COMP 207 ACMP 280

Download as pdf or txt
Download as pdf or txt
You are on page 1of 2

COMP 207/ACMP 280

KISII UNIVERSITY
UNIVERSITY EXAMINATIONS
SECOND YEAR EXAMINATION FOR THE AWARD OF THE DEGREE OF
BACHELOR OF SCIENCE IN COMPUTER SCIENCE/
APPLIED COMPUTER SCIENCE
SECOND SEMESTER 2023/2024
[JAN – APRIL, 2024]

COMP 207/ACMP 280: COMPUTER SECURITY

STREAM: Y2 S2 TIME: 2 HOURS

DAY: WEDNESDAY, 12:00 - 2:00 P.M. DATE: 24/04/2024

INSTRUCTIONS
1. Do not write anything on this question paper.
2. Answer question ONE (Compulsory) and any other TWO questions.

QUESTION ONE [30 MARKS]

a) Explain the following terminologies as used in computer security:


i. Confidentiality (2 marks)
ii. Data integrity (2 marks)
iii. Authentication (2 marks)
iv. Non-repudiation (2 marks)
b) Describe the components of public key infrastructure (PKI). (5 marks)
c) Encrypt the message “ COMPUTER SCIENCE” using the following
functions:
(7 marks)
f(p) = (p+16) mod 26

d) Discuss the advantages and disadvantages gained by using public-key


cryptography over secret-key cryptography (10 marks)

QUESTION TWO [20 MARKS]

a) Explain when a cryptosystem is said to be secure (2 marks)


b) Differentiate between Authentication and Authorization (4 marks)

Page 1 of 2
c) The plaintext attackatdawn is written into a 3 X 4 matrix. The text is
encoded using double transposition cipher : transpose the rows
(1,2,3) according to
(3,2,1)
and then transpose the columns according to
(1,2,3,4) (4,2,1,3)
Deduce the final text. (5 marks)

d) Discuss the areas where Hash function be can used or applied in modern
cryptography (6 marks)

QUESTION THREE [20 MARKS]

a) Describe an appropriate protocol to authenticate a user to withdraw money


from an ATM machine (2 marks)
b) Using suitable examples differentiate between Rule Based Access and Role
Based Access (4 marks)
c) Explain the most common attacks on symmetric block ciphers (6 marks)
d) Differentiate between a stream cipher and a block cipher (8 marks)

QUESTION FOUR [20 MARKS]

a) Discuss citing relevant examples how poor network maintenance may


compromise the network (4 marks)
b) Explain the concept of public key infrastructure and its application to
security (6 marks)
c) Describe the Biba Access control Model pointing out the key focus of the
model
(10 marks)

QUESTION Five [20 MARKS]

a) Describe the basic building blocks of access control, citing the role of each
block (4 marks)
b) Describe network authentication and suggest the most effective way of
realizing it (8 marks)
c) Write down the security model equation and describe the causal relationship
between the components in the equation (8 marks)

Page 2 of 2

You might also like