Firewalls & Encryption (SQA National 5 Computing Science): Revision Note

Exam code: X816 75

Robert Hampton

Written by: Robert Hampton

Reviewed by: James Woodhouse

Updated on

Firewalls

What is a firewall?

  • A firewall monitors and controls incoming and outgoing network traffic based on a set of rules

  • It helps protect a computer or network by filtering data to ensure only safe and legitimate traffic is allowed through

Purpose of a firewall

  • Prevents unauthorised access to or from a network

  • Blocks potentially harmful data such as malware or hacking attempts

  • Helps maintain network security

Types of firewall

  • Hardware firewall – built into a router or network device to protect the entire network

  • Software firewall – installed on individual computers to protect a single device

  • Attacks prevented by firewalls

    • Hackers trying to access private data

    • Malware or viruses entering through the network

    • Unauthorised connections to or from the system

Encryption

What is encryption?

  • Encryption is a method of scrambling data before it is transmitted across a network so that it cannot be understood if intercepted

Why is encryption used?

  • It helps to protect data from unauthorised access and ensures that only users with the correct decryption key can read the information

How it works

  • The data (called plaintext) is converted into ciphertext using an encryption key

  • The receiver uses the same or matching key to decrypt the ciphertext back into plaintext

  • This means that even if data is intercepted, it cannot be read without the correct key

Example

  • If an email is intercepted while being sent across a network, encryption ensures that it cannot be read without the correct key

  • This idea is similar to how messages were encrypted using the Enigma machine during World War II

  • Without the correct settings, the intercepted messages were meaningless

Worked Example

An online learning platform allows users to submit payment information to subscribe to courses. This information is transferred across the internet to the platform's central server.

Describe the purpose of the following two security precautions in protecting the payment details during this process.

(i) Firewall

[2]

(ii) Encryption

[2]

Answers

(i)

  • Monitors/controls/blocks incoming and outgoing network traffic [1 mark]

  • To protect the network/server from unauthorised access or external threats [1 mark]

(ii)

  • Scrambles or codes the data being transferred [1 mark]

  • Ensuring that if the communication is intercepted by a hacker, the payment details cannot be read or understood [1 mark]

Unlock more, it's free!

Join the 100,000+ Students that ❤️ Save My Exams

the (exam) results speak for themselves:

Robert Hampton

Author: Robert Hampton

Expertise: Computer Science Content Creator

Rob has over 16 years' experience teaching Computer Science and ICT at KS3 & GCSE levels. Rob has demonstrated strong leadership as Head of Department since 2012 and previously supported teacher development as a Specialist Leader of Education, empowering departments to excel in Computer Science. Beyond his tech expertise, Robert embraces the virtual world as an avid gamer, conquering digital battlefields when he's not coding.

James Woodhouse

Reviewer: James Woodhouse

Expertise: Computer Science & English Subject Lead

James graduated from the University of Sunderland with a degree in ICT and Computing education. He has over 14 years of experience both teaching and leading in Computer Science, specialising in teaching GCSE and A-level. James has held various leadership roles, including Head of Computer Science and coordinator positions for Key Stage 3 and Key Stage 4. James has a keen interest in networking security and technologies aimed at preventing security breaches.