Monday, April 21, 2014

INFORMATION AND NETWORK SECURITY INS May2011 Semester 6 BE IT

INFORMATION AND NETWORK SECURITY INS May2011 Semester 6 BE IT

                                                       (3 Hours)                                           [Total Marks:100]

1. a)Explain different kinds of threats to information security.5
    b)Does a PKI use symmetric or asymetric encryption? Explain your answer.5
    c)What are the information security goals? Explain why the balance among5
different goals in needed.
    d)What are different types of malicious code?5

2. a)

Explain Advanced Encryption Standard Algorithm in detail.

10
                                       OR
    a)Use the playfair cipher to encipher the message, "The key is hidden under the10
door pad". The secret key can be made by filling the first and part of the
second row of a matrix with the word "GUIDANCE". filling of rest of the matrix
can be done with remaining alphabets. Consider alphabets 'Y' , and 'Z' togather
in one cell of the matrix.
    b)Write a note Kerberos system that supports authentication in distributed10
system.

3. a)

Explain control of access to general objects in operating system.

10
    b)Explain nonmaiicious program errors with example.10

4. a)

If generator g=2 and n or p=11, using Diffie-Hellman algorithm solve the
following.
   (i)   Show that 2 is a primative root of 11.4
   (ii)   If A has public key '9' what is A's private key?2
   (iii)  If B has public key '3', what is B's private key? 2
   (iv)  Calculate the ahared secret key.2

b)

Explain different denial of service attacks.

10

5. a)

List, explain and compare different kinds of firewalls used for network security.

10
    b)List and explain the contents of a security plan for administrative security.10

6.

Write a detail note on (any two) :

20
     a) E-mail security
     b) RSA algorithm (Public key algorithm)
     c) Data Encryption Standard (symmetric key algorithm)
     d) Covert channel.

7. a)

What is the term Risk analysis? Explain in detail the steps in Risk analysis.

10
    b)How is physical security provided for protection needed outside the computer10
system?
Also see Information and network security question papers for December 2010

No comments:

Post a Comment