Question 1 Q.1.1 Read the following scenario and then answer the question that follows: A tertiary institution uses a st
-
- Site Admin
- Posts: 899603
- Joined: Mon Aug 02, 2021 8:13 am
Question 1 Q.1.1 Read the following scenario and then answer the question that follows: A tertiary institution uses a st
Question 1 Q.1.1 Read the following scenario and then answer the question that follows: A tertiary institution uses a students' record database to store and report on personal records, assessment marks and student fees. Managers, administrators, lecturers and students are users of the database. All users are given and authorised to access specific parts of the database. The database is secure but not always updated as required and security administrators are concerned about the lack of users' awareness of keeping authentication credentials safe and private. Using the scenario above, provide an example of each of the information security concepts in (A-E) below. In your answer, identify one event that could potentially compromise the database should anything goes wrong. A. Asset. B. Exploit. C. Exposure. D. Threat. E. Risk. (Marks: 20) Q.1.2 Using examples, differentiate between a cracker and a phreaker. In your answer, describe two examples of why the activities of crackers and phreakers are problematic in South Africa. (10) (10)