Is2109 2024
Is2109 2024
Index Number
• Calculators and any electronic device capable of storing and retrieving Total
text including electronic dictionaries, smart watches and mobile phones
are not allowed.
• Do not tear off any part of this answer book. Under no circumstances
may this book, used or unused, be removed from the Examination Hall
by a candidate
1
Index Number
1. (a). Suppose Nadaraja is developing an IoT-based weather monitoring system. This system con-
tains several IoT devices deployed over a large area. It has also been observed that data sent
by some of the IoT devices is not accurate.
Suranjith, a competitor, is also interested in the data for developing a weather forecasting
system. Furthermore, Suranjith has not deployed any IoT devices.
In the left column, you are provided with some actions taken to make a robust and secure sys-
tem. You are required to identify the most appropriate information security goal or concept
for the given action and write them in the second column.
Each answer is unique. In other words, the same answer cannot be used twice.
[20 marks]
Scenario Information security concept or goal
Make sure the system has capacity and capabil-
ity to store all collected temperature data.
Verify the exact data sent by the IoT sensors are
received by the receiving end.
Preventing data from being leaked to Suranjith
since this data is valuable.
Prevent manufacturers of malfunctioning IoT
devices from denying that inaccurate data was
sent by their devices.
Implement a mechanism to identify malfunc-
tioning IoT devices.
Allowing the temperature sensor to only write
temperature values to the corresponding tem-
perature table in the database.
Providing the assigned device name of the de-
vice to the central system in pairing.
Verifying that the received data was sent by the
claimed device and ensuring the accuracy of the
received data.
Challenging a newly added device to provide
the secret code to establish connection with the
central system.
The system is designed such that every system,
user, or processor must obtain the necessary se-
curity clearance before executing any operation.
2
Index Number
(b). You are given the description of attacks on the left column. Identify the correct name for each
attack and write down the name on the corresponding column on the right. Your answers
should be based on the RFC 4949.
[10 marks]
Attack technique Name of the attack
Switching off the Closed-Circuit Television
(CCTV) by gaining physical access.
Gaining access to sensitive data by launching a
series of brute force attacks.
Revealing the how the information is being pro-
cessed by disassembling and analyzing the de-
sign of a system component.
Reasoning from known facts or premises to
reach new conclusions or predictions.
The secret service listening to communication
between two social activists.
Obtaining sensitive data from from discarded
mobile devices.
An adversary pretends to be the CEO of the
company and asks the security operator to reset
the password.
An act of God that alters system functions or
data.
Unauthorized modifications to software pro-
grams, which can introduce backdoors into sys-
tems.
A circumstance or event that results in control
of system services or functions by an unautho-
rized entity.
3
Index Number
2. On the left column, you are given information about systems that were designed based on some
security principles. You are required to identify and write down the relevant information security
design principle for these information systems in the corresponding column on the right. The
same answer could appear more than once.
[20 marks]
4
Index Number
3. (a). Advice Alice on how to send a message such that anyone can read, verify it’s from Alice,
and ensure everyone receives the same message.
[5 marks]
(b). Suppose Bob is the president of a country, and he wishes to listen to the citizens of the county.
His sole requirement is that messages sent by the citizens should not be seen by anyone other
than Bob. Advise Bob on how to receive messages from the citizens in a manner that ensures
only Bob can read them.
[5 marks]
5
Index Number
(c). Design a very efficient system that guarantees the message integrity and confidentiality. The
proposed system should not suffer from the key distribution problem.
[5 marks]
[5 marks]
6
Index Number
(e). Encrypt the following message using Playfair cyber. The keyword is “Gravity Falls” and the
messages to be encrypted is ”Attack the enemy camp”.
[5 marks]
4. (a). Using a 2x2 matrix, discuss how an organization can reduce the level of risk to its infor-
mation assets by modifying the attack surface and defense layers. Provide an example that
encompasses all three elements.
[4 marks]
7
Index Number
(b). List four (4) counter measures that could be used to protect individuals from human vulner-
abilities.
[8 marks]
8
Index Number
(c). Shantha, a junior cybersecurity officer at a multinational bank, noticed a massive data leakage
just before leaving the office. He promptly turned off the computers and left the building.
In response to Shantha’s actions, the bank requests that you create a policy outlining how to
handle similar situations in the future. What are the possible contents of this policy and how
would you name it? You should not focus on preventing the attack. Your focus should
be on how to react when you are noticing a similar attack.
[5 marks]
(d). Briefly discuss the importance of cookies and the values of cookies for a forensic examiner.
[4 marks]
9
Index Number
(e). There are four major types of threat actions that lead to unauthorized disclosure of informa-
tion. Provide examples for each of these four (4) types of attacks.
[4 marks]
10
Index Number
Glossary of Terms
Access Control (AC), Active Attacks, Adversary (Threat Agent), Assurance, Attack, At-
tack Surfaces, Attacks, Audit and Accountability, Authentication, Awareness and Train-
ing (AT), Certificates, Communication Facilities, Complete Mediation, Computer Secu-
rity, Computer Security Challenges, Computer Security Strategy, Confidentiality, Con-
figuration Management, Consequences, Contingency Planning, Corruption, Countermea-
sure, Cryptanalysis, Data, Deception, Economy of Mechanism, Encapsulation, Environ-
mental Protection, Evaluation, Exposure, Fail-safe, Falsification, Frameworks, Funda-
mental Security Design Principles, Harm, Hardware, High, Identification, Incapacitation,
Incident Response, Inference, Information Resources, Information System, Infrastruc-
ture, Infrastructure Protection, Integrity, Interception, Intrusion, Isolation, Laws, Layer-
ing, Least Astonishment, Least Common Mechanism, Least Privilege, Levels of Impact,
Low, Maintenance, Masquerade, Media Protection, Misappropriation, Misuse, Moderate,
Modularity, Network, Networks, Obstruction, Open Design, Passive Attacks, Penetration,
Personnel Security, Planning, Policies, Psychological Acceptability, Regulation, Repudia-
tion, Reserve Engineering, Resource Protection, Reverse Engineering, Risk, Risk Assess-
ment, Security, Security Assessments, Security Policy, Separation of Privilege, Service,
Software, Standards, System and Communications Protection, System and Information
Integrity, System and Services Acquisition, System Resource (Asset), Systems, Trespass,
Theft of Data, Theft of Functionality, Theft of Service, Threat, Threats, Training, Unau-
thorized Disclosure, Usurpation, Vulnerabilities, Vulnerability, Zero Trust, Proof Knowl-
edge
—– ***** —–
11