CCF-3100-FUNDAMENTALS-OF-PC-SECURITY-AND-PRIVACY-2 (1)

Download as pdf or txt
Download as pdf or txt
You are on page 1of 3

MERU UNIVERSITY OF SCIENCE AND TECHNOLOGY

P.O. Box 972-60200 – Meru-Kenya.


Tel: +254(0) 799 529 958, +254(0) 799 529 959, +254 (0)712 524 293
Website: www.must.ac.ke Email: [email protected]

University Examinations 2020/2021

SECOND YEAR FIRST SEMESTER EXAMINATIONS FOR BACHELOR OF SCIENCE


IN COMPUTER SCIENCE AND BACHELOR OF SCIENCE IN COMPUTER SECURITY
AND FORENSICS

CCF 3100: FUNDAMENTALS OF PC SECURITY AND PRIVACY

DATE: JULY 2021 TIME: 2 HOURS

INSTRUCTIONS: Answer Question ONE and any other Two questions.

QUESTION ONE (30 MARKS)

a) Using examples distinguish between passive attack and active attack in information
security (4 Marks)
b) Explain three types of intruders in security attacks (6 Marks)
c) Describe any three malicious software that may negatively affect some organization
information systems (6 Marks)
d) Using an example describe any three main types of hackers (6 Marks)
e) Define the following terms as used with information systems security: (4 Marks)
i. Threat
ii. Vulnerability
iii. Exposure
iv. Attack
f) Mark is a senior librarian at Bidii University. One of his roles is to assign his staff and
information system user’s access to the digital resources. List four techniques that Mark
can use to avoid guessable passwords (4 Marks)

Meru University of Science & Technology is ISO 9001:2015 Certified


Foundation of Innovations Page 1
QUESTION TWO (20 MARKS)
a) List five benefits that can be provided by intrusion detection systems and Intrusion
Prevention Systems in protecting an organization records (5 Marks).
b) Meru University has been advised by information security experts to use Firewall to
protect its network. Explain what a firewall is and briefly explain any two types of
firewall that Meru University can use. (5 Marks)
c) Define the following types of security threats (4 Marks)
i. Sniffing
ii. Phishing
iii. Social Engineering
iv. IP Spoofing
d) Data loss can be costly to any organization. Describe three strategies to avoid data loss
(6Marks)

QUESTION THREE (20 MARKS)


a) You have been introduced to the security goals within the context of computer and
network security that each organization strives to achieve. Describe any five of these
security goals. (10 Marks)
b) Explain three Access Control Techniques used in designing secure architectures
(6 Marks)
c) Highlight four ways that an organization like Safaricom can use to achieve access control
to secure their customers information (4 Marks)
QUESTION FOUR (20 MARKS)
a) Using a diagram explain the concept of CIA in information security architecture and
design (6 Marks)
b) Differentiate between Security Plan and Security Policy (2 Marks)
c) State the three components of an operating system security environment (3 Marks)
d) Bell and La Padula Model (BLP), Chinese Wall model, Biba model and Clark-Wilson
models are commonly security models used to achieve different security services. Outline
the security service achieved by each of the above security models. (4 Marks)
e) Highlight five basic privacy protection principles (5 Marks)

Meru University of Science & Technology is ISO 9001:2015 Certified


Foundation of Innovations Page 2
QUESTION FIVE (20 MARKS)
a) Tumaini Company wants to allow it employee to access the organization database.
Describe three different approaches that can be used for user authentication by Tumaini.
(6 Marks)
b) The platform for Privacy Preferences Project (P3P) is a web technique that aims at
achieving privacy of web applications which is guided by five principles to maximize on
privacy. List these five P3P guiding principles (5 Marks)
c) Trust is not transitive using an example explain what this statement means in computer
and network security (2 Marks)
d) Describe how the following work to offer protection against bots
i. CAPTCHA (2 Marks)
ii. 2-Step Verification (2 Marks)
e) Using an example briefly describe the following forms of attacks (3 Marks)
i. Brute-force cryptanalytic attack
ii. Man-in-the-middle attack
iii. Denial-of-service attack

Meru University of Science & Technology is ISO 9001:2015 Certified


Foundation of Innovations Page 3

You might also like