MU Information Technology (Semester 6)
System & Web Security
May 2014
Total marks: --
Total time: --
INSTRUCTIONS
(1) Assume appropriate data and state your reasons
(2) Marks are given to the right of every question
(3) Draw neat diagrams wherever necessary


1 (a) What are the different security goals ?
5 M
1 (b) What is keyless transposition cipher?Give any example of Rail-fence cipher.
5 M
1 (c) What are the different parameters to measure the accuracy of biometric techniques? Also write the application of biometrics.
5 M
1 (d) What are the various types of IP Spoofing?
5 M

2 (a) Explain the TCP/IP vulnerabilities at each layer.
10 M
2 (b) What are the typical characteristics of enterprise wide networks ? Explain its different router vulnerabilities and firewall vulnerabilities.
10 M

3 (a) Explain A5/1 algorithm in detail.
10 M
3 (b) What are passive and active attacks? Categorize these attacks and explain one example of each.
10 M

4 (a) What is SHA-1?Explain different steps of working in SHA-1.
10 M
4 (b) What are the different methods of malware detection? Explain with their advantages and disadvantages.
10 M

5 (a) What is Bell-LaPadula? How does Bell-LaPadula model works?
10 M
5 (b) Explain different method to commit a session hijack and methods to prevent session hijacking.
10 M

6 (a) Why Secure Socket Layer is needed? What are the different features SSL provide? Explain how SSL works?
10 M
6 (b) How does Kerberos work? Explain with example.
10 M

Write short notes on the following
7 (a) Multiple DES
10 M
7 (b) Software Reverse Engineering (SRE) and prevention of SRE
10 M



More question papers from System & Web Security
SPONSORED ADVERTISEMENTS