5 eSecurity (3)

Resources | Revision Questions | Information Technology IT

Login to see all questions

Click on a question to view the answer

1.

Question 1: Explain the key differences between a Trojan horse and a worm, detailing their methods of propagation and primary objectives. Consider how their impact on a system differs.

2.

Question 3: Discuss the role of different security measures in protecting personal data in a cloud computing environment. Consider both the responsibilities of the cloud service provider and the responsibilities of the data controller (the organisation using the cloud service). Provide examples of specific security measures for each.

3.

Explain the difference between signature-based and heuristic-based malware detection. Provide examples of each type of detection and discuss the advantages and disadvantages of each.