• No results found

Information Security from a global perspective 180521

N/A
N/A
Protected

Academic year: 2021

Share "Information Security from a global perspective 180521"

Copied!
3
0
0

Loading.... (view fulltext now)

Full text

(1)

Information Security from a

Global Perspective

7.5 ECTS

Ladokcode: 21IG1A

The exam is given to: IMIT16, IS

ExamCode: TEN1

Date of exam: 21-May-2018

Time: 9-12

Means of assistance: English dictionary (without notes) Total amount of point on exam:: 30 points

Requirements for grading:

E >= 15p, D >= 17p, C >= 20p, B >= 23p, A >= 27p

Exam Code:

General directions:

 Write clearly and on only one side of each sheet.  Use a new sheet for every question.

 Submit all answers in numerical order.

 Mark (on cover sheet) which questions you have answered.

Good Luck!

Techer: Tel:

(2)

Question 1 (3 points)

List what one should consider to create a good password

Question 2 (3 points)

Cloud Computing is getting more and more popular. Describe what it is and list the main security risks/challenges.

Question 3 (3 points)

Describe Business Continuity and Disaster Recovery Planning

Question 4 (3 points)

Explain why Håkan thinks that user training is an important part of the Information Security work and the purpose of the ‘User Security lab’

(3)

Question 5 (4 points) what is quantitative risk analysis

Question 6 (6 points)

Briefly describe the concept of backup and explain why test restores are important. Make and briefly describe simple backup schedule

Question 7 (5 points)

Describe which solution you choose for your UTM lab and why. Also, draw a simple graph over the position that your UTM will have in a network. Include Internet, router, switch, workstations (PCs and laptops), server(s) etc

Question 8 (3 points)

References

Related documents

– Custom email to be sent reiterating terms of licence.. Other uses

Technical security controls can, however, mitigate the se- curity risks that employees non-compliance may result in, technical measures may therefore be implemented together with

This has been done by comparing three different organizations in order to analyze how they work and manage information security with a specific focus on security risk

Equally important as the user awareness in the company, the people working with IT and security need to have a good understanding on how the employees are using their computers and

Since the hash function will be used extensively in the implementation, it is also de- sired that the hash function is very fast at computing the checksum, a property which is

A security analysis based on probabilities, consequences and costs resulted in a priority ranking for physical, logical and human threats for the proposed Swedish road user

Manual training of transformation rules, to manually fit a rule set to the texts contained in the training data, has shown to be a successful method to improve the performance of a

The communication between the controller and the light bulbs during EZ-mode commissioning reveals a major security flaw in that the network key necessary for devices to join the