How To Exam?

a knowledge trading engine...


University of Mumbai 2007 B.Tech Information Technology - Question Paper

Tuesday, 16 July 2013 11:50Web



'on. 3121-07.


[REVISED. COURStI] (3 Hours)


ND-1864

[Total Marks : 100


N. B. 1) Answer any 05 questions.

2) Figures to the right indicate full marks.

I. a) What are the different software and hardware cotmols used ;o deal with the risks in

I, computer security. What are the aspects that can enhance '.)k- effectiveness of these controls.    (10)

b) What are covert channels and how they are created? In whish cases, the closure of a covert channels can be bothersome?    (10)

, 2. a) Compare the different separation methods used as a basis for protection lu Operating Systems, citing theic uses and disadvantages.    (10)

b) Explain why there should be some particular protection schemes for files other than the mechanisms for protecting a general object. Explain some of the generally used file protection mechanisms.    (10)

?. a) What is an Intrusion Detection System? Compare the two approaches represented by pattern-matching and heuristic style of Intrusion detection.    (10)

b) Compare the two encryption strategies - Link and end-to-nd encryption - used as tools for network security, from all view points.    (10)

4.    a) What is a firewall? Compare the different types of firewalls. Cite a reason why an organization might want two or more firewalls on a single network.    (1?)

b) What are the different message integrity threats and message confidentiality sbi'cats In networks?    (08)

5.    a) What are the different factors iha? makes data sensitive? How can we maintain perfect confidentiality with precision.    (10) b) Explain the role of Kerberos for supporting amhentkH'.ion in distributed iysteuf.

(10)

6.    a) How can we distinguish a risk from other project eve mu:? Whai are the dirl'erem steps in risk analysis?    (10) b) To what extent is patency applicable to computer objects? V.hcU are t!i.j n,oraj or ethical issues in producing correct and usable software (1{<)

7.    Write short notes on : (any two)

a)    Secure E-mails

b)    Virtual Private Networks

Multilevel secure Databases    (2u).







Attachment:

( 0 Votes )

Add comment


Security code
Refresh

Earning:   Approval pending.
You are here: PAPER University of Mumbai 2007 B.Tech Information Technology - Question Paper