Know and understand the characteristics and methods of protecting data, including:
and be able to relate these methods to the CIA triad, relevant legislation and everyday eSafety practice.
| Hazard | Potential impact | Practical mitigation |
|---|---|---|
| Exposed cables / overloaded sockets | Electric shock, fire, equipment damage | Use mains‑rated power strips with surge protection; keep cables tidy and away from walkways. |
| Overheating of laptops, servers or UPS units | Hardware failure, data loss, fire | Ensure adequate ventilation, clean dust filters regularly, monitor temperature, use a UPS with temperature alarm. |
| Heavy or unstable equipment (e.g., tower PCs, server racks) | Physical injury, equipment topple | Secure racks to walls or floor, use anti‑tip brackets, lift with two people or mechanical aids. |
| Water damage (spills, flooding) | Short‑circuit, data loss | Place devices away from liquids, use waterproof floor mats, have a spill‑response plan. |
| Fire | Destruction of hardware and data | Install smoke detectors, fire‑suppression systems (e.g., FM‑200), keep fire extinguishers nearby, conduct regular fire drills. |
| Threat | Typical impact | Mitigation methods |
|---|---|---|
| Hacking / unauthorised access | Loss of confidentiality, data alteration | Firewalls, strong passwords, 2FA, encryption, digital certificates |
| Phishing & social engineering | Credential theft, malware infection | User education, 2FA, email filters, safe‑browsing habits |
| Malware (viruses, ransomware) | Data loss, loss of availability | Antivirus/anti‑malware, regular backups, firewalls, application whitelisting |
| Card/identity fraud | Financial loss, identity theft | Encryption of transactions, SSL/TLS, digital certificates, tokenisation |
| Insider threat | Unauthorised data disclosure or alteration | Authorisation controls, audit logs, least‑privilege policies, separation of duties |
| Physical damage (fire, water, power failure) | Loss of hardware and data | UPS, fire‑suppression, proper cabling, regular backups, off‑site storage |
| Method | How it works | Advantages | Limitations | Real‑world example | CIA contribution |
|---|---|---|---|---|---|
| Biometrics | Uses unique physiological or behavioural traits (fingerprint, iris, voice, facial pattern) to verify identity. | Hard to duplicate; convenient; provides non‑repudiation. | Requires specialised hardware; may fail due to injury or ageing; privacy concerns. | Smartphone fingerprint unlock; airport e‑gate facial recognition. | Confidentiality, Integrity |
| Digital certificate | Electronic document that binds a public key to an entity’s identity, signed by a trusted Certificate Authority (CA). | Enables trusted online transactions; essential for SSL/TLS. | Depends on CA trustworthiness; certificates expire and must be renewed. | Bank’s HTTPS site showing a padlock and “Issued by DigiCert”. | Confidentiality, Integrity |
| SSL / TLS | Protocol that encrypts data between client and server. Uses asymmetric encryption to exchange a symmetric session key, then encrypts all traffic with that key. | Provides confidentiality and integrity for web traffic; visible as “https://”. | Older versions (SSL 2.0/3.0) are insecure; requires valid certificates. | Online shopping checkout page using TLS 1.3. | Confidentiality, Integrity |
| Encryption | Transforms readable plaintext into unreadable ciphertext using an algorithm and a secret key (symmetric) or a key pair (asymmetric). | Protects data at rest (e.g., encrypted drives) and in transit (e.g., VPN). Strong algorithms are mathematically robust. | Key management is critical; weak keys/algorithms can be broken. | BitLocker full‑disk encryption on Windows laptops. | Confidentiality, Integrity |
| Firewall | Hardware or software that monitors and controls network traffic according to a set of security rules (packet filtering, stateful inspection, proxy). | Blocks unauthorised inbound/outbound traffic; can segment networks into zones. | Mis‑configured rules may create gaps; does not stop insider attacks. | Corporate perimeter firewall blocking port 23 (Telnet) but allowing port 443 (HTTPS). | Confidentiality, Availability |
| Two‑factor authentication (2FA) | Requires two independent credentials: something you know (password), something you have (token, mobile app), or something you are (biometric). | Greatly reduces risk of unauthorised access even if one factor is compromised. | Can be inconvenient; tokens or phones can be lost or stolen. | Bank sends a one‑time code to a smartphone app after password entry. | Confidentiality, Integrity |
| User ID & password | Traditional knowledge‑based authentication; the user supplies a unique identifier and a secret string. | Simple to implement; familiar to most users. | Weak passwords are vulnerable to guessing, phishing, brute‑force attacks; passwords may be stored insecurely. | Corporate email login requiring a username and a complex password. | Confidentiality |
When answering a question on eSafety, note the command word:
| Term | Definition (Cambridge wording) |
|---|---|
| Biometrics | Authentication based on a person’s unique physiological or behavioural characteristics. |
| Digital certificate | Electronic document that binds a public key to an individual or organisation, signed by a trusted Certificate Authority. |
| SSL / TLS | Protocols that provide encrypted communication over a network; TLS is the successor to SSL. |
| Encryption | Process of converting plaintext into ciphertext using an algorithm and a secret key. |
| Firewall | System (hardware or software) that controls network traffic according to a set of security rules. |
| Two‑factor authentication (2FA) | Security method requiring two different forms of verification (something you know, have, or are). |
| User ID | Unique identifier assigned to a user for login purposes. |
| Password | Secret string known only to the user, used to prove identity. |
| Confidentiality | Ensuring that data is accessible only to authorised persons. |
| Integrity | Ensuring that data is accurate, complete and has not been unauthorisedly altered. |
| Availability | Ensuring that data and services are accessible when required. |
| Certificate Authority (CA) | Trusted third‑party that validates identities and issues digital certificates. |
| eSafety | Practices that protect users from online risks such as phishing, cyber‑bullying, identity theft and unsafe content. |
Your generous donation helps us continue providing free Cambridge IGCSE & A-Level resources, past papers, syllabus notes, revision questions, and high-quality online tutoring to students across Kenya.