Professional Documents
Culture Documents
Bit 2317 (Naks) Fundamentals of Computer Security
Bit 2317 (Naks) Fundamentals of Computer Security
W1-2-60-1-6
JOMO KENYATTA UNIVERSITY
OF
AGRICULTURE AND TECHNOLOGY
(i) Bating.
(ii) Vishing.
(iii) Pretexting.
(iv) Pharming.
(v) Sniffers.
(b) A successful organization should have the multiple layers of security in place to
protect its operations. Explain any five of these layers. [5 marks]
(d) (i) Illustrate the key difference between digital signatures and digital certificates.
[4 marks]
(ii) Discuss three components of pK1. [6 marks]
1
BIT 2317
(i) Espionage.
(ii) Deviations in quality of service.
(iii) Information extortion.
(iv) Technological obsolescence.
(b) Explain the following terms as used in computer security policies: [3 marks]
(i) Laws.
(ii) Ethics.
(iii) Policies.
(ii) Firewall falls into five major processing-mode categories. List and explain
any three. [6 marks]
2
BIT 2317
(a) Implementing information security involves identifying specific threats and creating
specific threats. Using an illustration, describe the Sec SDLC that unifies this
process into a coherent program as opposed to a series of random and unconnected
actions. [10 marks]
(b) (i) What is meant by the term risk management? [1½ marks]
(ii) Risk management involves three major undertakings. List and explain them.
[6 marks]
(iii) List any five basic strategies used to control the risks. [2½ marks]