Get premium membership and access revision papers, questions with answers as well as video lessons.

Cisy 431:Information Systems Security Question Paper

Cisy 431:Information Systems Security 

Course:Computer Information Systems

Institution: Kenya Methodist University question papers

Exam Year:2012



KENYA METHODIST UNIVERSITY

END OF 2''ND ''TRIMESTER 2012 (DAY) EXAMINATIONS
FACULTY : COMPUTING AND INFORMATICS
DEPARTMENT : COMPUTER INFORMATION SYSTEM
UNIT CODE : BBIT 443/CISY 431
UNIT TITLE : INFORMATION SYSTEMS SECURITY.
TIME : 2 HOURS




Instructions:

Question One

Describe any three intrusion detection methods and for each intrusion category describe a suitable prevention mechanism.

(6mks)

With the aid of a suitable diagram describe the general process followed in the symmetric key cryptography. State areas where such a security mechanism can be implemented.

(6mks)

Briefly describe the logical control mechanism to information security.

(5mks)

Describe the following as used in information system security.

(6mks)

Cryptography
Non-repudiation
Auditing
Cepher
Firewall
Stealth

Outline three problems associated with passwords.

(3mks)

Discuss any two types of firewalls.

(4mks)

Question Two

Devising an information systems security policy can be complex. Discuss this statement highlighting the goals of a security policy. (10mks)

Distinguish the following public key cryptography and secret key encryption.

(10mks)

Question Three

What is meant by DRP and BCP? Discuss the relationship between the two as used in information systems security. (8mks)

What is the connection between ethics in the society and ethics in information systems?

(8mks)

Give the difference between a hacke and a cracker.

(4mks)

Question Four

With the aid of a suitable example describe how the following can be used to protect email system.

(9mks)

S/MIME
PEM
Pap

Discuss how the following access control the chanisms work. For each, state any benefit of implementing them.

(9mks)

Access control lists
Capability list
Access control matrices

Distinguish between active and passive wiretapping. Show where each can be applied.

(2mks)






More Question Papers


Popular Exams



Return to Question Papers