MU Information Technology (Semester 6)
Information & Network Security
May 2012
Total marks: --
Total time: --
INSTRUCTIONS
(1) Assume appropriate data and state your reasons
(2) Marks are given to the right of every question
(3) Draw neat diagrams wherever necessary


1 (a) Consider an online fees payment system. People will cast their vote through internet. For this system identify vulnerability, threat and attacks.
5 M
1 (b) Define the term confidentiality, integrity and availability. Give one example each of two attacks each that violates these goals.
5 M
1 (c) Describe any two non malicious program flaws.
5 M
1 (d) Explain session hijacking attack with an example.
5 M

2 (a) Explain clearly the difference between block and stream cipher.
10 M
2 (b) Give the list of network vulnerability with an example each.
10 M

3 (a) Differentiate between public and private key cryptosystem. Give examples of each type of cryptosystem.
10 M
3 (b) Write a short note on different authentication methods.
10 M

4 (a) Describe various types of viruses that can infect a system.
10 M
4 (b) What is role of firewall in securing a network? Describe different types of firewall.
10 M

5 (a) Use two prime number p=3, q=5 and explain the working of RSA cryptosystem.
10 M
5 (b) Explain any 2 access control mechanism. Indicate the advantage and disadvantage of each schema.
10 M

6 (a) Explain the protocol flaws existing in TCP/IP model that leads to security incidents and how to overcome them.
10 M
6 (b) What is role of hashing? Explain any one hashing algorithm.
10 M

Write detailed notes on the following:-
7 (a) Intrusion Detection Systems.
10 M
7 (b) Secure Socket Layer (SSL).
10 M



More question papers from Information & Network Security
SPONSORED ADVERTISEMENTS