How To Exam?

a knowledge trading engine...


Biju Patnaik University of Technology 2008 M.C.A Compter security - Question Paper

Friday, 24 May 2013 06:00Web

Fifth Semester Examination- 2008
COMPTER SECURITY
Time:3 Hours
Max. Marks:70

ans ques. No. one which is compulsory and any 5 from the rest.
The figures in the right-hand margin indicate marks.

1. ans the subsequent questions:- [2*10=20]

(a) What is the principle of lowest privilage ?

(b) Name 1 advantage of using a white list( in stead of black list) for your spam filter.

(c) Suppose, I generate RSA Public Key and Private Key pair and I publish the public key. Is that all I need to send you a security encrypted message ?

(d) What is Cryptanalysis ?

(e) What is transpositions ?

(f) During message transmission from 'A' to 'B', if 'C' can learn the message, which security principle is violated.

(g) Which unit of a DBMS responsible for the structural integrity of a database ?

(h) Access control matrics can represent anything that is represented by access control lists, Justify.

(i) If a few 1 known an efficient algorithm for computing the GCD(Great Common Divisor) of 2 extremly large numbers, will this make it possible to break RSA ?

(j) Who problems digital cerificates ?

2. (a) Differentiate ranging from threat and vunerability. elaborate the various kinds of threats ? [5]

(b) explain the various method of defence against possible attack. [5]

3. (a) Briefly explain the various security requirements of database. [5]

(b) explain the various approaches to multi-level security for databases. [5]

4. (a) define 2 fundamentally various conceptual approaches that can be use for authentication. [5]

(b) What is distributed denial of service ? Why it is carried out and how it works ? [5]

5. (a) elaborate the various kinds of control against program threats ? [5]

(b) What is a Malacious code ? elaborate the various kinds of mamalacious codes ? Are all malacious codes harmful ? [5]

6. What is risk ? Why it is essential to analyse a risk ? Briefly explain the steps of risk analysis. [10]

7. Why it is difficult to detect and prosecute computer crime ? explain about the various laws for prosecution of such criminals. [10]

8. What is Firewall ? Briefly explain the various kinds of firewalls. What a firewall can do and what it can't do ? [10]


( 1 Vote )

Add comment


Security code
Refresh

Earning:   Approval pending.
You are here: PAPER Biju Patnaik University of Technology 2008 M.C.A Compter security - Question Paper