August 2000
SC223 : COMPUTER SECURITY

QUESTION 1 (Compulsory)

Total Marks: 30 Marks

Click here to access other questions

SUGGESTED SOLUTIONS
Solutions and allocated marks are indicated in green.
Return to
Question 1

(a) Following are the restatement of the concerns over preserving confidentiality, integrity, and availability of data. Explain each of them in brief with suitable example.
1. Interruption [2]
2. Interception [2]
3. Modification [2]
4. Fabrication [2]
Interruption:
- An asset of the computer system becomes lost, unavailable, or
unusable.
- eg; malicious destruction of a hardware device or erasure of a
program or file.
Interception:
- Means unauthorised party gaining access to an computer asset.
- eg; wiretapping to obtain data in network.
Modification:
- Means unauthorised party not only gaining access but tampers with
an asset.
- eg; change the values in database, alter a program etc.
Fabrication:
- Means insert spurious transactions to a network communication
system or add records to a existing database.


(b) Provide any two reasons, why an arbiter not desirable in a protocol for exchange of secrets? [2]
- Sender and receiver may not be able to find a neutral third party
- Arbitration causes a time delay in communication
- Secrecy becomes vulnerable, because the arbiter has access to
sensitive information
(Any two, 1 mark each)

(c) Suppose a program to print paycheques secretly leaks a list of names of
employees earning more than a certain amount each month. List any three
controls that could be instituted to limit the vulnerability of this leakage? [3]
- Do not leave the printer unattended
- Dispose the draft copy and the printer ribbon that may disclose the
characters printed
- Prevent unauthorised visitors or intruders (1 mark each)

(d) In the context of computer security, explain the terms threat, vulnerability, and attack. [3]
Threat: is a circumstance or occurrence that has the potential to cause
harm, or affect the assets and resources of a system (1 mark)
Vulnerability: is an unfortunate characteristics that makes it possible for threat to be offered; a weakness in the security system that might be exploited (1 mark)
Attack: is some action taken by a human, exploiting some vulnerability (1 mark)


(e) Provide any three examples of Pest Program. [3]
- Trojan Horse
- Virus
- Worm
- Logic Bomb (any three, 1 mark each)

(f) Identify the three characteristics that makes a “good” disaster plan. [3]
- Should provide provision to test and refine the plan with regular
training exercise
- Make provision for maintaining and improvements when required
- Support from the top management should exist
(1 mark each)


(g) Explain the two major differences between written and digital signatures. [4]
Written signature is physically appended to a given document by means
of paper that contains both message and signature (1 mark), whereas a
digital signature is separate from the document being signed (1 mark). A written signature is the same for all documents, (1 mark), whereas a
digital signature depends on the document being signed (1 mark).


(h) List any four possible consequences of the most common disasters that can
strike a computer system. [4]
- The loss of vital business records
- The loss of communication systems
- The possible failure of computer security systems
- The inability to use important programs
Other answers are possible. (1 mark each)