1. a. State four reasons why physical security is needed. 4 Marks
b. Discuss briefly the benefits and limitations of asymmetric key encryption. 5 Marks
c. Explain briefly the five steps undertaken in risk analysis 5 Marks
2. a. Describe the procedure involved in automatic password cracking algorithm. 6 Marks
b. Define the following terminologies:
(i) Patent 1 Mark
(ii) Trademark 1 Mark
(iii) Copyright 1 Mark
(iv) Trade Secret 1 Mark
(v) Privacy 1 Mark
c. One of the simplest ways to prevent attackers compromising the network is to customize the settings of the network. Customization of the network settings will give the network administrators an efficient means of monitoring network traffic. They can also put restrictions on the data and the information exchanged over the network to prevent exposure of the companys network thus preventing unknown and unauthenticated users from accessing the network. In this regard describe the following components of network security:
(i) Firewall 2 Marks
(ii) Honeypot 2 Marks
3. a. Biometric measurements or personal attributes are used for authentication. These attributes are unique to the individual seeking to authenticate identification.
(i) List any four types of biometrics that are used for authentication 2 Marks
(ii) Discuss the two types of errors that occur when biometrics are used for authentication. 4 Marks
b. (i) Describe briefly the software package called PGP. 2 Marks
(ii) State three things that PGP is basically used for. 3 Marks
INFORMATION SYSTEMS SECURITY AND CRYPTOGRAPHY 1
March 18th, 2019 admin