IB Year 1 Higher Level Computer Science

Tuesday 4 February 2025 - Block 1
← previous note

There are about 4 months and 24 days until school ends. How are you going to use that time to make sure you do your best?

 

Daily Note

Hello class!  

  1. I really, really, really, really really hope to be back on Monday next. OMG I'm so bored. 
  2. I am fully-aware missing this much instructional time is bad. Now that I have a computer, I can send you more constructive work.
  3. Please dont worry about falling behind our schedule, I always build in a bit of wiggle-room into our schedule.  

 

  1. Please scan the wiki page on network security
  2. Please remember according the IB, there are only three types of security:
    1. 1.1 encryption types
    2. 1.2 userID
    3. 1.3 trusted media access control (MAC) addresses
  3. Please remember the most effective type of security is a combination of these three, and that each type of security has advantages and disadvantages. 
  4. Please take the quiz below, Question 5 is especially feathery. So be quack-full! 

 

  1. Describe two methods of network security and explain how they help protect a network. [4 marks]

  2. Explain why encryption is considered an effective method of network security despite having some disadvantages. [4 marks]

  3. Discuss the potential risks of using only user ID authentication for network security. [6 marks]

  4. Evaluate the use of MAC address filtering as a network security measure, considering both advantages and disadvantages. [6 marks]

  5. Justify whether a guard duck named "Quackintosh" could improve network security by honking at unauthorized users. [4 marks]

 

Markscheme

Question 1: Describe two methods of network security and explain how they help protect a network. [4 marks]

  • 1 mark for naming a method (e.g., encryption, user ID, MAC address filtering) (Max 2 marks)
  • 1 mark for a correct description of how each method works (Max 2 marks)

Question 2: Explain why encryption is considered an effective method of network security despite having some disadvantages. [4 marks]

  • 2 marks for explaining how encryption enhances security (e.g., makes data unreadable without the correct decryption key)
  • 2 marks for explaining the disadvantages (e.g., passwords can be weak, transmission vulnerabilities)

Question 3: Discuss the potential risks of using only user ID authentication for network security. [6 marks]

  • 2 marks for identifying risks (e.g., stolen credentials, lack of message protection)
  • 2 marks for explaining how these risks impact security
  • 2 marks for considering possible mitigation strategies (e.g., two-factor authentication)

Question 4: Evaluate the use of MAC address filtering as a network security measure, considering both advantages and disadvantages. [6 marks]

  • 2 marks for explaining how MAC filtering improves security (e.g., device control, user-device linking)
  • 2 marks for explaining limitations (e.g., slow changes, MAC spoofing)
  • 2 marks for concluding whether it is an effective security measure, with justification

Question 5: Justify whether a guard duck named "Quackintosh" could improve network security by honking at unauthorized users. [4 marks]

  • 1 mark for a humorous but structured argument (e.g., "physical security is important, but ducks lack encryption skills")
  • 1 mark for linking to real security measures (e.g., intrusion detection systems)
  • 1 mark for acknowledging limitations of a duck as a security measure
  • 1 mark for an overall justified conclusion

 

Statement of Inquiry

The big idea for today is Computational thinking.

The essential questions for this topic are:

How do we think about problems in a way which makes them solvable for a computer?

It takes time to explore and really understand a big idea. If you want to
learn more about computational thinking (which is connected to today's daily note), please click here .

We are learning this because as a designers must understand scientific and technical innovation. Designers use systems, models, methods, and processes to solve problems.



Reminders & routines:

Please read and follow these reminders:

  1. IF this_class == first_class_of_day:
         read_daily_bulletin()
     
  2. IF today == Friday:
         careers_in_computing()