December
1998 QUESTION 4 Total Marks: 20 Marks |
Click here to access other
questions
SUGGESTED SOLUTIONS
|
(a) | Separation and isolation of processes is one way in which a secure operating system can be designed. Describe three ways in which processes can be separated from each other. | [6] |
One mark should be
awarded for each valid point, and a further mark should be awarded for each satisfactory
elaboration (up to a maximum of six marks). Examples include the following:
Other sensible answers should also receive credit.
|
||
(b) | Describe three physical vulnerabilities of computer systems. | [6] |
One mark
should be awarded for each valid point, and a further mark should be awarded for each
satisfactory elaboration (up to a maximum of six marks). Examples include the following:
Other sensible answers should also receive credit.
|
||
(c) | Name four measures which might be employed to improve the security of using a PC. | [4] |
One mark should be
awarded for each valid point (up to a maximum of four marks). Examples include the
following: Other sensible answers should also receive credit.
|
||
(d) | (i) In terms of network security, what do you understand by the term traffic control? | [2] |
Traffic
control is a technique used to minimise the risk of traffic analysis by preventing
interceptors from listening to active traffic ( 1 mark). This is because it is possible
for interceptors to tap all blocks of message passing through the network, from which they
can determine who is communicating frequently with whom (1 mark). Other sensible answers should also receive credit.
|
||
(ii) Define the term pad traffic. | [2] | |
Pad
traffic deters any listener who is monitoring messages from active combination links by
generating spurious messages to all computer links (1 mark). Random noises are inserted
into the network to make it difficult for the user to differentiate noise and real signals
(1 mark). Other sensible answers should also receive credit. |