SECTION A: 20 MARKS [Answer all Questions]
Question 1: [10 Marks]
Scenario: You are a security analyst working for a company that stores customer data. Your company
has been targeted by a cyber-attack, and the attackers have gained access to the customer data. The
data is encrypted using a symmetric key algorithm, but the attackers have also obtained the
encryption key.
(a) What steps would you take to mitigate the damage caused by the breach?
[6 marks]
(b) What measures would you implement to prevent similar breaches in the future? [4 marks]
Question 2: [10 Marks]
Scenario: You are a security consultant working for a financial institution that is considering
implementing a new key management system for its encrypted data.
(a) What factors would you consider when selecting a key management system?
(b) What challenges might you encounter during the implementation process?
[2 marks]
[4 marks]
(c) Discuss potential solutions to these challenges.
[4 marks]
SECTION B: 50 Marks [Answer all Questions]
Question 3: [15 Marks]
Considering the practical application of Cryptography on the Internet, answer each of the following
questions precisely.
(a) What are the security requirements?
(b) What are the application constraints which influence decision-making?
[4 marks]
[2 marks]
(c) Which cryptographic primitives are deployed?
[2 marks]
(d) Which cryptographic algorithms and key lengths are supported?
[4 marks]
(e) How is key management conducted?
[3 marks]
Question 4: [15 Marks]
(a) Come up with practical examples that demonstrate the relationship between security services
provided by cryptography as outlined by the contrasting reviews below: -
i. Data Origin Authentication and Entity Authentication are different.
[4 marks]
ii. Data Origin Authentication plus a Freshness Check can provide Entity
Authentication.
[4 marks]
iii. Confidentiality does not imply Data Origin Authentication.
[4 marks]
Page 2