written 8.7 years ago by |
Information & Network Security - Dec 2011
Information Technology (Semester 6)
TOTAL MARKS: 100
TOTAL TIME: 3 HOURS
(1) Question 1 is compulsory.
(2) Attempt any four from the remaining questions.
(3) Assume data wherever required.
(4) Figures to the right indicate full marks.
1 (a) What is Firewall? Describe the types of firewalls with their limitations.(10 marks)
1 (b) Explain denial of service attacks in networks.(10 marks)
2 (a) Explain Risk Analysis in detail.(10 marks)
2 (b) Explain Digital Signature properly.(10 marks)
3 (a) Explain secure e-mail with example.(10 marks)
3 (b) Explain DES properly.(10 marks)
4 (a) Explain Kerberos system properly.(10 marks)
4 (b) Explain hash function with example.(5 marks)
4 (c) Explain RSA algorithm.(5 marks)
5 (a) Explain different kinds of threats to information security. Elaborate on information security goals.(10 marks)
5 (b) List and explain the contents of security plan for administrative security.(10 marks)
6 (a) Give difference between symmetric and asymmetric cryptography.(10 marks)
6 (b) Explain control of access to generate objects in operating system.(10 marks)
Write short notes on (any four):-
7 (a) Public Key Infrastructure.(5 marks) 7 (b) Advanced Encryption Standards (AES).(5 marks) 7 (c) Types of malicious code.(5 marks) 7 (d) Convert Channel.(5 marks) 7 (e) Non-malicious program errors.(5 marks) 7 (f) Intrusion Detection System.(5 marks) 7 (g) Distinguish between Vulnerability, Threat and Control.(5 marks)