1 (a)
Consider an online fees payment system. People will cast their vote through internet. For this system identify vulnerability, threat and attacks.
5 M
1 (b)
Define the term confidentiality, integrity and availability. Give one example each of two attacks each that violates these goals.
5 M
1 (c)
Describe any two non malicious program flaws.
5 M
1 (d)
Explain session hijacking attack with an example.
5 M
2 (a)
Explain clearly the difference between block and stream cipher.
10 M
2 (b)
Give the list of network vulnerability with an example each.
10 M
3 (a)
Differentiate between public and private key cryptosystem. Give examples of each type of cryptosystem.
10 M
3 (b)
Write a short note on different authentication methods.
10 M
4 (a)
Describe various types of viruses that can infect a system.
10 M
4 (b)
What is role of firewall in securing a network? Describe different types of firewall.
10 M
5 (a)
Use two prime number p=3, q=5 and explain the working of RSA cryptosystem.
10 M
5 (b)
Explain any 2 access control mechanism. Indicate the advantage and disadvantage of each schema.
10 M
6 (a)
Explain the protocol flaws existing in TCP/IP model that leads to security incidents and how to overcome them.
10 M
6 (b)
What is role of hashing? Explain any one hashing algorithm.
10 M
Write detailed notes on the following:-
7 (a)
Intrusion Detection Systems.
10 M
7 (b)
Secure Socket Layer (SSL).
10 M
More question papers from Information & Network Security