Tampere University, ITC, Computing Sciences
Comp.Sec.100 Cyber Security 1
Spare "small essay" questions for Exam 3
If your (successful) Harpo automatic exercises and (non-successful public) Exam 2 questions do not provide 7 question for the small essays in Exam 3, the rest will be drawn from these. Of course, only the questions, not the references will appear in the exam. CyBOK is linked in Maps & Lists, which can be found from Harpo main page.
- Why is privacy important for the proper working of a democratic society?
[CyBOK page 172]
- What rights does the data subject have according to GDPR?
[see Wikipedia, if not GDPRCh. III]
- Cryptography is a class of methods that transform the task of protecting large quantities of data to that of protecting a small number of bits. Explain this and its consequences to the management of those bits.
[CyBOK sec. 18.3]
- Why is it good to make the computer network of an organization to have several domains or subnets that are separated by firewalls?
[CyBOK sec. 19.3.4.5 and 19.4.1]
- Describe the role of an operating system in protecting an information system from malicious users and software.
[CyBOK sec. 11.0 and 11.2]
- Explain the main rules for backups in terms of time, location and use.
[Wikipedia]
- Physical security of computing facilities involves the classical elements: earth, water, air and fire. Something modern must be added. What is it and how does it relate to some of the earlier ones — in terms of cyber security?
[Wikipedia: UPS, Li-ion fire, EMC, etc]
- Describe common human weaknesses that are significant sources of cyber security problems. Do not deal with such weaknesses that lead to criminal behaviour.
[CyBOK sec. 4.2.1.1, 4.3,Wikipedia]
- What are ways that a state can use against another in the cyberspace?
[CyBOK 21.4.2 and Wikipedia]
- Trust is important in cyber security, although one of the secure design principles is to minimize the need of trust. Where is trust needed in cyber security and how?
[Maps&lists sec. 25]