INFORMATION AND NETWORK SECURITY INS May2011 Semester 6 BE IT
(3 Hours) [Total Marks:100]
| 1. a) | Explain different kinds of threats to information security. | 5 | 
| b) | Does a PKI use symmetric or asymetric encryption? Explain your answer. | 5 | 
| c) | What are the information security goals? Explain why the balance among | 5 | 
| different goals in needed. | ||
| d) | What are different types of malicious code? | 5 | 
| 2. a) | Explain Advanced Encryption Standard Algorithm in detail. | 10 | 
| OR | ||
| a) | Use the playfair cipher to encipher the message, "The key is hidden under the | 10 | 
| door pad". The secret key can be made by filling the first and part of the | ||
| second row of a matrix with the word "GUIDANCE". filling of rest of the matrix | ||
| can be done with remaining alphabets. Consider alphabets 'Y' , and 'Z' togather | ||
| in one cell of the matrix. | ||
| b) | Write a note Kerberos system that supports authentication in distributed | 10 | 
| system. | ||
| 3. a) | Explain control of access to general objects in operating system. | 10 | 
| b) | Explain nonmaiicious program errors with example. | 10 | 
| 4. a) | If generator g=2 and n or p=11, using Diffie-Hellman algorithm solve the | |
| following. | ||
| (i) Show that 2 is a primative root of 11. | 4 | |
| (ii) If A has public key '9' what is A's private key? | 2 | |
| (iii) If B has public key '3', what is B's private key? | 2 | |
| (iv) Calculate the ahared secret key. | 2 | |
| b) | Explain different denial of service attacks. | 10 | 
| 5. a) | List, explain and compare different kinds of firewalls used for network security. | 10 | 
| b) | List and explain the contents of a security plan for administrative security. | 10 | 
| 6. | Write a detail note on (any two) : | 20 | 
| a) E-mail security | ||
| b) RSA algorithm (Public key algorithm) | ||
| c) Data Encryption Standard (symmetric key algorithm) | ||
| d) Covert channel. | ||
| 7. a) | What is the term Risk analysis? Explain in detail the steps in Risk analysis. | 10 | 
| b) | How is physical security provided for protection needed outside the computer | 10 | 
| system? | 
 
No comments:
Post a Comment