For IndividualsFor Educators
ExpertMinds LogoExpertMinds
ExpertMinds

Ace your certifications with Practice Exams and AI assistance.

  • Browse Exams
  • For Educators
  • Blog
  • Privacy Policy
  • Terms of Service
  • Cookie Policy
  • Support
  • AWS SAA Exam Prep
  • PMI PMP Exam Prep
  • CPA Exam Prep
  • GCP PCA Exam Prep

© 2026 TinyHive Labs. Company number 16262776.

    PracticeAQA GCSEAQA GCSE Computer Science Paper 2Question 15.1
    Easy2 marksStructured
    Cyber securityGeneralcyber securitypasswordsauthentication

    AQA GCSE · Question 15.1 · Cyber security

    State two issues with only using usernames and passwords in an authentication system.

    How to approach this question

    Think about human behaviour and external threats. How do people typically choose and manage their passwords? What methods can attackers use to steal passwords?

    Full Answer

    1. **Weak Passwords:** People often choose passwords that are easy to guess (e.g., "123456", "password") or reuse the same password across multiple services. 2. **Vulnerability to Phishing/Theft:** Passwords can be stolen through phishing attacks, social engineering, or data breaches on websites, compromising the user's account.
    Using only usernames and passwords for authentication, while common, has several significant security weaknesses: 1. **Human Factor - Weak Passwords:** Users frequently create weak, short, or easily guessable passwords (like "password123" or a pet's name) to make them easier to remember. They also tend to reuse the same password across many different websites. This makes them vulnerable to guessing or brute-force attacks. 2. **Susceptibility to Theft:** Passwords can be stolen through various means. **Phishing** attacks trick users into entering their credentials on fake websites. **Data breaches** at companies can expose databases of usernames and passwords. **Spyware** or **keyloggers** installed on a user's computer can capture keystrokes and steal passwords directly.

    Common mistakes

    ✗ Stating solutions instead of issues (e.g., "you should use 2FA"). ✗ Vague answers like "it's not secure". ✗ Listing two very similar points (e.g., "easy to guess" and "not complex").
    Question 14.5All questionsQuestion 15.2

    Practice the full AQA GCSE Computer Science Paper 2

    46 questions · hints · full answers · grading

    Sign up freeTake the exam

    More questions from this exam

    Q01.1Convert the binary number 11010100 into decimal.EasyQ01.2Convert the binary number 10111001 into hexadecimal. You should show your working.MediumQ01.3State the largest decimal number that can be represented using 6 bits.EasyQ02.1Add together the following three binary numbers and give your answer in binary. 00110110 1001...MediumQ02.2Apply a binary shift three places to the right on the bit pattern 10101000. Give the result using...Easy
    View all 46 questions →