Securing Operating System Question One
Securing Operating System Question One
Securing Operating System Question One
QUESTION ONE
QUESTION TWO
QUESTION THREE
1
d) If you were going to break into a database-based website, how would you do it?
2
QUESTION FIVE
a) With a well detailed diagrammatic illustration, discuss how you would secure a Local
Area Network from internet attacks.
b) Describe the CIA triangle architecture
QUESTION SIX
QUESTION SEVEN
QUESTION EIGHT
a) Discuss the major webserver security threats and their counter measures.
QUESTION NINE
a) Explain at least four requirements for computer protection and security mechanism.
b) Discuss ways of protecting web Interfaces.
QUESTION TEN
3
iii. Operating system
iv. Networking
b) Explain the program threats in operating system
c) Explain the system and network threats in OS
QUESTION ELEVEN
QUESTION TWELVE
QUESTION THIRTEEN
Plain C D E H I N P R S T Y
Cypher X J L A Z E V K H O M