Beruflich Dokumente
Kultur Dokumente
'_."---"~':.-._' ~.
I\COO/5144-06 .
[ REVISED caJRSE ]
YM-6454
"_; I
.~•') t
t
(2) Attempt d>lY four :::;uestions out of remaImng six questions.
I (3) figures t:8 t:;e ri;-ht. indicate full marks.
j
1- (a) I\'nac is aCCP33 2;:X-;::':-::~? Howdifferent is it from aVdUabilitl"~? 5
(b) t IS
- ~_h~
rVV!L c i -n" =" ~'" ,- 01..
c> .j.'~.1l_.L':'_~~'1~ , .= •.Lhe t-~lme
.. sta:llplng; protocol .
, .•. 'i? .~- 5
\
(c) ~'lhats \'hat is the significant difference 50
between worm and 10
1
I virus ?
WOrln?
,i (d) 2xolaln how 2 fence c~~ister is used ror relocating a user's program.
(a) ':Jhat are th.? requi cements for database security? Briefly Examine each
\ . of the requirerr~nts.
j (b) Consider ~ pr::>gramto accept and tabulate votes in --an elector, 6Jbo might
I
'Hant to at teck the program? What types of harm might they want to cause?
~ha~ kinds c~ Vulnerabilities might they Exploit to cause harm ?
(a) Explain in cetail the steps in risk analysis. 10
(b) Explain how eve~ covert timing channel can be - transformed into an 10
Equi~alent C2vert storage channel.
(a) \'ihat is the Denial of -.Service (DOS) attack? What is the meaning of the 10
teem 'servic~' in DOS? What can possibly prevent DOSattacks ?
(b) Explain why e.synchronous I/O activity is a problem with many memory 10
protection s=hemes, including base/bounds e.ndpaging.
Sugge~t a soLGtion to the problem.
HowSSL- wxks
Write Kerberos
Ethical
a details
i3s'Jes ~ on ; SOCIety.
n)tes
In compute.r (q!JY two)
.. 20
(b)
*********
~.~~ ~;;
~-~~~-~~;:.!~~+-~:.~.~:::~.:~~
.
•• Il.- _ ••• ~ __