August
1999 QUESTION 1 (Compulsory) Total Marks: 20 Marks |
Click here to access other
questions
SUGGESTED SOLUTIONS |
(a) | Explain the characteristics of computer intrusion. | [2] |
In any system, the
weakest point is the most vulnerable. One can expect an intruder to use any available
means of penetration.
|
||
(b) | Explain briefly the purpose of a public key protocol. | [2] |
Used between
communicating entities to authenticate systems. Also used to hide the messages.
|
||
(c) | Identify any two major goals of legal issues in computer security. | [2] |
|
||
(d) | Name the two basic methods by which a system can provide security. | [2] |
System Access Controls
(1 mark) and Data Access Controls.
|
||
(e) | Identify and explain any two categories of vulnerabilities in PC security. | [4] |
|
||
(f) | List three advantages and one disadvantage of conducting a disaster simulation. | [4] |
Advantages:
|
||
(g) | List and explain the different forms of non-repudiation services provided in networks. | [4] |
Nonrepudiation with
proof of origin: proof of origin is provided to the recipient of the message.
Nonrepudiation with proof of delivery: proof of delivery is provided to the sender of a
message.
|