INFORMATION AND NETWORK SECURITY INS May 2012 Semester 6 BE IT
Con. 3731-12. GN-7332
(3 Hours) [ Total Marks:100]
N.B. (1) Question No. 1 is compulsory.
(2) Answer any four out of the remaining questions.
(3) Answers to subsections must be answered together.
Q1. (a) | Consider an online fees payment system. people will cast their votes through the | (05) |
Internet. For this system identify vulnerablity, threat and attacks. | ||
(b) | Define the terms Confidentiality, Integrity and Availability. Give one example each of | (05) |
two attacks each that violates these goals. | ||
(c) | Describe any two non malicious program flaws. | (05) |
(d) | Explain the session hijacking attack with an example. | (05) |
Q2. (a) | Explain clearly the differences between block and stream ciphers. | (10) |
(b) | Give a list of network vulnerabilities with an example each. | (10) |
Q3. (a) | Differntiate between public and private key cryptosystems. Give Examples | (10) |
of each type of cryptosystem. | ||
(b) | Write a note on different authentication methods. | (10) |
Q4. (a) | Describe the various types of viruses that can infect a system. | (10) |
(b) | What is the role of a firewall in securing a network? Describe different | (10) |
types of firewalls. | ||
Q5. (a) | Use two prime numbers p=3, q=5, and explain the full working of the | (10) |
RSA Cryptosystem. | ||
(b) | Explain any two access control mechanism. Indicate clearly the advantages and | (10) |
disadvantages of each scheme. | ||
Q6. (a) | Explain the protocol flaws existing in the TCP/IP model that can lead to security | (10) |
incidents & how to overcome them. | ||
(b) | What is the role of hashing? Explain any one hashing algorithm. | (10) |
Q7. | Write a detailed note on any one of the following topics:- | |
(a) Intrusion Detection Systems | (10) | |
(b) Secure Sockets Layer (SSL) | (10) |
No comments:
Post a Comment