Вы находитесь на странице: 1из 3

BSc (Hons) Computer Science with

Network Security
Cohort: BCNS/16A/FT

Examinations for 2017 / Semester 1

MODULE: Data and Network Security I


MODULE CODE: SECU2123C

Duration: 2 hours 15 mins

Instructions to Candidates:

1. Answer all 4 questions.


2. Questions may be answered in any order but your answers must
show the Question number clearly.
3. Always start a new question on a fresh page.
4. Total marks to be scored: 100

This question paper contains 4 questions and 3 pages.

Page 1 of 3
Data and Network Security (SECU2123C) SITE/June 2016/2017 Sem 2
QUESTION 1: (25 MARKS)

(a) With the advancement in technology, Information Security is faced with many
threats. List and explain four (4) types of threats to information security.
(12 marks)

(b) (i) Why is a Trojan Horse hard to detect? (3 marks)


(ii) Give four (4) damages that a Trojan Horse can do. (4 marks)

(c) (i) What kind of information can a Packet Sniffer capture that can pose a threat
to Information Security? (1 mark)
(ii) What can be done to protect this information? (2 marks)

(d) List three (3) types of password cracking method commonly used. (3 marks)

QUESTION 2: (25 MARKS)

(a) Access Control is one of the most important protection mechanism being used to
enforce security. Describe the four (4) processes included in Access Control.
(8 marks)

(b) Multi-factor authentication uses different types/combinations of authentication


factors. List the four (4) factors with an appropriate example for each of them.
(4 marks)

(c) (i) Define the Principle of Least Privilege (POLP). (3 marks)


(ii) List five (5) benefits of POLP. (5 marks)

(d) List five (5) best practices when managing System Management Log.
(5 marks)

Page 2 of 3
Data and Network Security (SECU2123C) SITE/June 2016/2017 Sem 2
QUESTION 3: (25 MARKS)

(a) Decrypt the below Caesar cipher. Show your workings.


GHDU JRG PDNH PH SDVV WKLV PRGXOH (5 marks)

(b) Encrypt the below Playfair Cipher using the Key: STRONG. Show your workings.
SECURITY IS A TEAM EFFORT. (8 marks)

(c) Calculate the public (e, n) and private (d, n) RSA keys, given the values of the
primes are p=23, q=41 and choosing e=7. Show all your workings. (10 marks)

(d) What is the difference between Cryptography and Steganography? (2 marks)

QUESTION 4: (25 MARKS)

(a) What is a message digest? (1 mark)

(b) List the four (4) properties of a ideal hash function. (4 marks)

(c) With the aid of a diagram, explain how hashing ensures confidentiality,
authentication and integrity. (7 marks)

(d) Secure Socket Layer (SSL) consists of various security protocols. With the aid of
a diagram show the different messages exchange in the Handshake Protocol.
(9 marks)
(e) Quantum cryptography is the only known method for transmitting a secret key
over distance that is based on the laws of physics.
(i) Explain why eavesdropping in difficult in Quantum Cryptography. (2 marks)
(ii) Give two (2) problems with Quantum Cryptography. (2 marks)

***END OF QUESTION PAPER***

Page 3 of 3
Data and Network Security (SECU2123C) SITE/June 2016/2017 Sem 2