Sie sind auf Seite 1von 1

.. ····,.'>.r·. : .• _.

'_."---"~':.-._' ~.

I\COO/5144-06 .
[ REVISED caJRSE ]
YM-6454
"_; I
.~•') t

( 3 [iours [ Total Marks : 100 . -.


I
f
\ ,
I
N.B. (1) i)uesti::m '::::. i.s e:::xrpllsory.
.1.

t
(2) Attempt d>lY four :::;uestions out of remaImng six questions.
I (3) figures t:8 t:;e ri;-ht. indicate full marks.
j
1- (a) I\'nac is aCCP33 2;:X-;::':-::~? Howdifferent is it from aVdUabilitl"~? 5
(b) t IS
- ~_h~
rVV!L c i -n" =" ~'" ,- 01..
c> .j.'~.1l_.L':'_~~'1~ , .= •.Lhe t-~lme
.. sta:llplng; protocol .
, .•. 'i? .~- 5
\
(c) ~'lhats \'hat is the significant difference 50
between worm and 10
1
I virus ?
WOrln?

,i (d) 2xolaln how 2 fence c~~ister is used ror relocating a user's program.

(a) ':Jhat are th.? requi cements for database security? Briefly Examine each
\ . of the requirerr~nts.
j (b) Consider ~ pr::>gramto accept and tabulate votes in --an elector, 6Jbo might
I
'Hant to at teck the program? What types of harm might they want to cause?
~ha~ kinds c~ Vulnerabilities might they Exploit to cause harm ?
(a) Explain in cetail the steps in risk analysis. 10
(b) Explain how eve~ covert timing channel can be - transformed into an 10
Equi~alent C2vert storage channel.

(a) Discuss the 5esign of multilevel secure databases. 10


(0) Clisc\.2sSthe similar-ities and differences betw.een signature based IDS and 10
heuristic based IDS.• 'lhac are the limit.ations .:Yf IDS.

(a) Give an eXx~ple of use of sepa~ation for security in computing 10


environment?
(b) List the characteristics of a good fi~ewall implementation. What are the 10
limitations Jf firewalls.

(a) \'ihat is the Denial of -.Service (DOS) attack? What is the meaning of the 10
teem 'servic~' in DOS? What can possibly prevent DOSattacks ?
(b) Explain why e.synchronous I/O activity is a problem with many memory 10
protection s=hemes, including base/bounds e.ndpaging.
Sugge~t a soLGtion to the problem.
HowSSL- wxks
Write Kerberos
Ethical
a details
i3s'Jes ~ on ; SOCIety.
n)tes
In compute.r (q!JY two)
.. 20
(b)

*********

~.~~ ~;;
~-~~~-~~;:.!~~+-~:.~.~:::~.:~~
.
•• Il.- _ ••• ~ __

Das könnte Ihnen auch gefallen