Get premium membership and access revision papers, questions with answers as well as video lessons.
Got a question or eager to learn? Discover limitless learning on WhatsApp now - Start Now!

Ccs 309:Information Systems Security And Design Question Paper

Ccs 309:Information Systems Security And Design 

Course:Bachelor Of Science In Computer Science

Institution: Maseno University question papers

Exam Year:2016



SECTION A(COMPULSORY)
QUESTION ONE(30 MARKS)
a)Define the following terms.(8mks)
i)Authenticity
ii)Availability
iii)Non-Repudiation
iv)Integrity
v)Reliability
b)Differentiate between data owner and data custodian(4mks)
c)Briefly describe any three strengths and three limitations of Intrusion Detection and Prevention Systems. (6mks)
d)What are the general causes of unethical and illegal behaviour in relation to information systems security. (6mks)
e)State and briefly explain any six ethical concepts in information security.(6mks)

SECTION B(ATTEMPT ANY TWO QUESTIONS)
QUESTION TWO(20 MARKS)
a)Information is valuable therefore information systems are valuable.In a network security setting, a compromise of Information Security Services(C-I-A) would have real consequences (loss),explain(10mks)
b)What would you understand by the term"Business value of security and control" when discussing information systems security?(5mks)
c)List some of the technologies and tools necessary for security and control. (5mks)

QUESTION THREE(20 MARKS)
Describe how the various types of firewalls interact with the network traffic at various levels of the OSI model.(8mks)

QUESTION FOUR(20 MARKS)
a)What is risk management ?Why is the identification of risks ,by listing assets and their vulnerabilities, so important to the risk management process?(8mks)
b)What is information security governance? Who in the organization should plan for it?(5mks)
c)Define the term information security and state the components of information security. (5mks)
d)How can a security framework assist in the design and implementation of a security infrastructure? (3mks)

QUESTION FIVE(20 MARKS)
a)Define the following teems ;intrusion and detection (4mks)
b)Why use an Intrusion Detection and Prevention System? (6mks)
c)State and briefly explain any five types of IDPS.(10mks)






More Question Papers


Popular Exams



Return to Question Papers