100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.6 TrustPilot
logo-home
Exam (elaborations)

SEP2605 Assignment 2 (COMPLETE ANSWERS) Semester 2 2025 - DUE 25 September 2025

Rating
-
Sold
-
Pages
8
Grade
A+
Uploaded on
21-09-2025
Written in
2025/2026

SEP2605 Assignment 2 (COMPLETE ANSWERS) Semester 2 2025 - DUE 25 September 2025; 100% TRUSTED Complete, trusted solutions and explanations. For assistance, Whats-App 0.6.7-1.7.1-1.7.3.9. Ensure your success with us.. Question 1 Discuss and provide examples of the main differences between hacking and cracking. (8) Question 2 Cohen (1995:108-109) defines information as a symbolic representation in its most general sense. Protection is defined as keeping from harm. In the field of information protection, it refers to preventing harm to symbolic representations and the users of the information. Discuss the factors that are basic to information protection. (12) Question 3 Control rooms are at the heart of the security operation. Several issues and challenges are associated with designing a control room. Describe the challenges associated with designing a control room. (5) Question 4 Risk management is the process of assessing risk, taking steps to reduce risk to an acceptable level, and maintaining that level of risk (Blyth & Kovacich, 2006:47). Identify the five principles of risk management. (10) Question 5 A fire is a combustion process in which a fuel reacts with oxygen to give off heat and light. In an essay format, discuss how fires spread, apart from direct burning. (15)

Show more Read less
Institution
Course









Whoops! We can’t load your doc right now. Try again or contact support.

Connected book

Written for

Institution
Course

Document information

Uploaded on
September 21, 2025
Number of pages
8
Written in
2025/2026
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

SEP2605
Assignment 2 Semester 2 2025
Unique Number:
Due Date: 25 September 2025

QUESTION 1

Discuss and provide examples of the main differences between hacking and cracking

Hacking and cracking are both terms linked to gaining access to computer systems, but they
are not the same. Hacking is often done to understand systems better, sometimes even with
good intentions. For example, ethical hackers test systems to find weaknesses before
criminals can use them. Some hackers help companies improve their cybersecurity. These
types of hackers do not damage systems or steal information.

Cracking, on the other hand, is done with bad intentions. Crackers break into systems to
steal data, damage files, or cause harm. They may crack software to remove security codes
or license checks. For example, when someone removes the activation code from a program
so others can use it for free, that is cracking.

The key difference is the purpose. Hackers may explore and report problems, while crackers
want to break, destroy, or steal. Hackers can be legal and helpful. Crackers are always
breaking the law and damaging property. Terms of use
By making use of this document you agree to:
 Use this document as a guide for learning, comparison and reference purpose,
Terms of use
 Not to duplicate, reproduce and/or misrepresent the contents of this document as your own work,
By making use of this document you agree to:
 Use this document
Fully accept the consequences
solely as a guide forshould you plagiarise
learning, reference,or and
misuse this document.
comparison purposes,
 Ensure originality of your own work, and fully accept the consequences should you plagiarise or misuse this document.
 Comply with all relevant standards, guidelines, regulations, and legislation governing academic and written work.

Disclaimer
Great care has been taken in the preparation of this document; however, the contents are provided "as is" without any express or
implied representations or warranties. The author accepts no responsibility or liability for any actions taken based on the
information contained within this document. This document is intended solely for comparison, research, and reference purposes.
Reproduction, resale, or transmission of any part of this document, in any form or by any means, is strictly prohibited.

, +27 67 171 1739



QUESTION 1

Discuss and provide examples of the main differences between hacking and
cracking

Hacking and cracking are both terms linked to gaining access to computer systems,
but they are not the same. Hacking is often done to understand systems better,
sometimes even with good intentions. For example, ethical hackers test systems to
find weaknesses before criminals can use them. Some hackers help companies
improve their cybersecurity. These types of hackers do not damage systems or steal
information.

Cracking, on the other hand, is done with bad intentions. Crackers break into
systems to steal data, damage files, or cause harm. They may crack software to
remove security codes or license checks. For example, when someone removes the
activation code from a program so others can use it for free, that is cracking.

The key difference is the purpose. Hackers may explore and report problems, while
crackers want to break, destroy, or steal. Hackers can be legal and helpful. Crackers
are always breaking the law and damaging property.

To summarise, hacking can be legal or illegal depending on the intent and
permission, while cracking is always illegal and harmful. (SEP2605 study guide,
2014)




QUESTION 2

Discuss the factors that are basic to information protection

Information protection is about making sure information is kept safe from harm. This
includes protecting the information itself and also the people using it. According to
the SEP2605 study guide (2014), several important factors help protect information
properly.




Disclaimer
Great care has been taken in the preparation of this document; however, the contents are provided "as is"
without any express or implied representations or warranties. The author accepts no responsibility or
liability for any actions taken based on the information contained within this document. This document is
intended solely for comparison, research, and reference purposes. Reproduction, resale, or transmission
of any part of this document, in any form or by any means, is strictly prohibited.

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
EduPal University of South Africa (Unisa)
Follow You need to be logged in order to follow users or courses
Sold
149382
Member since
7 year
Number of followers
35998
Documents
4402
Last sold
1 hour ago

4.2

13597 reviews

5
7830
4
2694
3
1799
2
455
1
819

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions