Get premium membership and access revision papers, questions with answers as well as video lessons.

Bit 2317/Ics 2401: Fundamentals Of Computer Security /Computer Security And Cryptography Question Paper

Bit 2317/Ics 2401: Fundamentals Of Computer Security /Computer Security And Cryptography 

Course:Bachelor Of Science In Information And Technology

Institution: Jomo Kenyatta University Of Agriculture And Technology question papers

Exam Year:2013



JOMO KENYATTA UNIVERSITY
OF
AGRICULTURE AND TECHNOLOGY
University Examinations 2012/2013
STAGE THREE FIRST SEMESTER EXAMINATION FOR THE DEGREE OF BACHELOR OF SCIENCE IN INFORMATION TECHNOLOGY AND STAGE THREE SECOND SEMESTER EXAMINATION FOR THE DEGREE OF BACHELOR OF BUSINESS INFORMATION TECHNOLOGY
BIT 2317/ICS 2401: FUNDAMENTALS OF COMPUTER SECURITY /COMPUTER SECURITY AND CRYPTOGRAPHY
DATE: APRIL 2013 TIME: 2 HOURS
INSTRUCTIONS: Answer Question ONE and any other TWO Question

Question One (30 Marks)

a) In order for an organization to retain a competitive advantage and to meet the basic business requirements, there is need for it to endeavor towards achieving certain security goals. Explain any THREE (3) of these security goals. (3 Marks)

b) By using examples in each case distinguish between a hazard and a threat. (2 Marks)

c) Explain any THREE (3) responsibilities of the administration in ensuring security of the computer resources in their organization. (3 Marks)

d) Explain FOUR (4) aspects of risk management as relates to protection of data and resources in an enterprise. (4 Marks)

e) Highlight FOUR (4) objectives that any application control will aim at achieving in a computer system. (4 Marks)

f) Briefly explain the following data validation edits

(i) Sequence checks (1 Mark)

(ii) Limit checks (1 Mark)
g) Explain THREE (3) reasons as to why even if biometrics are the most effective form of identification, they are however rarely used. (3 Marks)

h) Briefly explain the following forms of technical exposures

(i) Data diddling (1 Mark)

(ii) Trap doors (1 Mark)

(iii) Salami techniques (1 Mark)

i) Describe any THREE (3) hardware tactics of reducing the risk of virus infection. (3 Marks)

j) Explain THREE (3) areas of risk and concern in a client/server environment. (3 Marks)

Question Two (20 Marks)

a (i) What is encryption? (2 Marks)

(ii) Explain the THREE (3) key elements of an encryption system. (6 Marks)

(iii) Describe the TWO (2) common cryptographic systems. (4 Marks)

b) In any organization, an existing and enforced security policy should ensure systems conformity with laws and regulations, integrity of data, its confidentiality and above all its availability. Describe the FOUR (4) key components of such a policy. (8 Marks)

Question Three (20 Marks)

a) Use block cipher permutation to encipher the following message for secure transmission across the internet.

(i) WE HAVE A MEETING TODAY IN THE OFFICE (6 Marks)

(ii) I AM TRAVELLING TO NIGERIA TOMORROW IN THE EVENING (6 Marks)

b) Logical security into the computer can be gained through several avenues. Explain any FOUR (4) of such avenues and the appropriate level of access security that should be subjected to each avenue. (8 Marks)





Question Four (20 Marks)

a) Environmental exposures are primarily due to naturally occurring events. However, with proper controls, exposure to these elements can be controlled. Discuss FIVE (5) controls over environmental exposures. (10 Marks)

b) The very nature of the internet makes it vulnerable to attack. Discuss FIVE (5) main internet threats which can be experienced by an organization connected to the internet. (10 Marks)

Question Five (20 Marks)

a (i) Explain briefly how a digital signature works. (3 Marks)

(ii) Describe THREE (3) security features provided for by digital signatures to messages on transit. (6 Marks)

b) Describe SIX (6) format roles usually prescribed for passwords to make them strong security access control mechanisms. (6 Marks)

c) Describe FIVE (5) tasks performed by a firewall in ensuring security of a computer system. (5 Marks)






More Question Papers


Popular Exams



Return to Question Papers