0% found this document useful (0 votes)
12 views2 pages

562.FIS Jul-Dec 2024 Assignment - 032941

Gh

Uploaded by

john kamboyi
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
12 views2 pages

562.FIS Jul-Dec 2024 Assignment - 032941

Gh

Uploaded by

john kamboyi
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

FUNDAMENTALS OF INFORMATION SECURITY

ASSIGNMENT – 2023

INSTRUCTIONS
• Lecturer: Simuntala Samuel
• No. of Pages : 6
• Font size : (12pt) and use (Times new roman)
• Due date : (29th November, 2024)
• Late submission of assignments will not be entertained.
• Use at least six different reference books (Harvard style of referencing)
• Extra marks will be awarded for the logic, critiqued, analysed, evaluated and well
presentation of ideas
• Submit all your assignments via AIMS

1. With clear illustrations, differentiate among the following terms: Threat, Vulnerability and
an Exploit.
2. It is the goal of any organization to see to it that the four elements of information security
are kept as intact as possible. Using your own explanation and examples write in detail
these four elements with your own examples for each element.
3. What is scanning, phishing, dump-star diving, social engineering and propose some of the
countermeasures to these vices.
4. Sniffing is a cybercrime punishable by law. Describe sniffing, what protocols are
susceptible to sniffing, propose some countermeasures to both active and passive sniffing
in your own words.
5. With clear illustrations describe the working of intrusion detection systems (IDS),
honeypots and firewalls. Further distinguish a signature recognition from an anomaly
detection system.
6. Discuss at length the idea of encryption with regard to public and private key encryption.
Where within the world of information security can you apply MD-5, SHA and RC4
encryption types?
7. Describe the various hacking techniques that black hat hackers use to illegally enter into
resources that are unauthorised.
8. What is privilege escalation in information security and give examples of how can
implement this act on the system.
9. Discuss in detail viruses, worms, trojans and backdoors as programs that posses a threat to
the security of the system.
10. Suggest countermeasures to all the malicious programs mentioned in question 9 above.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy