computer Security

Please answer the attached file

Save Time On Research and Writing
Hire a Pro to Write You a 100% Plagiarism-Free Paper.
Get My Paper

College of Computing and Informatics
Instructions:
• You must submit two separate copies (one Word file and one PDF file) using the Assignment Template on
Blackboard via the allocated folder. These files must not be in compressed format.
• It is your responsibility to check and make sure that you have uploaded both the correct files.
• Zero mark will be given if you try to bypass the SafeAssign (e.g. misspell words, remove spaces between
words, hide characters, use different character sets, convert text into image or languages other than English
or any kind of manipulation).
• Email submission will not be accepted.
• You are advised to make your work clear and well-presented. This includes filling your information on the cover
page.
• You must use this template, failing which will result in zero mark.
• You MUST show all your work, and text must not be converted into an image, unless specified otherwise by
the question.
• Late submission will result in ZERO mark.
• The work should be your own, copying from students or other resources will result in ZERO mark.
• Use Times New Roman font for all your answers.
Question One
Pg. 01
Learning
Outcome(s):
Define the
fundamental
concepts of
computer security
including design
principles,
cryptography, risk
assessment and
risk management.
Question One
2 Marks
There are different approaches of Intrusion detection concept. Describe any
four of these approaches and illustrate the difference between each approach.
Question Two
Pg. 02
Learning
Outcome(s):
Identify security
challenges and
apply various
security
management
tools to ensure
system security
and privacy.
Question Two
2 Marks
Compare and contrast firewalls and intrusion prevention systems in terms of
purpose, functionality, granularity and use cases.
Question Three
Pg. 03
Learning
Outcome(s):
Identify
security
Question Three
3 Marks
Review some of the recent vulnerability announcements from CERT, SANS, or
similar organizations. Identify three security alerts that occur as results of a buffer
overflow attack. Provide the following information about the security alerts.
challenges
and apply
various
#
security
management
tools to
ensure
system
security and
privacy.
.
1
2
3
Warning
Date
Severity
Level
Description
Threats
Best practice and
Recommendations
Question Four
Pg. 04
Learning
Outcome(s):
Identify security
challenges and
apply various
security
management
tools to ensure
system security
and privacy.
Question Four
1 Marks
How is a chroot jail used to improve application security? Discuss some of the
disadvantages of chroot?

Still stressed with your coursework?
Get quality coursework help from an expert!