August 2000
SC223 : COMPUTER SECURITY

QUESTION 1 (Compulsory)

Total Marks: 30 Marks

Click here to access other questions

Click to access
SUGGESTED SOLUTIONS
for Question 1

(a) Following are the restatement of the concerns over preserving confidentiality, integrity, and availability of data. Explain each of them in brief with suitable example.
1. Interruption [2]
2. Interception [2]
3. Modification [2]
4. Fabrication [2]

(b) Provide any two reasons, why an arbiter not desirable in a protocol for exchange of secrets? [2]

(c) Suppose a program to print paycheques secretly leaks a list of names of
employees earning more than a certain amount each month. List any three
controls that could be instituted to limit the vulnerability of this leakage? [3]

(d) In the context of computer security, explain the terms threat, vulnerability, and attack. [3]

(e) Provide any three examples of Pest Program. [3]

(f) Identify the three characteristics that makes a “good” disaster plan. [3]

(g) Explain the two major differences between written and digital signatures. [4]

(h) List any four possible consequences of the most common disasters that can
strike a computer system. [4]