INFORMATION AND NETWORK SECURITY INS December 2010 Semester 6 BE IT
Con. 6146-10. (REVISED COURSE) GT-7677
(3 Hours) [Total Marks:100]
N.B.: (1) Question No.1 is compulsory.
(2) Attempt any four out of remaining six questions.
(3) Assume suitable data if necessary and state the assumptionsclearly.
Q1. (a) | What are the attacks in information transfer? Also write the security services used | |
to prevent these attacks. | 05 | |
(b) | How AES is better than DES? | 05 |
(c) | Compare ACL with C-List | 05 |
(d) | Explain Session Hijacking. | 05 |
Q2. (a) | Explain RSA cryptosystem in detail. | 10 |
(b) | Explain Network layer attacks. Discuss packet sniffing in detail | 10 |
Q3. (a) | What is symmetric key cryptography ? Explain A5/1 algorithm. | 10 |
(b) | Discuss Denial of Service attack with recauses, preventive and reactive measures. | 10 |
Q4. (a) | Discuss various categories of malware and ways to detect them. | 10 |
(b) | Explain different types of firewalls. At which layer of Internet Protocol stack do | 10 |
each operate? | ||
Q5. (a) | Explain Cryptographic hash function and explain Tiger hash in detail | 10 |
(b) | What are the security policies used by banks during the time of disaster | 10 |
Q6. (a) | Discuss different biometric means used for Authentication. Compare them with | 10 |
password authentication. | ||
(b) | Compare Signature based and Anomaly based IDS with suitable examples. | 10 |
Q7. (a) | Write notes on any three of the following: | 20 |
(i) knapsack cryptosystem | ||
(ii) Covert channel | ||
(iii) Risk Analysis | ||
(iv) Web Server vulnerabilities. |
No comments:
Post a Comment