Biju Patnaik University of Technology 2008 M.C.A Computer security - Question Paper
Friday, 24 May 2013 05:55Web
Fifth Semester Examination- 2008
COMPUTER SECURITY
Time:3 Hours
Max. Marks:70
ans ques. No. one which is compulsory and any 5 from the rest.
The figures in the right-hand margin indicate marks.
1. ans the subsequent questions:- [2*10=20]
(a) What is the principle of lowest privilage ?
(b) Name 1 advantage of using a white list( in stead of black list) for your spam filter.
(c) Suppose, I generate RSA Public Key and Private Key pair and I publish the public key. Is that all I need to send you a security encrypted message ?
(d) What is Cryptanalysis ?
(e) What is transpositions ?
(f) During message transmission from 'A' to 'B', if 'C' can learn the message, which security principle is violated.
(g) Which unit of a DBMS responsible for the structural integrity of a database ?
(h) Access control matrics can represent anything that is represented by access control lists, Justify.
(i) If a few 1 known an efficient algorithm for computing the GCD(Great Common Divisor) of 2 extremly large numbers, will this make it possible to break RSA ?
(j) Who problems digital cerificates ?
2. (a) Differentiate ranging from threat and vunerability. elaborate the various kinds of threats ? [5]
(b) explain the various method of defence against possible attack. [5]
3. (a) Briefly explain the various security requirements of database. [5]
(b) explain the various approaches to multi-level security for databases. [5]
4. (a) define 2 fundamentally various conceptual approaches that can be use for authentication. [5]
(b) What is distributed denial of service ? Why it is carried out and how it works ? [5]
5. (a) elaborate the various kinds of control against program threats ? [5]
(b) What is a Malacious code ? elaborate the various kinds of mamalacious codes ? Are all malacious codes harmful ? [5]
6. What is risk ? Why it is essential to analyse a risk ? Briefly explain the steps of risk analysis. [10]
7. Why it is difficult to detect and prosecute computer crime ? explain about the various laws for prosecution of such criminals. [10]
8. What is Firewall ? Briefly explain the various kinds of firewalls. What a firewall can do and what it can't do ? [10]
Earning: Approval pending. |