December
1998 QUESTION 5 Total Marks: 20 Marks |
Click here to access other
questions
SUGGESTED SOLUTIONS
|
(a) | Identify assets and determining vulnerabilities are two steps involved in analysing the security risks associated with a computing system. Name the other four. | [4] |
One mark should be
awarded for each valid point.
|
||
(b) | (i) Describe the reason for and the purpose of a security plan. | [2] |
The
reason for a security plan is to describe how an organisation will address its security
needs (1 mark). The purpose of a security plan is to identify and organise the security
activities of a computing system (1 mark). Other sensible answers should also receive credit.
|
||
(ii) Describe two issues which must be addressed by a security plan. | [4] | |
One mark should be
awarded for each valid point, and a further mark should be awarded for a satisfactory
elaboration (up to a maximum of four marks).
|
||
(iii) Name two groups which should be represented on a security planning team. | [2] | |
One mark
should be awarded for each valid point (up to a maximum of two marks).
|
||
(c) | Describe two methods of developing and maintaining backup resources which may be used in the event of a disaster. | [4] |
One mark
should be awarded for each valid point, and a further mark should be awarded for a
satisfactory elaboration (up to a maximum of four marks).
Other sensible answers should also receive credit.
|
||
(d) | Describe two processes which are associated with testing a disaster plan. | [4] |
One mark
should be awarded for each valid point, and a further mark should be awarded for a
satisfactory elaboration (up to a maximum of four marks).
|