Scs 058 Computer System Security
Scs 058 Computer System Security
DURATION: 2 HOURS
DATE: 26/4/2019
TIME: 9-11 A.M.
Instructions to candidates:
a) During its life cycle, a typical computer virus undergoes through 4 main phases.
Highlight these phases. (4marks)
b) State 3 kinds of attacks that can be used to compromise computer security. (3marks)
c) Biometrics security systems have been implemented to ensure authentication. Describe
what biometric system means and give three examples of biometric devices. (5marks)
d) Name three tools/softwares used for file encryption. (3marks)
e) Describe THREE ways that can be used to protect a computer against malicious soft
ware. (3marks)
f) The following are attacks launched on websites, explain what they are and how to secure
a website from both attacks. (4marks)
i) SQL injection
ii) Cross-site scripting
g) Firewalls play a major role in network security. Describe what a firewall is and give two
types / components of an ideal firewall. (4marks)
h) Differentiate between monoalphabetic and polyalphabetic substitution cipher
(4marks)
SECTION B – ANSWER ANY TWO QUESTIONS IN THIS SECTION
Page 2 of 3
QUESTION THREE (20 MARKS)
a) What are shortcomings of symmetric key cryptography? Describe at least three
(6marks)
b) With an aid of a diagram illustrate what is asymmetric (public key) cryptography
(5marks)
c) Digital signatures are used to ensure non-repudiation. Describe what they are and how
they work (3marks)
d) There are several classifications of viruses. Name and describe at least three
(6marks)
Page 3 of 3