0% found this document useful (0 votes)
47 views4 pages

Inte 422

The document outlines the examination details for Kabarak University for the course INTE 422/BBIT 422: IT Security, Audit and Ethics. It includes instructions for the exam, a compulsory section with various questions related to IT security measures, principles, and models, as well as optional questions covering topics such as e-commerce security and risk assessment techniques. The examination is scheduled for August 9, 2023, from 9:00 to 11:00 AM.

Uploaded by

mercykioko527
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
47 views4 pages

Inte 422

The document outlines the examination details for Kabarak University for the course INTE 422/BBIT 422: IT Security, Audit and Ethics. It includes instructions for the exam, a compulsory section with various questions related to IT security measures, principles, and models, as well as optional questions covering topics such as e-commerce security and risk assessment techniques. The examination is scheduled for August 9, 2023, from 9:00 to 11:00 AM.

Uploaded by

mercykioko527
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
You are on page 1/ 4

KABARAK UNIVERSITY

UNIVERSITY EXAMINATIONS
MAIN CAMPUS
SECOND SEMESTER, 2023 ACADEMIC YEAR
EXAMINATION FOR THE DEGREE OF BACHELOR OF INFORMATION
TECHNOLOGY & BACHELOR OF BUSINESS MANAGEMENT &
INFORMATION TECHNOLOGY

INTE 422/BBIT 422: IT SECURITY, AUDIT AND ETHICS

STREAM: Y4/ S2 REGULAR TIME:9:00-11:00AM


EXAMINATION SESSION: MAY-AUGUST DATE:09/08/2023

INSTRUCTIONS
1. Answer Question 1 and any other two questions in the answer booklet provided.
2. Do not write on your question papers. All rough work should be done in your
answer booklet.
3. Clearly indicate which question you are answering.
4. Edit your work for language and grammar errors.
5. Follow all the instructions in the answer booklet

As members of Kabarak University family, we purpose at all times and in all places, to set apart in one’s heart, Jesus
as Lord. (1 Peter 3:15)
Kabarak University is ISO 9001:2015 Certified

Page 1 of 4
SECTION A: (COMPULSORY) TOTAL MARKS FOR THIS SECTION IS 30.

1a ) Evaluate TWO Proactive and TWO Reactive Security measures that Kabarak
university can implement for its wireless Network (6 Marks)
b) Evaluate THREE core principles of Biba security model (6 Marks)
c) Outline FOUR goals an ideal password authentication scheme should achieve. (4 Marks)
d) Outline THREE the need of Ethical hacking in any information system. (3 Marks)
e) In any given organizational setting a dedicated firewall would be required between your
network and outside world, describe TWO types of firewall configurations (5 Marks)
f) Create Social Media Policy, Standard and Procedure for Kabarak ICT Department
(6 Marks)
SECTION B. TOTAL MARKS FOR THIS SECTION IS 40.
ANSWER ANY TWO QUESTIONS FROM THIS SECTION. EACH QUESTION IN
THIS SECTION CARRIES 20 MARKS.

2 a) Describe how e-commerce sites implement asymmetric algorithm to securely perform


transactions. (4 Marks)
b) Describe THREE factors that can make software vulnerable (6 Marks)
c) When thinking about security, it is helpful to think in terms of availability, confidential,
vulnerabilities, and attacks outline the meaning of each of these terms giving relevant
examples. (6 Marks)
d) Discuss Chinese wall security model in detail also indicate circumstances where it can be used
(4 Marks)
3 a) Vulnerability to a system can be either, physical, natural, hardware/software or human
Discuss this statement in relation to IT security (4 Marks)

b) Distinguish between Cryptography and steganography, state ONE advantages and ONE
limitations for each detail (4Marks)
c) Outline THREE roles performed by firewalls and Antivirus software play on security of
computer systems (6 Marks)

As members of Kabarak University family, we purpose at all times and in all places, to set apart in one’s heart, Jesus
as Lord. (1 Peter 3:15)
Kabarak University is ISO 9001:2015 Certified

Page 2 of 4
d) You have been appointed the chief information security officer in an international
corporation that conducts many of its activities online. Your job comes as a result of numerous
ICT security breaches originating from within and outside the organization. So you have been
given the mandate to reengineer the entire ICT security system.

You are required to answer the following:

i) What aspect of security will you give first priority? Give a reason for your answer.
(2 Marks)
ii) As you develop and implement the security programme, what FOUR main goals will
you be seeking to achieve? (4 Marks)
4 a) An ideal password authentication scheme has to withstand a number of attacks. Describe
SIX of these attacks (6 Marks)
b) “Security is much more difficult to maintain in the mobile/ wireless network” Criticize this
statement (6 Marks)

c) Evaluate FOUR best computer security practices students should observe while using shared
resources like computer labs organization can implement (4 Marks)
d) Evaluate FOUR main principles of Bell-LaPadula model. What are its limitations
(4 Marks)
5 a) Alice and Bob participate in a public-key infrastructure that enables them to exchange legally
binding digital signatures. Name THREE reasons why, for some purposes, Alice might prefer to
use a message authentication code, instead of a digital signature, to protect the integrity and
authenticity of her messages to Bob. (6 Marks)
b) In order to assess the level of risk, likelihood and the impact of incidental occurrences should
be estimated. Explain THREE techniques that can be used to assess. (6 Marks)
c) Below are some of the security incidences that occurs while PC is in use. For each case,
identify with supporting answer which goals of security is violated. (8 Marks)
(i) Moses crashes Annette’s PC
(ii) Jane hacks into his Equity Bank Ltd payroll system
(iii) Kevin defaces the homepage of MCA’s website

As members of Kabarak University family, we purpose at all times and in all places, to set apart in one’s heart, Jesus
as Lord. (1 Peter 3:15)
Kabarak University is ISO 9001:2015 Certified

Page 3 of 4
(iv) Mwasi cracks into Ann’s facebook account and use it to chat with Tom.

As members of Kabarak University family, we purpose at all times and in all places, to set apart in one’s heart, Jesus
as Lord. (1 Peter 3:15)
Kabarak University is ISO 9001:2015 Certified

Page 4 of 4

You might also like