0% found this document useful (0 votes)
51 views1 page

Isass 1

A university exam marks file contains encrypted student scores indexed alphabetically. A student accessed the file and, while unable to read marks, determined their position due to the alphabetical ordering. The student then swapped their score with the top-scoring student's mark, breaching the file's integrity - one of the key information security features.

Uploaded by

myint phyo
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
51 views1 page

Isass 1

A university exam marks file contains encrypted student scores indexed alphabetically. A student accessed the file and, while unable to read marks, determined their position due to the alphabetical ordering. The student then swapped their score with the top-scoring student's mark, breaching the file's integrity - one of the key information security features.

Uploaded by

myint phyo
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 1

A University department has a file called exam marks which contains a list of examination marks

indexed
by student names in alphabetical order. A student manages to access the exam marks file. The
student
cannot read the file since it is encrypted. However they can work out the position of their own mark
making use of the fact that the students are listed in alphabetical order. The student swaps their mark
with
that of the student who is always ‘top of the class’. Discuss which information security features have
been breached.

Ans:Since students can edit and swap out their makes and so integrity which is one of information
security features have been breached.

You might also like