0% found this document useful (0 votes)
18 views

SQL Trial

The document discusses information assurance and security including firewall types, RAID advantages, security policies, trusted operating systems, ethical hacking, and cryptocurrencies. It defines firewalls, RAID, and security policies. It also outlines design principles for trusted operating systems and key policies for securing a network.

Uploaded by

timsy ceasear
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
18 views

SQL Trial

The document discusses information assurance and security including firewall types, RAID advantages, security policies, trusted operating systems, ethical hacking, and cryptocurrencies. It defines firewalls, RAID, and security policies. It also outlines design principles for trusted operating systems and key policies for securing a network.

Uploaded by

timsy ceasear
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 2

INFORMATION ASSURANCE AND SECURITY

1) What is a firewall?
Is a system or group of systems that enforces an access policy btn two or more networks.

briefly explain any three types of firewall.

Packet filtering routers

Application level gateways

Circuit level gateways

List advantages of each type of firewalls named above

Packet filtering routers

Simplicity

Application level gateways

Circuit level gateways

Give two advantages RAID offers as a medium for the storage and delievery of large data.

Fault tolerance

Flexibility

Increases performance

Explain any two levels of RAID functionalities.

2. what is security policy

Why is having a security police in an organization important.

Discuss the steps in building a security policy?

Give two characteristics of a good security policy

3. how can you determine that an operating system is trusted?

Describe any three design principles of a trusted oprating system that can be used to restrict privilledges

Outline three features that are required to achieve the principles of secure design.

Describe three areas of primary focusthat are vital to ensure security in an organization.

Outline six key policies that are needed to secure a network.

Administrative policies

Security

Usage

Usage mgt

Design mgt policies


4 Explain the term ethical hacking in response to network security.2mks

What is the purpose of carrying out penetration testing on a system or network2mks

Briefly describe the type of testing that are uterlised in ethical hacking 6mks.

Describe the methods that hackers use to get control or access to a network or computer system 3mks

What do you understand by cryptocurrencies 2mks

Explain four examples of cryptocurrencies 2mks

What are the advantages of using cryptocurrencies

You might also like