SlideShare a Scribd company logo
Security in Computing and IT


1. Differentiate the following security terms with suitable examples:
        a. Confidentiality (1 Mark).
        b. Integrity (1 Mark).
2. Worms usually do a sweep scan technique to identify the potential victims to attack. in an IPv4
    environment, how many potential victim addresses can be searched? (3 marks).
3. Decrypt the following cipher text using Caesar ciphering (with n=3 for rotation): "UHWXUA WR
    URPH" (3 marks).
4. Explain in detail an example in real-life whereby authentication using proof by knowledge and prrof
    by possession is implemented together. (5 marks).
5. Give an example of a Statistical Inference attack in a database. (3 Marks).
6. Briefly describe what the following figure illustrates: (4 Marks)

                                                Security




                                    Functionality               Security


7. Differentiate between logic bomb and Trojan horse. Name one famous logic bomb and one famous
    trapdoor. (5 marks).
8. Below is an attack done by a hacker on a website's login page (the hacker keyed in the following in
    the username input box):

    SELECT * FROM customer WHERE username = ' ' OR 1' '

        a. Explain what kind of attack is the hacker using (1 Mark).
        b. Assuming that the hacker's attack is successful, what is the outcome of the attack? (2
            Marks).
        c. How can this kind of attack be prevented? (2 Marks).
Security in Computing and IT


9. You are required to implement an open source CRM system in your organization. The system is
    accessible via the Internet as well as internally.
        a. The management team requires you to implement a simple yet secure authentication
            mechanism to verify the identity of its users. Explain in detail your suggestion for the
            authentication mechanism. (4 Marks).
        b. The management team is also looking into the possibility of external affirmation to
            authenticate the legitimacy of the online communication with its suppliers. What would you
            suggest to make this possible? (4 marks).
        c. The backend database resides on a Linux platform; In order to save cost. However, the CEO
            of your organization is having trouble understanding how the access control mechanism
            works. Draw a simple access control matrix which consists of the following information in
            order to help the CEO understand how the mechanism works:
                 i. The system administrator has all access control rights to the web server's
                      configuration directory and customer table in the database.
                 ii. The database administrator has all access control rights to the customer table in the
                      database only.
                iii. Customers have read access to the customer table in the database only. (2 Marks).
        d. Another major concern of the management team is the fact that the system is accessible
            from the internet. They are very concerned with the following web application security risk
            (as determined by OWASP): cross-site scripting. Provide a brief security assessment for this
            risk. your assessment must include the following : brief description of the security risk,
            threat agents, attack vectors, security weakness, technical and prevention methods. (10
            marks).
10. Briefly describe one memory protection method that an operating system should have (2 marks).
11. What is a Network Intrusion Detection System? (2 marks).
12. Briefly describe three Bluetooth vulnerabilities (3 Marks).
13. Mr. 'A' posted the following message on his Facebook Update section: "Working to troubleshoot a
    major software bug we just found." How can this information become a potential security and/or
    social threat? (3 Marks).

More Related Content

PDF
Web Server and Web Technology Exam paper
PDF
Chapter 14 sql injection
PPTX
[DevDay2018] Security Testing - By Thuy Nguyen, Software Engineer at Axon Act...
PPTX
Connection String Parameter Pollution Attacks
PDF
Think Like a Hacker - Database Attack Vectors
PPTX
[DevDay2018] Hacking for fun and profit - By: Dennis Stötzel, Head of Securit...
PPT
2 secure systems design
PPTX
Securing the Web @DevDay Da Nang 2018
Web Server and Web Technology Exam paper
Chapter 14 sql injection
[DevDay2018] Security Testing - By Thuy Nguyen, Software Engineer at Axon Act...
Connection String Parameter Pollution Attacks
Think Like a Hacker - Database Attack Vectors
[DevDay2018] Hacking for fun and profit - By: Dennis Stötzel, Head of Securit...
2 secure systems design
Securing the Web @DevDay Da Nang 2018

What's hot (20)

PDF
Dear Hacker: Infrastructure Security Reality Check
PDF
Gartner Security & Risk Management Summit 2018
PPTX
Application and Website Security -- Fundamental Edition
PDF
Connection String Parameter Pollution Attacks
PDF
Menggunakan Kali Linux Untuk Mengetahui Kelemahan Implementasi TI
PPTX
Web Exploitation Security
PDF
BlueHat v18 || Malicious user profiling using a deep neural net
PDF
7. 9589 1-pb
PPTX
Adding Identity Management and Access Control to your Application, Authorization
PDF
Advanced SQL injection to operating system full control (whitepaper)
PDF
Awesome_fuzzing_for _pentester_red-pill_2017
PDF
Art of Web Backdoor - Pichaya Morimoto
PDF
Attack Chaining: Advanced Maneuvers for Hack Fu
PDF
Brute Force Attack
PPTX
Understanding Active Directory Enumeration
PPTX
Unethical access to website’s databases hacking using sql injection
PPT
Defending Against Attacks With Rails
DOCX
ARMITAGE-THE CYBER ATTACK MANAGEMENT
PPTX
Auditing System Password Using L0phtcrack
Dear Hacker: Infrastructure Security Reality Check
Gartner Security & Risk Management Summit 2018
Application and Website Security -- Fundamental Edition
Connection String Parameter Pollution Attacks
Menggunakan Kali Linux Untuk Mengetahui Kelemahan Implementasi TI
Web Exploitation Security
BlueHat v18 || Malicious user profiling using a deep neural net
7. 9589 1-pb
Adding Identity Management and Access Control to your Application, Authorization
Advanced SQL injection to operating system full control (whitepaper)
Awesome_fuzzing_for _pentester_red-pill_2017
Art of Web Backdoor - Pichaya Morimoto
Attack Chaining: Advanced Maneuvers for Hack Fu
Brute Force Attack
Understanding Active Directory Enumeration
Unethical access to website’s databases hacking using sql injection
Defending Against Attacks With Rails
ARMITAGE-THE CYBER ATTACK MANAGEMENT
Auditing System Password Using L0phtcrack
Ad

Similar to Security in Computing IT (20)

PPT
MIS part 4_CH 11.ppt
PPT
educational content,educational content,educational content,
PDF
cybersecurity Interview questions for freshers.pdf
PPTX
Computer security system Unit1.pptx
DOC
Cis 560 Effective Communication / snaptutorial.com
DOCX
1.8 Exercises1. Distinguish between vulnerability, threat, and con.docx
PDF
Cis 349 Teaching Effectively--tutorialrank.com
DOC
Cis 560 Education Organization / snaptutorial.com
PPT
Security management(new) (1)
PDF
Cybersecurity Interview Questions and Answers.pdf
PDF
Cis 349 Inspiring Innovation--tutorialrank.com
DOC
Cis 349 Education Specialist-snaptutorial.com
DOCX
CIS 349 RANK Introduction Education--cis349rank.com
DOCX
CIS 560 Inspiring Innovation/tutorialrank.com
DOCX
Cis 560 Education Organization -- snaptutorial.com
DOCX
CIS 349 RANK Education Counseling--cis349rank.com
DOCX
CIS 349 Enhance teaching / snaptutorial.com
DOCX
Cis 560 Enhance teaching / snaptutorial.com
PDF
Computer Security
DOCX
What term is directly related to customer privacy considerations .docx
MIS part 4_CH 11.ppt
educational content,educational content,educational content,
cybersecurity Interview questions for freshers.pdf
Computer security system Unit1.pptx
Cis 560 Effective Communication / snaptutorial.com
1.8 Exercises1. Distinguish between vulnerability, threat, and con.docx
Cis 349 Teaching Effectively--tutorialrank.com
Cis 560 Education Organization / snaptutorial.com
Security management(new) (1)
Cybersecurity Interview Questions and Answers.pdf
Cis 349 Inspiring Innovation--tutorialrank.com
Cis 349 Education Specialist-snaptutorial.com
CIS 349 RANK Introduction Education--cis349rank.com
CIS 560 Inspiring Innovation/tutorialrank.com
Cis 560 Education Organization -- snaptutorial.com
CIS 349 RANK Education Counseling--cis349rank.com
CIS 349 Enhance teaching / snaptutorial.com
Cis 560 Enhance teaching / snaptutorial.com
Computer Security
What term is directly related to customer privacy considerations .docx
Ad

Recently uploaded (20)

PPTX
History, Philosophy and sociology of education (1).pptx
PPTX
Lesson notes of climatology university.
PDF
Supply Chain Operations Speaking Notes -ICLT Program
PDF
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
PDF
Chinmaya Tiranga quiz Grand Finale.pdf
PPTX
Onco Emergencies - Spinal cord compression Superior vena cava syndrome Febr...
PDF
LNK 2025 (2).pdf MWEHEHEHEHEHEHEHEHEHEHE
PDF
A GUIDE TO GENETICS FOR UNDERGRADUATE MEDICAL STUDENTS
PDF
Weekly quiz Compilation Jan -July 25.pdf
PDF
Practical Manual AGRO-233 Principles and Practices of Natural Farming
PPTX
Final Presentation General Medicine 03-08-2024.pptx
PPTX
Cell Types and Its function , kingdom of life
PPTX
Radiologic_Anatomy_of_the_Brachial_plexus [final].pptx
PDF
OBE - B.A.(HON'S) IN INTERIOR ARCHITECTURE -Ar.MOHIUDDIN.pdf
PDF
Classroom Observation Tools for Teachers
PPTX
Chinmaya Tiranga Azadi Quiz (Class 7-8 )
PPTX
Introduction to Building Materials
PDF
What if we spent less time fighting change, and more time building what’s rig...
PPTX
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
PDF
Trump Administration's workforce development strategy
History, Philosophy and sociology of education (1).pptx
Lesson notes of climatology university.
Supply Chain Operations Speaking Notes -ICLT Program
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
Chinmaya Tiranga quiz Grand Finale.pdf
Onco Emergencies - Spinal cord compression Superior vena cava syndrome Febr...
LNK 2025 (2).pdf MWEHEHEHEHEHEHEHEHEHEHE
A GUIDE TO GENETICS FOR UNDERGRADUATE MEDICAL STUDENTS
Weekly quiz Compilation Jan -July 25.pdf
Practical Manual AGRO-233 Principles and Practices of Natural Farming
Final Presentation General Medicine 03-08-2024.pptx
Cell Types and Its function , kingdom of life
Radiologic_Anatomy_of_the_Brachial_plexus [final].pptx
OBE - B.A.(HON'S) IN INTERIOR ARCHITECTURE -Ar.MOHIUDDIN.pdf
Classroom Observation Tools for Teachers
Chinmaya Tiranga Azadi Quiz (Class 7-8 )
Introduction to Building Materials
What if we spent less time fighting change, and more time building what’s rig...
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
Trump Administration's workforce development strategy

Security in Computing IT

  • 1. Security in Computing and IT 1. Differentiate the following security terms with suitable examples: a. Confidentiality (1 Mark). b. Integrity (1 Mark). 2. Worms usually do a sweep scan technique to identify the potential victims to attack. in an IPv4 environment, how many potential victim addresses can be searched? (3 marks). 3. Decrypt the following cipher text using Caesar ciphering (with n=3 for rotation): "UHWXUA WR URPH" (3 marks). 4. Explain in detail an example in real-life whereby authentication using proof by knowledge and prrof by possession is implemented together. (5 marks). 5. Give an example of a Statistical Inference attack in a database. (3 Marks). 6. Briefly describe what the following figure illustrates: (4 Marks) Security Functionality Security 7. Differentiate between logic bomb and Trojan horse. Name one famous logic bomb and one famous trapdoor. (5 marks). 8. Below is an attack done by a hacker on a website's login page (the hacker keyed in the following in the username input box): SELECT * FROM customer WHERE username = ' ' OR 1' ' a. Explain what kind of attack is the hacker using (1 Mark). b. Assuming that the hacker's attack is successful, what is the outcome of the attack? (2 Marks). c. How can this kind of attack be prevented? (2 Marks).
  • 2. Security in Computing and IT 9. You are required to implement an open source CRM system in your organization. The system is accessible via the Internet as well as internally. a. The management team requires you to implement a simple yet secure authentication mechanism to verify the identity of its users. Explain in detail your suggestion for the authentication mechanism. (4 Marks). b. The management team is also looking into the possibility of external affirmation to authenticate the legitimacy of the online communication with its suppliers. What would you suggest to make this possible? (4 marks). c. The backend database resides on a Linux platform; In order to save cost. However, the CEO of your organization is having trouble understanding how the access control mechanism works. Draw a simple access control matrix which consists of the following information in order to help the CEO understand how the mechanism works: i. The system administrator has all access control rights to the web server's configuration directory and customer table in the database. ii. The database administrator has all access control rights to the customer table in the database only. iii. Customers have read access to the customer table in the database only. (2 Marks). d. Another major concern of the management team is the fact that the system is accessible from the internet. They are very concerned with the following web application security risk (as determined by OWASP): cross-site scripting. Provide a brief security assessment for this risk. your assessment must include the following : brief description of the security risk, threat agents, attack vectors, security weakness, technical and prevention methods. (10 marks). 10. Briefly describe one memory protection method that an operating system should have (2 marks). 11. What is a Network Intrusion Detection System? (2 marks). 12. Briefly describe three Bluetooth vulnerabilities (3 Marks). 13. Mr. 'A' posted the following message on his Facebook Update section: "Working to troubleshoot a major software bug we just found." How can this information become a potential security and/or social threat? (3 Marks).