State the types of computer criminals. How are they different from other criminals?
[7 marks]Explain the terms attacks and vulnerabilities.
[7 marks]How could defense methods be used for safer computing?
[7 marks]How could time related errors pose a threat to information security?
[7 marks]Explain the terms 1. Buffer Overflow 2. Flaws 3. Trusted System
[7 marks]How are military security policies different from commercial security policies?
[7 marks]How does multilevel security help to keep information secure?
[7 marks]What are the ways to setup auditability access control?
[7 marks]How are the terms integrity, confidentiality and availability related to information security?
[7 marks]What are the ways in which network vulnerabilities insecure information?
[7 marks]Why are threat in transit dangerous in keeping information secure?
[7 marks]Briefly explain protocol flaws with respect to information security.
[7 marks]How could one use integrity and confidentiality threats to keep information secure?
[7 marks]How are organizational security policies used for information security?
[7 marks]Why should one perform risk analysis for building an information secure system?
[7 marks]How are computer related privacy problems an hindrance to information security?
[7 marks]Explain the similarities and differences among copyrights, patents and trade secrets with respect to information security.
[7 marks]