INFORMATION AND NETWORK SECURITY INS May2011 Semester 6 BE IT
(3 Hours) [Total Marks:100]
1. a) | Explain different kinds of threats to information security. | 5 |
b) | Does a PKI use symmetric or asymetric encryption? Explain your answer. | 5 |
c) | What are the information security goals? Explain why the balance among | 5 |
different goals in needed. | ||
d) | What are different types of malicious code? | 5 |
2. a) | Explain Advanced Encryption Standard Algorithm in detail. | 10 |
OR | ||
a) | Use the playfair cipher to encipher the message, "The key is hidden under the | 10 |
door pad". The secret key can be made by filling the first and part of the | ||
second row of a matrix with the word "GUIDANCE". filling of rest of the matrix | ||
can be done with remaining alphabets. Consider alphabets 'Y' , and 'Z' togather | ||
in one cell of the matrix. | ||
b) | Write a note Kerberos system that supports authentication in distributed | 10 |
system. | ||
3. a) | Explain control of access to general objects in operating system. | 10 |
b) | Explain nonmaiicious program errors with example. | 10 |
4. a) | If generator g=2 and n or p=11, using Diffie-Hellman algorithm solve the | |
following. | ||
(i) Show that 2 is a primative root of 11. | 4 | |
(ii) If A has public key '9' what is A's private key? | 2 | |
(iii) If B has public key '3', what is B's private key? | 2 | |
(iv) Calculate the ahared secret key. | 2 | |
b) | Explain different denial of service attacks. | 10 |
5. a) | List, explain and compare different kinds of firewalls used for network security. | 10 |
b) | List and explain the contents of a security plan for administrative security. | 10 |
6. | Write a detail note on (any two) : | 20 |
a) E-mail security | ||
b) RSA algorithm (Public key algorithm) | ||
c) Data Encryption Standard (symmetric key algorithm) | ||
d) Covert channel. | ||
7. a) | What is the term Risk analysis? Explain in detail the steps in Risk analysis. | 10 |
b) | How is physical security provided for protection needed outside the computer | 10 |
system? |
No comments:
Post a Comment