SYSTEM SECURITY (SS) DECEMBER 2010 COMPUTER SCIENCE SEMESTER 7
Con.6132-10 (REVISED COURSE) GT-8835(3 Hours) [Total Marks:-100]
N.B: (1) Question No.1 is compulsory.
(2) Attempt any four questions out of remaining six questions.
(3) Figures to the right indicate full marks.
(4) Answer to the question should be grouped and written together.
(5) Answer any suitable data wherever required but justify the same.
1. (a) Explain different kinds of controls provided to secure information. [5 Marks]
(b) Does VPN use Link or End to End encryption? Justify your answer. [5 Marks]
(c) What are the information security goals? Explain why the balance among different goals is
needed. [5 Marks]
(d) What are different types of malicious code? [5 Marks]
2. (a) Explain Advanced Encryption Standard Algorithm in detail. [10 Marks]
(b) Write a note on kerberos system that supports authentication in distributed
system. [10 Marks]
3. (a) Explain control of access to general objects in operating system. [10 Marks]
(b) Explain normalicious program errors with examples. [10 Marks]
4. (a) In RSA system the public key of a given user is e=7 and n=187
(i) What is the private key of this user? [4 Marks]
(ii) If the intercepted ciphertext is c=11 and sent to a user whose public key is e=7 and n=187.
What is the plaintext? [4 Marks]
(iii) What are the possible approaches to defeating the RSA algorithm? [2 Marks]
(b) What is spoofing? Explain the session hijacking attack. [10 Marks]
5. (a) List functions of Instruction Detection System. Explain and differentiate signature based and
anamoly based IDS. [10 Marks]
(b) Write a detail note on Biometrics Techniques. [10 Marks]
6. Write a detail note on (any two):- [20 Marks]
(a) SSL Handshake Protocol.
(b) Key exchange using Diffie Hellnam algorithm
(c) Data Encryption Standard (Symmetric key algorithm)
7. (a) Explain how threat precursors are used for reconnaissance of netwrok. [10 Marks]
(b) Explain denial of service attacks. [10 Marks]
No comments:
Post a Comment