MU Information Technology (Semester 6)
System & Web Security
December 2015
Total marks: --
Total time: --
INSTRUCTIONS
(1) Assume appropriate data and state your reasons
(2) Marks are given to the right of every question
(3) Draw neat diagrams wherever necessary


1 (a) Consider an online Volting System. People will cast their votes through the internet. For this system identify vulnerability, threat and attack.
5 M
1 (b) Differentiate between Multilevel and Multilateral security with the help of example.
5 M
1 (c) Explain different types of malicious attacks.
5 M
1 (d) Differentiate between SSL and IP Sec protocols.
5 M

2 (a) Explain Needham Schroeder Authentication Protocol.
5 M
2 (b) What is Digital Signature? Explain how it is created at the sender end and retrieved at receiver end. Differentiate digital signature from digital certificate.
10 M

3 (a) Explain non malicious program errors with the help of examples.
10 M
3 (b) What is Digital Right management? Explain DRM in Real world.
10 M

4 (a) Explain the role of Firewall in securing a network. Describe different types of Firewall.
10 M
4 (b) Explain secure Email and S/MIME.
10 M

Explain the technique behind following attacks:
5 (a) ARP spoofing.
5 M
5 (b) Packet Sniffing
5 M
5 (c) Session Hijacking.
5 M
5 (d) Cross-site request forgery
5 M

Write Short note on:
6 (a) Windows Vulnerabilities.
5 M
6 (b) Access control policies.
5 M
6 (c) Linearization attack.
5 M
6 (d) Distributed -Denial of Service attack.
5 M



More question papers from System & Web Security
SPONSORED ADVERTISEMENTS