Wednesday 15 May 2013

CS9224 INFORMATION SECURITY IMPORTANT QUESTIONS ME CSE SEMESTER II

 CS9224 INFORMATION SECURITY
PART-A

Define threats and three security services.
Differentiate snooping and spoofing.
Define security policy and mechanism.
List out the goals of security and short hint on each goal.
Draw the security life cycle with example.
Short note on copy right and own right.
List out the goals of integrity policies.
What is Informal Description of Chinese Wall Model?
Differentiate random number and pseudorandom numbers.
Define interchange key and session key.
Short note on cryptographic checksum function.
What is RSA and HMAC?
What is digital signature and uses?
What is a cipher technique and what are the problems in it?
Differentiate LFSR and NLFSR.
Draw the Message handling system and short note it.
List out the design goals of PEM.
Write the table for RSA, Classical Ciphers, and Checksum Combinations
Define authentication
List out the authentication system five components.
Write about the proactive password checker
What is Pass Algorithms
Draw the ISO/OSI model
Write about the SSL session
Define Malicious logic
Differentiate Trojan horse and propagating Trojan horse
What is computer worm and boot sector infector?
Define the logging and auditing.
Short note on intrusion principles.
Write about the Autonomous Agents: AAFID


PART - B

Write about the computer security basic components.
What are operational issues and explain each steps.
Explain about the access control matrix model.
Brief the confidentiality policies
Brief the Integrity policies with Clark-Wilson Integrity Model.
Write about the Clinical Information Systems Security Policy in Hybrid Policies.
Write the overview of Classical Cryptosystems.
Explain about the Key Management and Cryptographic Key Infrastructures.
Brief the Storing and Revoking Keys
Write about the public key signatures.
Overview of Stream Ciphers.
Explain about the Networks and Cryptography and example protocols.
Explain about the Stream and Block Ciphers
Brief the Secure Electronic Mail: PEM and draw the neat diagram
Write about Hardware-Supported Challenge-Response Procedures and Challenge-Response and Dictionary Attacks
Explain about the Common characteristics of Biometrics
Write about the computer viruses and several types of computer viruses.
Explain about the vulnerability frameworks with neat examples.
Explain about the Gupta and Gligor's Theory of Penetration Analysis.
Explain the following
a)    Anatomy of an Auditing System.  (3)
b)    Intrusion detection architecture.   (3)

No comments:

Post a Comment