August 1999
SC223 : COMPUTER SECURITY

QUESTION 2

Total Marks: 20 Marks

Click here to access other questions

Click to access
SUGGESTED SOLUTIONS
for Question 2

(a) External information theft and masquerading are the two categories under which we can include computer attacks.

(i) Explain each of these attacks.

(ii) Identify, with the aid of suitable examples, the type of threat associated with each type of attack.

 


[4]

[2]

(b) Explain briefly the logic bomb and trojan horse attack methods.

 

[4]
(c) (i) Explain the term cipher, and give one example of a stream cipher.

(ii) List one advantage and one disadvantage of stream cipher.

 

[2]

[2]

(d) Describe the encryption and decryption algorithms used by the RSA Implementation of public key protocol.

 

[6]