IB Year 1 Higher Level Computer Science
Tuesday 4 February 2025 - Block 1
← previous noteThere are about 4 months and 24 days until school ends. How are you going to use that time to make sure you do your best?
Daily Note
Hello class!
- I really, really, really, really really hope to be back on Monday next. OMG I'm so bored.
- I am fully-aware missing this much instructional time is bad. Now that I have a computer, I can send you more constructive work.
- Please dont worry about falling behind our schedule, I always build in a bit of wiggle-room into our schedule.
- Please scan the wiki page on network security
- Please remember according the IB, there are only three types of security:
- Please remember the most effective type of security is a combination of these three, and that each type of security has advantages and disadvantages.
- Please take the quiz below, Question 5 is especially feathery. So be quack-full!
-
Describe two methods of network security and explain how they help protect a network. [4 marks]
-
Explain why encryption is considered an effective method of network security despite having some disadvantages. [4 marks]
-
Discuss the potential risks of using only user ID authentication for network security. [6 marks]
-
Evaluate the use of MAC address filtering as a network security measure, considering both advantages and disadvantages. [6 marks]
-
Justify whether a guard duck named "Quackintosh" could improve network security by honking at unauthorized users. [4 marks]
Markscheme
Question 1: Describe two methods of network security and explain how they help protect a network. [4 marks]
- 1 mark for naming a method (e.g., encryption, user ID, MAC address filtering) (Max 2 marks)
- 1 mark for a correct description of how each method works (Max 2 marks)
Question 2: Explain why encryption is considered an effective method of network security despite having some disadvantages. [4 marks]
- 2 marks for explaining how encryption enhances security (e.g., makes data unreadable without the correct decryption key)
- 2 marks for explaining the disadvantages (e.g., passwords can be weak, transmission vulnerabilities)
Question 3: Discuss the potential risks of using only user ID authentication for network security. [6 marks]
- 2 marks for identifying risks (e.g., stolen credentials, lack of message protection)
- 2 marks for explaining how these risks impact security
- 2 marks for considering possible mitigation strategies (e.g., two-factor authentication)
Question 4: Evaluate the use of MAC address filtering as a network security measure, considering both advantages and disadvantages. [6 marks]
- 2 marks for explaining how MAC filtering improves security (e.g., device control, user-device linking)
- 2 marks for explaining limitations (e.g., slow changes, MAC spoofing)
- 2 marks for concluding whether it is an effective security measure, with justification
Question 5: Justify whether a guard duck named "Quackintosh" could improve network security by honking at unauthorized users. [4 marks]
- 1 mark for a humorous but structured argument (e.g., "physical security is important, but ducks lack encryption skills")
- 1 mark for linking to real security measures (e.g., intrusion detection systems)
- 1 mark for acknowledging limitations of a duck as a security measure
- 1 mark for an overall justified conclusion
Statement of Inquiry
The big idea for today is Computational thinking.
The essential questions for this topic are:
How do we think about problems in a way which makes them solvable for a computer?
It takes time to explore and really understand a big idea. If you want to
learn more about
computational thinking (which is connected to today's daily note),
please click here
.
We are learning this because as a designers must understand scientific and technical innovation. Designers use systems, models, methods, and processes to solve problems.
Our learning
This is a beta feature. Please let me know if you have any feedback.
Please click here to reflect on our learning for today's class.