MU Information Technology (Semester 6)
System & Web Security
May 2015
Total marks: --
Total time: --
INSTRUCTIONS
(1) Assume appropriate data and state your reasons
(2) Marks are given to the right of every question
(3) Draw neat diagrams wherever necessary


1 (a) Explain with examples, Vulnerability, Threat and attacks.
8 M
1 (b) Discuss with examples the following:
i) ARP spoofing
ii) TCP syn flood attack
iii) Port scanning
iv) IP spoofing
12 M

2 (a) Discuss with an example how knapsack is used in cryptography.
10 M
2 (b) Explain the roles of the different servers in Kerberos protocol. How does the user get authenticated to the different servers?
10 M

3 (a) Define access control list and capability list and compare them. Explain the Bell La Padula access control model.
10 M
3 (b) Differentiate between the tunnel mode and transport mode of IPSec. Explain how integrity is achieved.
10 M

4 (a) List the different protocols of SSL. Explain in detail Handshake protocol. How does server get authenticated to client?
10 M
4 (b) List and explain the different TCP/IP vulnerabilities.
10 M

5 (a) What are the different approaches to Software Reverse Engineering?
10 M
5 (b) With the help of example explain cross-site scripting and SQL injection attacks.
10 M

Write a short notes on:
6 (a) Linux File Security.
5 M
6 (b) Phishing and Pharming techniques
5 M
6 (c) Federated Identity Management.
5 M
6 (d) Biometric authentication schemes.
5 M



More question papers from System & Web Security
SPONSORED ADVERTISEMENTS