Total arks: 30 Question 1: A. Explain the following security terms 1 Mark 1 Mark 1 Mark 1 Mark 1 Mark i. Threat ii. Threat Agent Risk iii. iv. Attack Vulnerability v. 5 Marks B. State and Explain any five (5) critical features of information uestion 2: A. Discuss any four (4) forces of nature that can pose as threats on information systems? 4 Marks B. What is the difference between spoofing and sniffing 4 Marks C.List four (4) Software Development Security Problems 2 Mark estion 3: A. Discuss the relationship between Information Security Policy, Standards and Practices 6 Mar B. For a policy to be effective and thus legally enforceable, it must meet certain criteria. List and briefly explain four (4) of such criteria 4 Mar Show transcribed image text Total arks: 30 Question 1: A. Explain the following security terms 1 Mark 1 Mark 1 Mark 1 Mark 1 Mark i. Threat ii. Threat Agent Risk iii. iv. Attack Vulnerability v. 5 Marks B. State and Explain any five (5) critical features of information uestion 2: A. Discuss any four (4) forces of nature that can pose as threats on information systems? 4 Marks B. What is the difference between spoofing and sniffing 4 Marks C.List four (4) Software Development Security Problems 2 Mark estion 3: A. Discuss the relationship between Information Security Policy, Standards and Practices 6 Mar B. For a policy to be effective and thus legally enforceable, it must meet certain criteria. List and briefly explain four (4) of such criteria 4 Mar
Expert Answer
Answer to Total arks: 30 Question 1: A. Explain the following security terms 1 Mark 1 Mark 1 Mark 1 Mark 1 Mark i. Threat ii. Thre…