MU Information Technology (Semester 6)
System & Web Security
December 2011
Total marks: --
Total time: --
INSTRUCTIONS
(1) Assume appropriate data and state your reasons
(2) Marks are given to the right of every question
(3) Draw neat diagrams wherever necessary


1 (a) How does RC4 Stream cipher work?
3 M
1 (b) Explain Knapsack Algorithm with example.
5 M
1 (c) What are the key principles of security?
5 M
1 (d) What is Software Reverse Engineering?
5 M

2 (a) Explain MD5 in detail.
10 M
2 (b) Compare Packet Sniffing and Packet Spoofing. Explain the Session Hijacking attack.
10 M

3 (a) Explain one time initialization process and processes in each round of advanced encryption standard.
10 M
3 (b) Explain IPSec protocols in detail. Also write applications and advantages of IPSec.
10 M

4 (a) What is Buffer overflow and incomplete mediation in Software Security?
10 M
4 (b) Explain how threat precursors are used for Reconnaissance of network.
10 M

5 (a) How flaws in TCP/IP can cause operating systems to become vulnerable? Also explain how Kerberos are used for user authentication in Windows.
10 M
5 (b) Based on packet filters and proxy servers what are different firewall configurations. What are the limitations of firewall?
10 M

6 (a) What are different types of password? Explain how they work with neat diagrams. What are the problems with passwords?
10 M
6(b) What is Malware ? Explain Salami and Linearization attacks.
10 M

7 (b) Captcha
5 M
7 (c) SHA-1
5 M
7 (d) Digital Rights Management
5 M
7 (e) Multiple-level security model.
5 M
Write short notes on ( Any four )
7(a) Honeypots
5 M



More question papers from System & Web Security
SPONSORED ADVERTISEMENTS