Download as pdf
Download as pdf
You are on page 1of 1
3. Access control mechanisms implement controls on subjects and objects. Access control lists bind the data controlling access to the object. Capability lists bind that data to the subject. Locks and keys distribute the data between the subject and the object. However, some issues need to be addressed. 3 Explain why some UNIX-based systems with access control lists do not allow root to alter the ACL. What problems might this raise? [5 Marks] b. Write detailed notes on the following; i. Discretionary access control [5 Marks] ii. Mandatory access control [5 Marks] ili. Clark-Wilson integrity [5 Marks] Sj, Public-key cryptography refers to a cryptographic system requiring two separate Keys, one to lock or encrypt the plaintext, and one to unlock or decrypt the cyphertext. There exist a couple of schemes that take advantage of this cryptographic system to yield security ina more deserving manner. One such scheme is the ElGamal encryption system. @ Write detailed notes on the ElGamal encryption system. Use diagrams or ilustrations in your explanation and include all the three components of the system. Give advantages, disadvantages and applications. [10 Marks] @)write detailed notes on RSA and give two examples of where it is applied in the field of computer security. [5 Marks] © Give examples of three asymmetric encryption algorithms. [3 Marks] {@) Give four examples of secure protocols that use asymmetric type of encryption. [2 Marks] G Sa ca Dmare — t i cae gee

You might also like