Waiting for answer This question has not been answered yet. You can hire a professional tutor to get the answer.

QUESTION

INFORMATION SYSTEMS SECURITY AND CRYPTOGRAPHY

1.         a.         State four reasons why physical security is needed.                                                  4 Marks

b.         Discuss briefly the benefits and limitations of asymmetric key encryption.                       5 Marks

c.         Explain briefly the five steps undertaken in risk analysis                                                5 Marks

2.         a.         Describe the procedure involved in automatic password cracking algorithm.     6 Marks

b.         Define the following terminologies:

            (i)        Patent                                                                                                              1 Mark

(ii)       Trademark                                                                                                      1 Mark

(iii)      Copyright                                                                                                        1 Mark

(iv)      Trade Secret                                                                                                    1 Mark

(v)       Privacy                                                                                                            1 Mark

c.         One of the simplest ways to prevent attackers compromising the network is to customize the settings of the network. Customization of the network settings will give the network administrators an efficient means of monitoring network traffic. They can also put restrictions on the data, and the information exchanged over the network, to prevent exposure of the company’s network, thus preventing unknown, and unauthenticated, users from accessing the network. In this regard, describe the following components of network security:

                        (i)        Firewall                                                                                                           2 Marks

(ii)       Honeypot                                                                                                        2 Marks

3.       a.       Biometric measurements or personal attributes are used for authentication. These attributes are unique to the individual seeking to authenticate identification.

(i)             List any four types of biometrics that are used for authentication            2 Marks

                        (ii)       Discuss the two types of errors that occur when biometrics are used for authentication.                                                                                                                      4 Marks

            b.         (i)        Describe briefly the software package called PGP.                                                2 Marks

            (ii)       State three things that PGP is basically used for.                                                3 Marks

Show more
LEARN MORE EFFECTIVELY AND GET BETTER GRADES!
Ask a Question