CCF-3100-FUNDAMENTALS-OF-PC-SECURITY-AND-PRIVACY-2 (1)
CCF-3100-FUNDAMENTALS-OF-PC-SECURITY-AND-PRIVACY-2 (1)
CCF-3100-FUNDAMENTALS-OF-PC-SECURITY-AND-PRIVACY-2 (1)
a) Using examples distinguish between passive attack and active attack in information
security (4 Marks)
b) Explain three types of intruders in security attacks (6 Marks)
c) Describe any three malicious software that may negatively affect some organization
information systems (6 Marks)
d) Using an example describe any three main types of hackers (6 Marks)
e) Define the following terms as used with information systems security: (4 Marks)
i. Threat
ii. Vulnerability
iii. Exposure
iv. Attack
f) Mark is a senior librarian at Bidii University. One of his roles is to assign his staff and
information system user’s access to the digital resources. List four techniques that Mark
can use to avoid guessable passwords (4 Marks)