[Year 12 SofDev] FW: 2013 Exam reflection

Kevork KROZIAN kkrozian at ringwoodsc.vic.edu.au
Thu Oct 16 11:18:09 EST 2014


Take 2. I have to train my mail client to stop sending emails before I finish !

Hi Folks

I am just browsing the VCAA 2013 exam and 2 items jump out at me:


1.       Section B, Q 5 - What is a record and what is a file ?
Examiners' report states a record is a control structure ?????

A record is a control structure and method of storing and grouping related data together: eg ID 001, Name Fred, LastName Jones. This data is a record as it is relevant to each other and stored together.
A record is a data structure which stores related information such as name, score, year in one data store. Individual data stored in a record can be accessed through an index to find the related information within that record.

                A control structure is a block of code that dictates the flow of control such as  branching, selection, looping, function call and not a storage structure.



2.       Section C , Q 14
A major security concern for the software being designed to run on the drone is that hackers (unauthorised users) could take over control of the drone.
State two measures that could prevent this from happening. Clearly explain how each would prevent unauthorised access to the drone.


Install a firewall between the tablet and router
- A firewall controls which user can and cannot have access to certain ports.
- The firewall would only allow the park rangers access to the drones and would prevent unauthorised outside users.

Ensure all path instructions are encrypted
- Encryption changes the 'plain text' of the flight instructions into unreadable 'ciphertext'.
- This will ensure that the drones can only accept instructions from the official tablet devices and nothing else.
                Has anyone seen a firewall inside a network ????   A firewall between a Wireless client ( tablet ) and the Access Point ??
Strong Encryption with strong passwords is the way to go as well as 2 factor authentication ( physical, biometric, username, password ). A passphrase for connecting to the access point, then a separate password / biometric/fingerprint for using the software on the table.t. You do not close ports internally on a LAN. A firewall separates different networks and not devices within a network.  You do not close ports to control who has accesses within a network.

               Sorry folks, but this one is disappointing.

Kind Regards

Kevork Krozian
IT Pathways Manager
Ringwood Trade Training Facility
Tel: 0419 356 034


________________________________

Important - This email and any attachments may be confidential. If received in error, please contact us and delete all copies. Before opening or using attachments check them for viruses and defects. Regardless of any loss, damage or consequence, whether caused by the negligence of the sender or not, resulting directly or indirectly from the use of any attached files our liability is limited to resupplying any affected attachments. Any representations or opinions expressed are those of the individual sender, and not necessarily those of Ringwood Secondary College.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: http://www.edulists.com.au/pipermail/sofdev/attachments/20141016/6c3eb156/attachment.html 


More information about the sofdev mailing list