Академический Документы
Профессиональный Документы
Культура Документы
Network Security
Cohort: BCNS/16A/FT
Instructions to Candidates:
Page 1 of 3
Data and Network Security (SECU2123C) SITE/June 2016/2017 Sem 2
QUESTION 1: (25 MARKS)
(a) With the advancement in technology, Information Security is faced with many
threats. List and explain four (4) types of threats to information security.
(12 marks)
(c) (i) What kind of information can a Packet Sniffer capture that can pose a threat
to Information Security? (1 mark)
(ii) What can be done to protect this information? (2 marks)
(d) List three (3) types of password cracking method commonly used. (3 marks)
(a) Access Control is one of the most important protection mechanism being used to
enforce security. Describe the four (4) processes included in Access Control.
(8 marks)
(d) List five (5) best practices when managing System Management Log.
(5 marks)
Page 2 of 3
Data and Network Security (SECU2123C) SITE/June 2016/2017 Sem 2
QUESTION 3: (25 MARKS)
(b) Encrypt the below Playfair Cipher using the Key: STRONG. Show your workings.
SECURITY IS A TEAM EFFORT. (8 marks)
(c) Calculate the public (e, n) and private (d, n) RSA keys, given the values of the
primes are p=23, q=41 and choosing e=7. Show all your workings. (10 marks)
(b) List the four (4) properties of a ideal hash function. (4 marks)
(c) With the aid of a diagram, explain how hashing ensures confidentiality,
authentication and integrity. (7 marks)
(d) Secure Socket Layer (SSL) consists of various security protocols. With the aid of
a diagram show the different messages exchange in the Handshake Protocol.
(9 marks)
(e) Quantum cryptography is the only known method for transmitting a secret key
over distance that is based on the laws of physics.
(i) Explain why eavesdropping in difficult in Quantum Cryptography. (2 marks)
(ii) Give two (2) problems with Quantum Cryptography. (2 marks)
Page 3 of 3
Data and Network Security (SECU2123C) SITE/June 2016/2017 Sem 2