Cochin University of Science and Techology (CUST) 2006-8th Sem B.Tech Computer Science and Engineering (Supplementary) , tember , CS 801 Security In Computing - Question Paper
Sunday, 26 May 2013 12:10Web
Page 1 of 2
BTS(0- vni - (S) - 06 - 039 (B)
B. Tech Degree Vlll Semester (Supplementary)
Examination, September 2006
CS 801 SECURITY IN COMPUTING
(2002 Admistions)
Time: |
: 3 Hours |
Maximum Marks |
: 100 |
1. |
() |
Draw a block diagram representing model of conventional a)pto*yjteTL Explain all components. |
(12) |
|
(b> |
Briefly define the Caesar Cipher.
OR |
(S) |
n |
() |
What is one-time pad? Explain using an example. |
() |
|
(b) |
Explain the DES encryption algorithm. |
(12) |
iii. |
|
Explain different types of software threats OR |
(20) |
IV |
|
What are viruses? Explain various types of viruses. |
(20) |
V. |
() |
Explain memory and address protection schemes. |
(10) |
|
(b> |
What itt ousted operating systems? Explain OR |
(10) |
VI. |
() |
Explain different types of file protect km mechanisms. |
(10) |
|
(b) |
What is authentication? Explain user authentications schemes. |
(10) |
VII. |
() |
Describe security is multilevel databases. |
(12) |
|
(b) |
What is 2 - phase update technique? What problem does it solve? OR |
() |
vin. |
()
(b) |
Outline different design techniques for multilevel secure databases Explain:
<i) Sensitive data (ii) Reliability (iti) Inference (iv) Integrity. |
(12)
(*> |
tx. |
(*) |
What ts a firewall? List techniques used by firewalls to control access and enforce a security policy. |
(10) |
|
(b) |
What is an IDS system? Explain.
OR |
(10) |
X. |
() |
Describe various threats in networks. |
(10) |
|
(b) |
What is a gateway? Explain application - level and circuit - level gateways. |
(10) |
|
|
Add comment
Earning: Approval pending. |
|
|