Why is data integrity crucial in information security?
[3 marks]Explain the concept of information transmission in information security.
[4 marks]Discuss the key principles of access control and their role in preserving information security.
[7 marks]What are the key steps involved in a risk management process?
[3 marks]Explain the role of assessments in identifying and mitigating security vulnerabilities.
[4 marks]Discuss the characteristics and implications of Hostile Intelligence Service (HOIS) threats. What are some countermeasures that can be implemented to mitigate these threats?
[7 marks]Discuss the major categories of threats that organizations may face, including examples of each category. How do these threats pose risks to information systems?
[7 marks]Why is the purpose of security planning important in the context of information security?
[3 marks]Provide an example of a real-life situation where contingency planning and disaster recovery were successfully implemented to mitigate the impact of a disruptive event.
[4 marks]Explore the concept of continuity of operations (COOP). Why is COOP an essential component of disaster recovery planning?
[7 marks]Explain the relationship between security planning and policy mechanisms.
[3 marks]How should an organization determine its backup requirements in the event of a disaster or disruptive event?
[4 marks]Discuss the development of plans for recovery actions after a disruptive event. What are the critical steps in the recovery phase of a contingency plan?
[7 marks]What is the concept of "access authorization/verification" in personnel security?
[3 marks]How is the concept of "position sensitivity" used to determine the appropriate level of access and security measures for employees in an organization?
[4 marks]Describe the role of employee clearances in personnel security. What are the different clearance levels, and how are they determined? OR1
[7 marks]What are the responsibilities and considerations related to security for systems maintenance
[3 marks]What is the purpose of conducting security reviews, and how are they typically carried out?
[4 marks]Provide an example of a situation where an organization's auditing and monitoring procedures led to the detection and prevention of a security breach.
[7 marks]Explain the concept of Operations Security (OPSEC).
[3 marks]Define the term "audit" in the context of computer security and INFOSEC
[4 marks]What are the potential drawbacks or challenges associated with implementing encryption in INFOSEC, and how can these challenges be addressed?
[7 marks]What is the role of computer security in Information Security (INFOSEC)?
[3 marks]Describe the purpose and process of conducting OPSEC surveys
[4 marks]Discuss the concept of link encryption. What role does link encryption play in securing data within a network or between network segments?
[7 marks]