CIT855
CIT855
POSTGRADUATE: PDG
COURSE TITLE: ADVANCED CYBER SECURITY
COURSE CODE CIT855
CREDIT UNIT(S): 2
TIME ALLOWED: 2 Hours
INSTRUCTION: Answer question ONE and any other two questions
QUESTION ONE
A. Define point of sale theft and enumerate any three (3) cyber security goal? (5 marks)
B. How does Man-in-the-Middle (MITM) attack works? (6 marks)
C. Explain any four (4) top security threat in the world (8 marks)
D. Explain what you understand by Information Technology Act (ITA-2000) and not more
than four (4) points, enumerate some of the objectives of the Information Technology
Act, 2000? (11 marks)
QUESTION TWO
A. List out any two (2) tools attached to each of the CIA triad (6 marks)
B. List any four (4) reasons for backing up of data on a daily basis? (6 marks)
C. In a tabular form; not more than four (4) points explain the relationship between IoT and
(8 marks)
QUESTION THREE
A. What is a non-physical threat in cyber security and how can fraud be prevented? (4
marks)
B. Discuss briefly Internet of Things and block chain (IoT) as recent cybersecurity
challenges? (6 marks)
C. List and explain four (4) types of block chaining (10 marks)
QUESTION FOUR
A. Discuss the various cyber security detection and prevention mechanisms. (4 marks)
B. Differentiate between vulnerability assessment and penetration testing and list any four
(4) importance of penetration testing in an enterprise. (8 marks)
C. Define cyber security threats in e-commerce; list and explain briefly the six (6)
dimensions of E-commerce security (8 marks)
QUESTION FIVE
A. State any four (4) benefits of cyber security? (4 marks)
B. State and explain any five (5) of the security principles (10 marks)
C. What is the function of (WPA) - WIFI Protected Access (WPA) and Wired Equivalent
Privacy (WEP) (6 marks)