Question One
a. Give the idea of the principle of easiest Penetration. 2 marks
b. What is a port scan used for? 2 marks
c. Explain about the boot sector viruses. 3 marks
d. Explain five basic requirements for database security. 5 marks
e. Give three of Shannon’s characteristic of “Good”ciphers. 3 marks
f. Differentiate between hactivism and cyberterrorism. 4 marks

i. What is a web bug? 2 marks
ii. Give any other terms that could be used to refer to it. 1 marks
h. Threats can be viewed as being one of four kinds: interception, interruption,
modification, and fabrication. Explain the four terms and give examples thereof.
i) Interception 2 marks
ii. Interruption 2 marks
iii. Modification 2 marks
iv. Fabrication 2 marks

Question Two
a. Differentiate between encoding and enciphering. 4 marks
b. Compare secret key and public key encryption using five criteria. 8 marks
c. Differentiate between a cryptographer and crypto analyst. 4 marks
d. Give the properties of “trustworthy”encryption system. 4 marks

 

 

 

For a custom-written paper on the above topic, place your order now!

What We Offer
• On-time delivery guarantee
• PhD-level professionals
• Automatic plagiarism check
• 100% money-back guarantee
• 100% Privacy and Confidentiality
• High Quality custom-written papers

Found something interesting ?

• On-time delivery guarantee
• PhD-level professional writers
• Free Plagiarism Report

• 100% money-back guarantee
• Absolute Privacy & Confidentiality
• High Quality custom-written papers

Related Model Questions

Feel free to peruse our college and university model questions. If any our our assignment tasks interests you, click to place your order. Every paper is written by our professional essay writers from scratch to avoid plagiarism. We guarantee highest quality of work besides delivering your paper on time.

Grab your Discount!

25% Coupon Code: SAVE25
get 25% !!