August
1999 QUESTION 2 Total Marks: 20 Marks |
Click here to access other
questions
Click to access |
(a) | External information theft and masquerading
are the two categories under which we can include computer attacks. (i) Explain each of these attacks. (ii) Identify, with the aid of suitable examples, the type of threat associated with each type of attack.
|
[4] [2] |
(b) | Explain briefly the logic bomb and trojan
horse attack methods.
|
[4] |
(c) | (i) Explain the term cipher, and give one
example of a stream cipher. (ii) List one advantage and one disadvantage of stream cipher.
|
[2] [2] |
(d) | Describe the encryption and decryption
algorithms used by the RSA Implementation of public key protocol.
|
[6] |