Get premium membership and access revision papers, questions with answers as well as video lessons.
Got a question or eager to learn? Discover limitless learning on WhatsApp now - Start Now!

Information Systems Security And Cryptography Question Paper

Information Systems Security And Cryptography 

Course:Bachelor Of Science In Information Technology

Institution: Kca University question papers

Exam Year:2010



UNIVERSITY EXAMINATIONS: 2010/2011
THIRD YEAR EXAMINATION FOR THE DEGREE OF BACHELOR OF
SCIENCE IN INFORMATION TECHNOLOGY
BIT 3102: INFORMATION SYSTEMS SECURITY AND CRYPTOGRAPHY
DATE: DECEMBER 2010 TIME: 2 HOURS
INSTRUCTIONS: Answer question ONE and any other TWO questions
QUESTION ONE
a) Define the following terminologies as used in computer security
i) Cryptanalysis (1 Mark)
ii) Dictionary attack (1 Mark)
iii) Biometrics (1 Mark)
iv) Hash function (1 Mark)
v) Differential backup (1 Mark)
b) Discuss any five ways in which cryptographic algorithms are compromised. (5 Marks)
c) Describe any five practices that should be enhanced in order to combat computer fraud within an
organization. (5 Marks)
d) Describe the stages of a virus life (4 Marks)
e) Describe any four IDS categories. (4 Marks)
f) Explain four possible decisions that are made in response to the introduction of risk (4 Marks)
g) Explain the three things that an attacker must have in order to launch a successful attack on any
system. (3 Marks)
2
QUESTION TWO
a) Identify the tools used to establish secure Internet communication channels (6 Marks)
b) Outline the key steps involved in developing a security plan (5 Marks)
c) To trust any program, we base our trust on rigorous analysis and testing, looking for certain key
characteristics. Explain briefly four of these characteristics (4 Marks)
d) The basis of protection is separation: keeping one user’s objects separate from other users. Explain
briefly four major ways that separation in an operating system can occur. (4 Marks)
e) Define the term cryptography (1 Mark)
QUESTION THREE
a) With the aid of relevant examples, describe what three types of information can be used to
authenticate a user. (6 Marks)
b) Describe any five major classifications of threats (5 Marks)
c) Describe five application areas in the current market that computer forensics provides support to.
(5 Marks)
d) Identify tools used to protect networks, servers, and clients (4 Marks)
QUESTION FOUR
a) Outline any four common motivations for companies to seek outside security help. (4 Marks)
b) Explain briefly any four categories of Managed Security Services (4 Marks)
c) Discuss the benefits and limitations of asymmetric key encryption. (6 Marks)
d) With the aid of relevant examples, explain how digital signatures are used to create signed computer
programs. (6 Marks)
QUESTION FIVE
a) Describe the ECB and CBC block cipher modes that are used in symmetric key encryption.
(4 Marks)
b) Discuss in detail the following common applications of digital signatures
(i) Authenticating Web servers. (2 Marks)
(ii) Electronic money (digital cash). (2 Marks)
(iii) Timestamping services. (2 Marks)
c) Describe how secret key encryption is used in protecting pay TV transmissions (6 Marks)
d) An operating system environment contains various software control functions that help to secure
systems during software development. Describe briefly any four of these software control
functions. (4 Marks)






More Question Papers


Popular Exams



Return to Question Papers