Question 6 [15 marks]
i.
List and explain the six (6) controls used to block threats by neutralizing vulnerabilities. [6]
ii.
Controls can be grouped into three largely independent classes. The following table shows the
classesand several examples of each type of control. Match the examples to the correct classes. Use the
Roman characters on the left of the table and write the corresponding letters representing the correct
answers on the right.
[3]
Control classes
i. Administrative controls
ii. Technical controls
iii. Physical controls
Example
(a) Laws, regulation
(b) Locks, fences, human guards
(c) Network protocols, firewalls
(d) Intrusion attempts
(e) Skimming
111. Risk analysis is an organized process for identifying the most significant risks in a computing
environment, determining the impact of those risks and weighing the desirability of applying various
controls against those risks.
a) How can you identify risk?
[2]
b) What are the first two steps of risk analysis?
[2]
c) Which two types of costs are associated with RiskAnalysis?
[2]
Question 7 [10 marks)
i.
Name the three (3) cloud service models, and discuss any security issues associated with each
model. (No abbreviations of the names)
[6]
ii.
Outline any four (4) security considerations to be taken into account before an organization
moves it functionality or data to a cloud environment.
[4]
Question 8 [10 marks]
i.
A cryptosystem involves a set of rules for how to encrypt the plaintext and decrypt the ciphertext.
The number of keys used are determined by the encryption algorithm.
a) The following diagram shows which encryption algorithm?
[2]
Eh
FIE
-Eh·•-
Sender
Plaintext
data
;,lii-f>~ - ->bl-
I
Ciphered
,,
Data
Decrypted
Plaintext
data
Shared Key
'
Shared Key
4
FEE
Eh
EMF
Recipient