Open navigation menu
Close suggestions
Search
Search
en
Change Language
Upload
Sign in
Sign in
Download free for days
0 ratings
0% found this document useful (0 votes)
19 views
5 pages
Cs 04-2023
computer security
Uploaded by
ishmael
AI-enhanced title
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content,
claim it here
.
Available Formats
Download as PDF or read online on Scribd
Download
Save
Save cs 04-2023 For Later
0%
0% found this document useful, undefined
0%
, undefined
Embed
Share
Print
Report
0 ratings
0% found this document useful (0 votes)
19 views
5 pages
Cs 04-2023
computer security
Uploaded by
ishmael
AI-enhanced title
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content,
claim it here
.
Available Formats
Download as PDF or read online on Scribd
Carousel Previous
Carousel Next
Download
Save
Save cs 04-2023 For Later
0%
0% found this document useful, undefined
0%
, undefined
Embed
Share
Print
Report
Download now
Download
You are on page 1
/ 5
Search
Fullscreen
UNIVERSITY OF ZIMBABWE 2023 APRIL Examinations Faculty: Computer Engineering Informatics and Communications Department: Computer Science Paper Code and Title: HCS412, HCT 420, BSFS — Computer Security; HETT402 — Computer Networks & Network Security. Duration: Two (2) hours Examiner: Miss Jowa Authorized Material: None INSTRUCTIONS . This paper contains No Sections and Five Questions. . Answer all questions. . Start each question on a new page. . This paper comprises of five (5) printed pages. Page 1 0f5Question 1 [25 marks} a) People pick bad passwords, and often use thé same bad password actoss many sites. Someone propases using the block chain to solve this problem: for every site S. user email address M, and password P, put {SHOP on the block chain, where H is a strong eryptographie hash function such as SHA-3, i. Discuss the merits of this idea, on whether itis a good or a bad idea. iL Discuss if it would be better if sites put {H(S. M, P)} an the blosk chain instead? (S marks) Zoomn has been criticized for por security: bad cryptography. lack of end-to-end ‘encryption, guessable meeting [Ds that can lead to Zoom-bombing. apparently poor quality code per CyberITL's metries. abuse of privileged mechaniyms on Macs, ete ‘Suppose they respond by sayin, “We are going to put a firewall in front of our servers: all participants’ computers should also be behind a firewall Briefly explain if this will help or aot 48 marks) Given a firewall that ¢an examine the contents of packets, including reconstructing conngetion streams, explain how it protects against transmitting unencrypted eredit card numbers over the network (§ marks) Ag the Chief Security Officer (CSO) of a company, you have recemty come to believe that the application that your company relies on for most of its revenue is.bugey and probably insecure, However, the last two times someone tried patching it, a year or $0 ago, it did not work at all, and people had to scramble to back out the patch before the company lost oo much money, There are reports anfine that newer patches are also problematic, and of course you do not know haw many security holes are not patched The task force you have assembled to'study the issue has come up with three options: “Apply all patches om test system and try very hard to get it working. Leave the application alone, but strengthen your internal logging. monitoring, and intrusion detection, so that you'll leam if the application was penetrated Buy a competing product that does the same thing, However, the API to this competing product is very different, so it will take a fair amount of programming effort to make it usable m your enviranment. Additionally, the company that ‘created it is new and does not have much of track record, though their CTO and CSO are well known and highly respected. Discuss the merits/demerits of each of the options given with clear reasoning. Atso pick the most suitable method explaining why this is $0. (10 marke) Question 2 [15 marks} ‘You are sitting in a coffee shop enjoying 2 latte and doing some relaxing computer secu reading at hutpr/awesome-security-stuff.com. You are connected on the cuffce shop's Wi-Fi nctwork. Page 2 of 5a) Assuming you are only browsing http://awesome-security-stuff.com, who is potentially able to observe what aiticles you are reading’ (3 marks) Briefly discuss a technology that could reduce the number of parties in part a) that can observe your traffic (3 marks) If-you use the technology you listed in past b). who will still be able ta know a complete list ofall the articles you view? (3 marks) ‘You notice that each article has « Facebook Like button, loaded as such: (3 marks)
. allowing you te indicate on Facebook that you enjoyed this article, If Facebook wanted to, could it track what articles you are visiting, if you don't click on the Like button? Justify your answer. Assuming you were using a computer provided in the coffee shop, and you accessed your email account from this computer. Before leaving the coffee shop, you made beyond any doubt that your email account was now pot open within the browser window. The next user that came in behind you utilized the same browser to re-access your account, Th began to send emails from it to fellow students and university management, Briefly discuss what could have happened and the steps to be taken lo prevent this from happening 3 marks) Question 3 [20 marks} 2 The University of Zimbabwe wants to implement an Online Examination System where students svill write open book examinations on paper, download exam using mobile phone or laptop in the comfort of their homes, Afler downloading the exam they are supposed to write a timed exam. When they have finished writing the exam tlfey sean answer sheet using the clear scanner app on their mobile phones to upload to the exam system, a) During the exam there is a network disruption and the candidates have te log again, What security measure will you employ to ensure it is the correet candidate Writing the examination? (3 marks) b) How do you prevent and check for collusion and cheating using examination system? (3 marks) Briefly discuss the security breaches that.can affcet the online examination system and the measures you can employ to overcome the breaches. {3 marks) Describe a scheme that can be used for coming up with the students passwords, explaining how yout requirements improve security. Mention possible attacks on passwords that do not follow the scheme you have suggested (3 marks) Which methods can you use (0 prevent tnauthorized exam registration of (3 marks) ofan unregistered student: from 8 botnet Page aofsEver since Covid-19, university employees are increasingly connecting 1 the university's networks remotely via mobile devices such ws laptops, tablets and smartphones. Remote access needs to satisfy five essential requirements to be efficient and secure and these are Authentication, confidentiality, access control, integrity and availability 4S marks) i. Briefly discuss. how a VPN achieves secure remate access. ii, Which other method can be used ta achieve secure access, briefly discuss the chosen method. Question $ {22 marks} a) Suppose that someone sugdests the following way to securely confirm that the bo of you are both in possession of the same secret key. You sreate a random bit string the lengtt of the key. XOR ic with the key, and send the result over the channel. Your partner NORs the incoming block with the key and sends it back. You check. and if what you receive is ‘your original random string, you have verified that your partner has the same secret key Briefly discuss if this scheme Is secure. (3 niarks) ation is-an essential part of secure communications. with your knowledge of public key cryptography. briefly explain how Alice can Confirm the identity of Bab, (4: marks) One of the requirements of the H. bility and Accountability Aet (HIPAA) is that health care organizations must protec ies from unauthorized access. Would it be better to uses mandstory or a diseretionary access control system to control access to patient files? Explain your answer (S marks) The following files are shown by an Is -I command on a typical Unix system exresrex T charlie acct 70483 2008-01-04 22:53 accounting -rw-— 1 alice acct 139008 2008-05-13 14:53 accounts -rwxr-r-n I system system 230482 1997-44-27 22:53 € Asst -rw-rere Lalice users 7072 2008-96-01 22:53 ev.txt --r---— 1 bob gurus 19341 2008-06-03 13:29 exam bebuuees —r-— 1 alice gurus 6316 2008-06-03 16:28 solutions Unix users Alice and Bob are both members of only the group users, while Charlie isa member of only the group gurus, Application editorallows users to read and write files of arbitrary name and change their permissions, whereas application accounting only allows users to append data records to the file accounts, Draw up an access control matrix with subjects {alice, bob, charlie} and objects {uccounts, ev.{Xt, exam solutions} that shows for each combination of subject and object whether the subject will, in principle, be able to read (R). (overwrite (W), or atleast append records (A) to the respective abject (10 marks) Questian 5 [18 marks} fa) Suppose an attacker steals the private key of a website that uses TLS, and remains undetected. What ean the attacker do using the private key? (3 marks) Page @ of 5‘b) A certificate authority that issues a TLS certificate for example.com can also passively decrypt TLS taffic to example.com, (3 marks) ¢) Briefly discuss the three properties of hash fine (G marks) d) Alice and Bob just arrived at Brewed Awakening coffee shop, Eve is already there, enjoying a cup of tea Turns out that Brewed Awakening’s network has ne encryption. Alice warns Bob that itis not safe te use this connection, but Bob disagrees. Bob connects to the WiFi, and tests that he has Internet connectivity by going t© om. It heads without issues, Bob says the Alice: “See, no. es6 was totally safe!” If Bob is correct and the access to kewlsovialnet.ce safe, explain why he is correct, If he is not correct, provide (4 marks) Bob then further decides to check his bank be @ over this connection so that he can see if he has enough money to buy the last muffin, * Eve hears this and panics! She wants the last muffin too but is waiting for her friend Mallory to bring enough cash to bur She is now determined to somehow stop Bob from buying that last mufiin by preventing him from checking his bank account. Through the corner of her eve, Eve sees Bob start to type https://bank,com in his browser URL network aliacks Eve can do to prevent Bob from checking his bank account. For each attack, describe clearly in ome or two sentences how Eve performs the attack, (5 marks) End of Paper
You might also like
7230 Repaso Exam 2
PDF
100% (1)
7230 Repaso Exam 2
10 pages
NSC Exam Mark Scheme Autumn 2018
PDF
0% (1)
NSC Exam Mark Scheme Autumn 2018
13 pages
CSCI262SystemSecuritySpring2016 (Wollongong)
PDF
No ratings yet
CSCI262SystemSecuritySpring2016 (Wollongong)
58 pages
In-Course Assessment (Ica) Specification: Chunyan Mu CIS-4017-N 30 April 2020 4:00pm Submission Method
PDF
No ratings yet
In-Course Assessment (Ica) Specification: Chunyan Mu CIS-4017-N 30 April 2020 4:00pm Submission Method
7 pages
NSC Exam Paper Summer 2019
PDF
No ratings yet
NSC Exam Paper Summer 2019
4 pages
Cyber Security
PDF
No ratings yet
Cyber Security
11 pages
CSE-ND-2022-CS 8792-Cryptography and Network Security - 892070682-ND22CS
PDF
No ratings yet
CSE-ND-2022-CS 8792-Cryptography and Network Security - 892070682-ND22CS
3 pages
Cyber Security 3kjh23vhp3B8qP8q
PDF
No ratings yet
Cyber Security 3kjh23vhp3B8qP8q
9 pages
MIS1040 2013 Paper
PDF
No ratings yet
MIS1040 2013 Paper
4 pages
Cyber Security
PDF
No ratings yet
Cyber Security
9 pages
Cyber Security pornhub3kjh23vhp3B8qP8q
PDF
No ratings yet
Cyber Security pornhub3kjh23vhp3B8qP8q
14 pages
Bit 4103 Security - Cryptography Paper 2
PDF
No ratings yet
Bit 4103 Security - Cryptography Paper 2
3 pages
20ECSC402 851 20ECSC402 862 Template-21KLE25
PDF
No ratings yet
20ECSC402 851 20ECSC402 862 Template-21KLE25
3 pages
INF4831-2018-1-E-1 Memo
PDF
No ratings yet
INF4831-2018-1-E-1 Memo
6 pages
CS458 A2 Main
PDF
No ratings yet
CS458 A2 Main
20 pages
Chapter 5.3
PDF
No ratings yet
Chapter 5.3
9 pages
IS and Cyber Laws 2
PDF
No ratings yet
IS and Cyber Laws 2
3 pages
126AQ052016
PDF
No ratings yet
126AQ052016
2 pages
NSC Exam Spring 2024 QP (15821)
PDF
100% (1)
NSC Exam Spring 2024 QP (15821)
4 pages
Ch08 - Safety and Security
PDF
100% (1)
Ch08 - Safety and Security
6 pages
NSC Exam Paper Spring 2019
PDF
100% (1)
NSC Exam Paper Spring 2019
6 pages
2016 Final
PDF
No ratings yet
2016 Final
13 pages
Assignment No1 by AkramUllah
PDF
No ratings yet
Assignment No1 by AkramUllah
10 pages
L5DC - Network Security and Cryptography 2.0 - Exam - Spring 2025 - QP (37897) 1
PDF
100% (1)
L5DC - Network Security and Cryptography 2.0 - Exam - Spring 2025 - QP (37897) 1
5 pages
NSC December 2015 Sample Exam Final
PDF
No ratings yet
NSC December 2015 Sample Exam Final
4 pages
Saqib Hussain
PDF
No ratings yet
Saqib Hussain
6 pages
L Final
PDF
No ratings yet
L Final
5 pages
CSS322Y08S2E02 Final Exam Answers
PDF
No ratings yet
CSS322Y08S2E02 Final Exam Answers
19 pages
COMS3000 Final Exam 2008
PDF
No ratings yet
COMS3000 Final Exam 2008
8 pages
cRUBhLaxTUOnMJiafsqCjg - CM2025 Past Exam Oct 2023
PDF
No ratings yet
cRUBhLaxTUOnMJiafsqCjg - CM2025 Past Exam Oct 2023
8 pages
JulyAugust 2022
PDF
No ratings yet
JulyAugust 2022
1 page
ICS 3201 - Computer Security and Cryptography - January 2022
PDF
No ratings yet
ICS 3201 - Computer Security and Cryptography - January 2022
4 pages
Assignment 2 Network Security
PDF
No ratings yet
Assignment 2 Network Security
3 pages
2023 Final
PDF
No ratings yet
2023 Final
12 pages
Quiz Chapter 5 Answers
PDF
No ratings yet
Quiz Chapter 5 Answers
8 pages
Science BSC Computer Science Semester 5 2024 April Information Network Security R 2023
PDF
No ratings yet
Science BSC Computer Science Semester 5 2024 April Information Network Security R 2023
1 page
Acsc 462
PDF
No ratings yet
Acsc 462
3 pages
TM256 Mock MTA Answer Key
PDF
No ratings yet
TM256 Mock MTA Answer Key
5 pages
Cyber Security 5marks 41 To 80
PDF
No ratings yet
Cyber Security 5marks 41 To 80
27 pages
Computer Security EITA25: Final Exam in
PDF
No ratings yet
Computer Security EITA25: Final Exam in
6 pages
Information Security Questions
PDF
100% (1)
Information Security Questions
4 pages
MIS1104 2014 Paper
PDF
No ratings yet
MIS1104 2014 Paper
4 pages
2010 - .May - June-2010
PDF
No ratings yet
2010 - .May - June-2010
1 page
Inte 422
PDF
No ratings yet
Inte 422
4 pages
Computer Science and Engineering
PDF
No ratings yet
Computer Science and Engineering
2 pages
Mid
PDF
No ratings yet
Mid
12 pages
InformationSecuirty (Apr 09)
PDF
No ratings yet
InformationSecuirty (Apr 09)
5 pages
ITSSA2-B12 Notes For Mock Exam 2024
PDF
No ratings yet
ITSSA2-B12 Notes For Mock Exam 2024
22 pages
Science BSC Computer Science Semester 5 2023 November Information Network Security R 2023
PDF
No ratings yet
Science BSC Computer Science Semester 5 2023 November Information Network Security R 2023
1 page
INS QB WITH ANSWER BY ?nirav Parmar?
PDF
No ratings yet
INS QB WITH ANSWER BY ?nirav Parmar?
15 pages
Number: 98-367 Passing Score: 800 Time Limit: 120 Min
PDF
No ratings yet
Number: 98-367 Passing Score: 800 Time Limit: 120 Min
44 pages
NSC Spring Exam 2023 QP Final
PDF
100% (1)
NSC Spring Exam 2023 QP Final
4 pages
CS458 A1 - CS - F20 - Updated
PDF
No ratings yet
CS458 A1 - CS - F20 - Updated
11 pages
Cyber Security Research
PDF
No ratings yet
Cyber Security Research
7 pages
B) Explain Why The Concept of Non-Repudiation Is An Important Security Principle (5 Marks)
PDF
No ratings yet
B) Explain Why The Concept of Non-Repudiation Is An Important Security Principle (5 Marks)
11 pages
NSC March 2016 Exam MS Final
PDF
No ratings yet
NSC March 2016 Exam MS Final
13 pages
Comp 207 Acmp 280
PDF
No ratings yet
Comp 207 Acmp 280
2 pages