑the‑Middle (MitM) | Data intercepted or altered in transit. | TLS/SSL, SSH, VPNs, certificate validation. |
| Denial‑of‑Service (DoS/DDoS) | Legitimate users cannot access a service. | Firewalls, rate‑limiting, redundant servers. |
| Insider threat | Authorized users misuse access. | Least‑privilege, role‑based access control, audit logs. |
| Unauthorised access (hacking, password cracking) | Attacker gains illegal entry to a system. | Strong passwords, account lock‑out, IDS/IPS. |
| School‑specific example | Phishing email to teachers requesting login details. | Awareness training, 2FA for staff accounts. |
3. Security measures for stand‑alone PCs
3.1 Passwords & authentication
3.2 Anti‑virus & firewalls (primary PC safeguards)
- Anti‑virus/anti‑malware – real‑time scanning, regular definition updates.
- Host‑based firewall – permits only required inbound/outbound ports (e.g., allow HTTP/HTTPS, block unknown services).
3.3 Encryption (confidentiality)
- Symmetric encryption – one secret key (AES‑256 is the recommended algorithm). Used for file‑level or whole‑disk encryption.
- Asymmetric encryption (public‑key) – pair of keys (RSA ≥ 2048 bits or ECC). Used for secure key exchange and digital signatures.
- Both methods support confidentiality; when combined with a MAC (Message Authentication Code) they also provide integrity.
3.4 Back‑up & recovery (availability)
- Daily incremental + weekly full backups.
- Off‑site or cloud storage; encrypt backups to preserve confidentiality.
- Periodic restoration test to verify data integrity and availability.
4. Data integrity techniques (required for the syllabus)
4.1 Validation checks
- Range check – value must lie between a minimum and maximum (e.g., age ≥ 0 and ≤ 120).
- Format check – data must match a pattern (e.g., email must contain “@”).
- Consistency check – related fields must agree (e.g., start‑date ≤ end‑date).
4.2 Checksums & parity
- Checksum – simple additive total of bytes; used for quick error detection.
- Parity bit – even or odd count of ‘1’s in a byte; detects single‑bit errors.
- Cryptographic hash (e.g., SHA‑256) – produces a fixed‑length digest; used for robust integrity verification and digital signatures.
5. Access‑control mechanisms (network & system level)
- Discretionary Access Control (DAC) – owners set permissions (e.g., file read/write rights).
- Mandatory Access Control (MAC) – central authority enforces policies based on security labels (Top Secret, Confidential, etc.).
- Role‑Based Access Control (RBAC) – permissions assigned to roles (Administrator, Teacher, Student); users inherit rights via role membership.
6. Network‑level security (exam‑relevant basics)
- Firewalls – packet‑filtering or stateful inspection; block unauthorised ports.
- Intrusion Detection/Prevention Systems (IDS/IPS) – monitor traffic for known attack signatures; IPS can automatically block.
- Virtual Private Network (VPN) – creates an encrypted tunnel (IPSec or SSL/TLS) for secure remote access.
- Secure transport protocols – TLS/SSL for web, SSH for remote command line, SFTP for file transfer.
- Network segmentation – separate critical services (e.g., finance) from general‑purpose devices using VLANs or sub‑nets.
7. Physical and organisational controls
- Physical security – locked server rooms, CCTV, biometric entry, fire suppression, temperature control.
- Security policies (Cambridge wording)
- Acceptable‑Use Policy – defines permissible activities on school devices.
- Password Management – complexity, expiry, storage rules.
- Incident‑Response Plan – steps to follow after a suspected breach.
- Data Classification & Handling – label data (Public, Internal, Confidential, Sensitive) and apply appropriate controls.
- Audit & Compliance – regular logging, review of access rights.
- Backup & recovery (re‑iterated) – see section 3.4.
8. Mapping measures to the CIA‑triad
| Measure | Confidentiality | Integrity | Availability |
|---|
| Strong passwords & 2FA | ✓ | – | – |
| Anti‑virus & host firewall | ✓ | ✓ (prevents tampering) | ✓ (keeps system running) |
| Symmetric encryption (AES) | ✓ | ✓ (when used with a MAC) | – |
| Asymmetric encryption (RSA/ECC) | ✓ | ✓ (digital signatures) | – |
| Hash functions / checksums | – | ✓ | – |
| Back‑ups (encrypted) | ✓ | ✓ | ✓ |
| RBAC / DAC / MAC | ✓ | ✓ | ✓ (prevents accidental lock‑out) |
9. Suggested summary diagram (text description)
Illustrate the life‑cycle of a secure message:
- Plaintext data → hash (SHA‑256).
- Hash encrypted with sender’s private key → digital signature.
- Plaintext + signature encrypted with receiver’s public key (or a symmetric session key protected by RSA).
- Transmission over TLS/SSL.
- Receiver decrypts with private key, verifies signature with sender’s public key, then recomputes the hash to confirm integrity.
This flow shows how confidentiality, integrity, authentication and (via the signature) non‑repudiation are achieved.