MU Information Technology (Semester 6)
System & Web Security
December 2016
Total marks: --
Total time: --
INSTRUCTIONS
(1) Assume appropriate data and state your reasons
(2) Marks are given to the right of every question
(3) Draw neat diagrams wherever necessary


1(a) Give two techniques to establish a covert channel.
5 M
1(b) Comapare and contrast discretionary access control and mandatory access control.
5 M
1(c) Define with examples i) SQL injections ii) Cross-site scripting.
5 M
1(d) What are the different phases of a virus? Explain.
5 M

2(a) What are the different kinds of malware? How do they propagate?
10 M
2(b) Explain RSA algorithm for public key encryption. Given modulus N= 143 and public key =7, find the values of p, q, phi (n), and private key d. Can we choose value of e = 5? Justify.
10 M

3(a) What is a firewall? Explain different types of firewalls and specify at which layer of the Internet stack do they operate?
10 M
3(b) What is a denial of service attack? Discuss different ways in which an attacker can mount a DOS attack.
10 M

4(a) Distinguish between the ESP and AH protocol in IPSec. Show the working of each in transport and tunnel mode.
10 M
4(b) What is an IDS? How does it differ from a honeypot? Discuss the different types of IDS.
10 M

5(a) Explain the process of generation and verification of digital certificate.
10 M
5(b) With respect to SSL protocol explain the following :-
i) Generation of master key
ii) Authenticiation of server to client.
10 M

Wriet short note Any four Q.6 (a, b, c, d, e)
6(a) Windows Security
5 M
6(b) Federated Identity Management
5 M
6(c) Software Reverse Engineering
5 M
6(d) Knapsack cryptosystem
5 M
6(e) No-mailcious programming erros.
5 M



More question papers from System & Web Security
SPONSORED ADVERTISEMENTS