NATIONAL INSTITUTE OF TRANSPORT(NIT)
FACULTY OF INFORMATICS AND TECHNICAL EDUCATION
DEPARTMENT OF COMMPUTING AND COMMUNICATION TECHNOLOGY
STUDENT NAME: WANDOWA TITUS ELISHA
REGISTRATION NO: NIT/BCS/2022/443
PROGRAMME: BACHELOR DEGREE IN COMPUTER SCEINCE
MODULE NAME: INFORMATION SYSTEMS SECURITY
MODULE CODE: ITU08203
LECTURE’S NAME: SARA FLORENCE
SEMESTER: 2
TASK : INDIVIDUAL ASSIGNMENT
ACADEMIC YEAR:2024/2025
1. Use IT skills in analysing security mechanisms in different OS and information
systems
Hint
i. Analyze security features of an information system Information systems use
various methods to keep data safe, such as:
Information systems employ a variety of security mechanisms to protect data integrity,
confidentiality, and availability. These mechanisms are critical for safeguarding sensitive
information from unauthorized access, breaches, and cyberattacks. Key security features
include:
a) Password protection: Ensures only authorized users can access systems by
requiring strong, unique passwords. For example, Windows Active Directory uses
password policies to lock accounts after failed login attempts.
b) Firewalls: Act as a barrier between trusted and untrusted networks, filtering
incoming and outgoing traffic based on predefined rules. Firewalls can be
hardware-based (e.g., Cisco ASA) or software-based (e.g., Windows Defender
Firewall).
c) Antivirus software: Detects, prevents, and removes malware such as viruses,
ransomware, and spyware. Tools like McAfee, Norton, or Windows Defender use
signature-based detection
d) Encryption: Protects data by converting it into an unreadable format using
algorithms like AES-256 or RSA. For instance, HTTPS uses TLS encryption to
secure web communications, ensuring data privacy during transmission.
e) Access control: Defines who can view or modify data through mechanisms like
user authentication and authorization. For example, Role-Based Access Control
(RBAC) in systems
ii. Discuss memory and address protection Operating systems protect memory so
that one program does not interfere with another. This is done using:
a) Virtual memory: is a memory management technique that creates an abstraction
layer, allowing each process to operate as if it has its own dedicated memory
space.
b) Memory isolation: It ensures that each process operates in a separate memory
space, preventing interference or unauthorized access between processes. This is
essential for both security and stability in multi-process environments.
c) Address protection: Address protection mechanisms prevent unauthorized access
to memory addresses, ensuring that processes can only interact with their
allocated memory regions. This is crucial for defending against malicious attacks
and ensuring system integrity.
iii. Discuss file protection mechanisms Files are protected using:
a) File permissions: It define who can access a file and what actions they can
perform, such as reading, writing, or executing. Permissions are a cornerstone of
file security in most operating systems.
b) Encryption: It protects files by converting their contents into an unreadable
format, accessible only with the correct decryption key. This ensures data
confidentiality, even if a file is stolen or accessed without authorization.
c) User roles to limit access: User roles restrict file access based on a user’s
responsibilities or privileges within a system, ensuring that only authorized
individuals can interact with specific files.
iv. Analyze control mechanisms for general object access The system controls access
to things like files, printers, or networks by using:
a) Access Control Lists (ACLs): ACLs are detailed lists that specify which users or
groups can access an object and what operations they can perform (e.g., read,
write, execute).
b) Role-Based Access Control (RBAC): RBAC grants access to objects based on a
user’s role within an organization, simplifying permission management by
grouping privileges under roles.
c) User authentication methods (passwords, biometrics, etc.): Authentication verifies
a user’s identity before granting access to objects, ensuring that only legitimate
users can interact with system resources.
2. Use IT skills in proposing an ICT policy for an organization
Hint
i. Define Policy
A policy is a formalized set of rules or guidelines created to help people in an organization do
their work properly and safely.
ii. Discuss common content of an ICT policy
A good ICT policy usually includes:
a) Acceptable use of computers and internet
b) Data protection and privacy rules
c) Email and password guidelines
d) Backup and recovery plans
e) Software usage and licensing rules
iii. Discuss proper ICT policy implementation
To make sure the ICT policy is followed, an organization should:
a) Train employees on the policy
b) Use monitoring tools
c) Review and update the policy regularly - Enforce rules fairly
iv. Propose an ICT policy based on the requirements
Example: For a school, the ICT policy can include:
- Students should not access gaming or social media sites
- Teachers must back up files regularly
- Only licensed software is allowed
v. Identify factors that hinder ICT policy implementation
Some reasons why ICT policies are not followed include:
a) Lack of employee training
b) Poor communication
c) No support from top management
d) Old or weak IT systems
e) No punishment for breaking rules