April 1999
SC223: COMPUTER SECURITY

QUESTION 4

Total Marks: 20 Marks

Click here to access other questions

GRADE A
Sample student's solutions are indicated in green.
Return to Question 4

 

(a) List two types of attack which are possible over communication lines. [2]
One such attack is receipt of a message from a masquerading sender. Another attack is the disclosure of information to an unauthorized individual.

 

(b) Describe the security considerations associated with twisted pair and coaxial cable. [4]
Twisted pair and coaxial are both prone to wiretapping. An intruder can slice off the jacket and intercept the message. The intruder can listen, tapping the message, recording it and play it back later. Another area of security problem of twisted pair and coaxial is that the junction boxes are points of vulnerabilities. A malicious individual can tap into the junction box to tap the transmission.

 

(c) (i) List two services provided by a firewall. [2]
One service provided by a firewall is to prevent unauthorized interactive login from the outside world.
Another service provided by a firewalls that is is a checkpoint where security and control functions can be imposed.

 

(ii) List two drawbacks associated with firewalls. [2]
One drawback of a firewall is that it cannot protect against viruses. Another drawback of a firewall is that it cannot protect against data-driven attack.

 

(d) Describe how biometrics devices are used to provide positive identification. [2]
Biometrics devices works on the concept of something you are. It deals with the physiological or behavioral traits of a person. The biometrics system has a database that contains records of a person's physiological or behavioral traits depending on the devices used. n authorized individual's traits are scanned in by the device. This information is read and translated; and matched against the database. If a match is found, the person is authorized.

 

(e) Describe how each of the following provide access control services. [2]
(i) Access control lists. [2]
An access control lists contains a set of accounts, individuals, or processes with the associated level of access for each. Base on this list maintained, appropriate level of restrictions can be imposed. Hence, access is controlled.

 

(ii) Logical networking controls.
In logical networking controls, individuals, resources are separated into logical groups of subnetworks. An access level or different access rights are imposed on each subnetwork. Individuals have access and restriction based on which subnetwork that they belong to.

 

(f) Describe two forms of non-repudiation service. [4]
There are two forms of non-repudiation service.
One form is non-repudiation with proof of origin. This service allow to verify that the identity of the origin is authentic.
The other form is non-repudiation with proof of delivery. This service ensures that the message is delivered to the intended recipient.