December
1998 QUESTION 5 Total Marks: 20 Marks |
Click here to access other
questions
Click to access
|
| (a) | Identify assets and determining
vulnerabilities are two steps involved in analysing the security risks associated with a
computing system. Name the other four.
|
[4] |
| (b) | (i) Describe the reason for and the purpose of a security plan. | [2] |
| (ii) Describe two issues which must be addressed by a security plan. | [4] | |
| (iii) Name two groups which
should be represented on a security planning team.
|
[2] | |
| (c) | Describe two methods of
developing and maintaining backup resources which may be used in the event of a disaster.
|
[4] |
| (d) | Describe two processes which are associated with testing a disaster plan. | [4] |