Cambridge A-Level Computer Science 9618 – Data Security (6.1)
6.1 Data Security
Objective
Show appreciation of the need for both the security of data and the security of the computer system.
Why Security Matters
In modern computing, data and the systems that store, process, and transmit that data are inseparable. A breach of either can compromise the other, leading to loss of confidentiality, integrity, or availability.
Hardening – disabling unnecessary services, using least‑privilege accounts.
Relationship Between Data and System Security
Data security relies on a secure system, and a secure system must protect the data it handles. Weakness in one area can undermine the other.
Comparative Overview
Aspect
Data Security Concern
System Security Concern
Confidentiality
Unauthorised reading of files, interception of transmissions
Unauthorised login, insecure network services
Integrity
Corruption or unauthorised modification of records
Malware altering system files, privilege escalation
Availability
Data loss, ransomware encryption
Denial‑of‑service attacks, hardware failure
Quantifying Password Strength
The entropy \$H\$ of a password can be estimated by:
\$H = L \times \log_2 N\$
where \$L\$ is the password length and \$N\$ is the size of the character set. Higher entropy means a lower probability \$P\$ of guessing the password:
\$P = \frac{1}{2^{H}}\$
Summary
Both data and system security are essential for protecting information assets.
Threats can be technical, physical, or human‑based; mitigation requires layered controls.