How is information warfare carried out, and what are the typical paths and steps followed during an attack?
[5 marks]Describe the basic elements of cybersecurity, including confidentiality, integrity, and availability.
[5 marks]How do attacks like denial of service, backdoors, MITM, and replay compromise network security?
[5 marks]Explain the concepts of DDOS attacks, SQL code injection, and common malware threats like viruses and logic-based malware.
[5 marks]How do poor password choices and physical techniques like shoulder surfing or dumpster diving compromise security?
[5 marks]Explain how physical access control and biometric authentication (e.g., fingerprint and palm scanning) enhance security.
[5 marks]How do you manage passwords effectively while addressing their weaknesses and ensuring they are protected?
[5 marks]Describe the main ideas behind symmetric and asymmetric data encryption.
[5 marks]How can Caesar’s cipher be used as an example of an encryption algorithm for securing messages?
[5 marks]What is the function of the Vernam cipher, and how is encryption carried out using a small Hill cipher matrix?
[5 marks]How does asymmetric encryption support digital signatures and what is the purpose of key escrow?
[5 marks]How does private key protection vary between centralized and decentralized security models? Page 1 of
[2 marks]What are the types of intrusion detection systems and their essential logical elements?
[5 marks]Outline the architecture of a Network IDS and analyze its positive and negative aspects.
[5 marks]Discuss the strengths and weaknesses of HIDS in network security.
[5 marks]Explain the vulnerabilities faced by websites and approaches used to ensure safe web communication.
[5 marks]What is the difference between SSL and TLS, and why are they important for secure communications? Page 2 of
[2 marks]