Assignment Cyber Security Principles 600 ASS 2
Assignment Cyber Security Principles 600 ASS 2
TOTAL MARKS 90
MARKS FOR TECHNICAL ASPECTS
1. TABLE OF CONTENTS
Accurate numbering according to the numbering in text 2
and page numbers.
2. LAYOUT AND SPELLING
Font – Calibri 12
3
Line Spacing – 1.0
Margin should be justified.
3. REFERENCE
5
According to the Harvard Method
TOTAL MARKS 10
TOTAL MARKS FOR ASSIGNMENT 100
Examiner’s Comments:
Moderator’s Comments:
1.1 Viruses, worms, Trojan horses, and hacking are all security issues in our computer network. Each
of these malwares or programs attaches and spreads in different ways. Through hacking hackers can
infect computers with various types or malware and viruses. Explain what viruses are, how it occurs
and the types of cybercrimes that can result from it, and how to better protect computers.
(15)
1.2 Viruses and hacking have a major impact on two main topics discussed in Computer
Information Technology. Provide Data Security Technologies and elaborate on how each is
implemented. (15)
2.1 Discuss how developers should apply the following countermeasures to improve the security
of their code:
a) Modularity (2)
b) Coupling (2)
c) Encapsulation (2)
d) Information hiding (2)
e) Mutual suspicion (2)
2.2 If you forget your password for a website and you click [Forgot my password], sometimes the
company sends you a new password by e-mail, but sometimes it sends you your old password by
e-mail. Compare these two cases in terms of Vulnerability of the website owner.
(10)
2.3 Explain and draw how the viruses are affected on the file. (10)
QUESTION THREE [30 MARKS]
3.1.1 Consider a Kerberos system in which the central server has been silently compromised. Which
property of security has been violated from the user's Perspective? Explain. (5)
3.1.2 Consider a PKI system in which the central server has been silently compromised.
Which property of security has been violated from the user's perspective? Explain. (5)
3.2 The Internet has changed crime in a huge way. No longer does a bank robber even need to be in the
same country to rob a bank or financial institution – they can crack an unprotected web site from the
comfort of their own home. No gun or physical presence is needed to rob a store – simply monitoring a
poorly equipped store’s WLAN can provide many credit card numbers. It is hard to safeguard your
computer or prosecute criminals, when the criminal is in another country, possibly attacking through
botnets. Company approach and implement security in a variety of ways. Discuss the below questions
and make your own recommendations to base on security.
3.2.1 What confidentiality, integrity, and availability threats might such a system experience?
Hypothesize vulnerabilities in such a system that an attacker might try to exploit. (10)
3.2.2 What counter measures could be applied against these threats? (10)