December
1998 QUESTION 5 Total Marks: 20 Marks |
Click here to access other
questions
Click to access
|
(a) | Identify assets and determining
vulnerabilities are two steps involved in analysing the security risks associated with a
computing system. Name the other four.
|
[4] |
(b) | (i) Describe the reason for and the purpose of a security plan. | [2] |
(ii) Describe two issues which must be addressed by a security plan. | [4] | |
(iii) Name two groups which
should be represented on a security planning team.
|
[2] | |
(c) | Describe two methods of
developing and maintaining backup resources which may be used in the event of a disaster.
|
[4] |
(d) | Describe two processes which are associated with testing a disaster plan. | [4] |