(a) Following are the restatement of
the concerns over preserving confidentiality, integrity, and availability
of data. Explain each of them in brief with suitable example.
1. Interruption [2]
2. Interception [2]
3. Modification [2]
4. Fabrication [2]
(b) Provide any two reasons, why an arbiter not desirable in a protocol
for exchange of secrets? [2]
(c) Suppose a program to print paycheques secretly leaks a list of
names of
employees earning more than a certain amount each month. List any
three
controls that could be instituted to limit the vulnerability of this
leakage? [3]
(d) In the context of computer security, explain the terms threat,
vulnerability, and attack. [3]
(e) Provide any three examples of Pest Program. [3]
(f) Identify the three characteristics that makes a good
disaster plan. [3]
(g) Explain the two major differences between written and digital
signatures. [4]
(h) List any four possible consequences of the most common disasters
that can
strike a computer system. [4]
|