CSC662 Feb 2022
CSC662 Feb 2022
CSC662 Feb 2022
INSTRUCTIONS TO CANDIDATES
1. This question paper consists of two (2) parts: PART A (10 Questions)
PART B (2 Questions)
2. Answer ALL questions in the Answer Booklet. Start each answer on a new page.
Name:
Student ID:
Group:
QUESTION 1
b) Identify and describe the usage of TWO (2) cryptographic algorithms used in the
blockchain.
(6 marks)
QUESTION 2
In 2020, 61% of organizations experienced malware activity that spread from one employee
to another. In 2021, that number rose to 74%, which is the highest since the state-owned
enterprises (SOES) survey began in 2016.
a) What is malware?
(2 marks)
b) Describe THREE (3) steps taken to control the malware outbreak in a large organization
that has a network with multiple domains.
(6 marks)
QUESTION 3
The UNIX operating system (OS) design uses a "small or simple is good" approach. As a
result, every program is performing one task in a very well manner. Therefore, the OS has
become a more flexible and adaptive OS.
b) Using your answer in a), explain how UNIX grants access to any computing resources.
(6 marks)
QUESTION 4
WatchGuard reported that the network attacks have reach four million cases since the first
quarter of 2018 (WatchGuard Threat Lab, Internet Security Report, 2021).
b) Describe THREE (3) protection mechanisms that can increase the security of a computer
network.
(6 marks)
QUESTION 5
The authentication process always runs at the start of any computer system.
b) Discuss user authentication used in the Windows operating system in terms of:
i) The types of user authentication.
ii) The purpose of each authentication type.
ii) From the computer security perspective, explain the advantage of having these
distinctive authentication methods.
(6 marks)
QUESTION 6
As a security consultant, your assignment is to assess the level of security of the computing
facilities at ABC Sdn. Bhd. You have read the intrusion detection system’s (IDS) log for the
last six months and found out that there are no issues with their host-based IDS (HIDS).
According to Ms. Sherry, their head of the IT Department, there are lots of false-negative cases
for the last few months. She doesn’t know what to do as all their HIDSs are using up-to-date
signatures.
b) What is your suggestion? Give TWO (2) reasons to support your answer.
(6 marks)
QUESTION 7
Your company wants to design and develop a secure but affordable smartphone. To keep the
development cost down, you cannot use any biometric sensors. Mr. Wayne, the Security
Engineer, proposes the smartphone uses two-factor authentication by incorporating
behavioral biometrics.
QUESTION 8
As a new Security Engineer, you have found that the company’s web-based system has cross-
site scripting (XSS) attack vulnerabilities.
a) You have reported your finding to Ms. Sally, Head of the IT Department. She said that the
company’s policy is to use “secure cookies”, therefore, the system is safe. Do you agree
with her? Explain your answer.
(Note: Secure cookies are the cookies that will be sent over a secure network channel
using HTTPS rather than HTTP.)
(2 marks)
b) Explain THREE (3) mechanisms to be used to minimize the effects of XSS attacks.
(6 marks)
QUESTION 9
a) Discuss the difference between digital watermarking and encryption in terms of digital
content.
(2 marks)
b) To overcome the fake academic certificate and transcript issues, Bahagian Hal Ehwal
Akademik, UiTM plans to introduce digital academic certificates and transcripts. Identify
and discuss TWO (2) the usage of digital watermarking techniques to secure both
documents.
(6 marks)
QUESTION 10
Microsoft’s new Windows 11 operating system will require a computer security feature, the
Trusted Platform Module (TPM). The TPM is the core hardware component in trusted
computing base systems.
a) Why the TPM is consider as a Root-of-Trust (RoT) component in trusted computing based
systems?
(2 marks)
b) Explain THREE (3) TPM’s functions that enable the component being consider as RoT.
(6 marks)
QUESTION 1
Most of the modern operating systems (OS) are written in C language which due to its
architecture is very well suited to cooperate with hardware directly including that related to
computer security.
QUESTION 2
Information security and ethics are defined as an all-encompassing term that refers to all
activities needed to protect the information.
i) A set of established professional norms and behaviors which extend beyond the
workplace.
ii) A set of principles governing the conduct of all persons governed by these rules.
iii) A set of rules which a particular country or community recognizes as governing the
actions.
iv) The principles of right and wrong behavior.
v) The general quality of being morally good.
(5 marks)
i) Which component of computer security that being breached by the unethical act of the
staff?
iii) Suggest ONE (1) action need to be taken by the staff to make it an ethical act.
(5 marks)