0% found this document useful (0 votes)
114 views

Assignment Cyber Security Principles 600 ASS 2

This document contains a 3 question assignment on cyber security principles. [Question 1] asks students to explain viruses, how they occur, the types of cybercrimes they can enable, and how to better protect computers. It also asks students to discuss how viruses and hacking relate to data security technologies. [Question 2] asks students to discuss software security best practices and vulnerabilities in website password retrieval systems. [Question 3] asks students about differences between Kerberos and PKI security when servers are compromised, and asks students to hypothesize threats a remote banking system may face and recommend countermeasures. The assignment is out of 100 total marks.

Uploaded by

Saieesh Ramgobin
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
114 views

Assignment Cyber Security Principles 600 ASS 2

This document contains a 3 question assignment on cyber security principles. [Question 1] asks students to explain viruses, how they occur, the types of cybercrimes they can enable, and how to better protect computers. It also asks students to discuss how viruses and hacking relate to data security technologies. [Question 2] asks students to discuss software security best practices and vulnerabilities in website password retrieval systems. [Question 3] asks students about differences between Kerberos and PKI security when servers are compromised, and asks students to hypothesize threats a remote banking system may face and recommend countermeasures. The assignment is out of 100 total marks.

Uploaded by

Saieesh Ramgobin
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

RICHFIELD

FACULTY OF INFORMATION TECHNOLOGY


Cyber Security Principles 600
ST
1 SEMESTER ASSIGNMENT
Name & Surname: _________________________________ ICAS No: _______________________________

Qualification: ______________________ Semester: _____ Module Name: __________________________

Date Submitted: ____________________

ASSESSMENT CRITERIA MARK EXAMINER MODERATOR


ALLOCATION MARKS MARKS
MARKS FOR CONTENT
QUESTION ONE 30
QUESTION TWO 30
QUESTION THREE 30

TOTAL MARKS 90
MARKS FOR TECHNICAL ASPECTS
1. TABLE OF CONTENTS
Accurate numbering according to the numbering in text 2
and page numbers.
2. LAYOUT AND SPELLING
Font – Calibri 12
3
Line Spacing – 1.0
Margin should be justified.
3. REFERENCE
5
According to the Harvard Method
TOTAL MARKS 10
TOTAL MARKS FOR ASSIGNMENT 100
Examiner’s Comments:

Moderator’s Comments:

Signature of Examiner: Signature of Moderator:


QUESTION ONE [30 MARKS]

1.1 Viruses, worms, Trojan horses, and hacking are all security issues in our computer network. Each
of these malwares or programs attaches and spreads in different ways. Through hacking hackers can
infect computers with various types or malware and viruses. Explain what viruses are, how it occurs
and the types of cybercrimes that can result from it, and how to better protect computers.
(15)

1.2 Viruses and hacking have a major impact on two main topics discussed in Computer
Information Technology. Provide Data Security Technologies and elaborate on how each is
implemented. (15)

QUESTION TWO [30 MARKS]

2.1 Discuss how developers should apply the following countermeasures to improve the security
of their code:
a) Modularity (2)
b) Coupling (2)
c) Encapsulation (2)
d) Information hiding (2)
e) Mutual suspicion (2)

2.2 If you forget your password for a website and you click [Forgot my password], sometimes the
company sends you a new password by e-mail, but sometimes it sends you your old password by
e-mail. Compare these two cases in terms of Vulnerability of the website owner.
(10)

2.3 Explain and draw how the viruses are affected on the file. (10)
QUESTION THREE [30 MARKS]

3.1 KERBOROS VERSUS PUBLIC KEY INFRASTRUCTURE

3.1.1 Consider a Kerberos system in which the central server has been silently compromised. Which
property of security has been violated from the user's Perspective? Explain. (5)

3.1.2 Consider a PKI system in which the central server has been silently compromised.
Which property of security has been violated from the user's perspective? Explain. (5)

3.2 The Internet has changed crime in a huge way. No longer does a bank robber even need to be in the
same country to rob a bank or financial institution – they can crack an unprotected web site from the
comfort of their own home. No gun or physical presence is needed to rob a store – simply monitoring a
poorly equipped store’s WLAN can provide many credit card numbers. It is hard to safeguard your
computer or prosecute criminals, when the criminal is in another country, possibly attacking through
botnets. Company approach and implement security in a variety of ways. Discuss the below questions
and make your own recommendations to base on security.

3.2.1 What confidentiality, integrity, and availability threats might such a system experience?
Hypothesize vulnerabilities in such a system that an attacker might try to exploit. (10)
3.2.2 What counter measures could be applied against these threats? (10)

TOTAL MARKS: 100

You might also like