Christ College of Engineering and Technology
Total Page:16
File Type:pdf, Size:1020Kb
Christ College of Engineering and Technology (Approved by AICTE and Affiliated to Pondicherry University)
Pitchaveeranpet, Moolakulam, Oulgaret, Puducherry – 605 010
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING
LAST FIVE YEARS QUESTION PAPERS YEAR/SEM: IV/VIII ‘B’
INFORMATION SECURITY
11 MARKS
NOVEMBER 2011 (CSE/IT)
1. Discuss about symmetric cipher model.
Or
2. Discuss about DES in detail.
3. Discuss about Multiple Encryption and DES in detail.
Or
4. Discuss in detail about block chipper mode operations.
5. Discuss in detail about RSA algorithm.
Or
6. Discuss about distribution of public key.
7. Discuss about PGP scheme in detail.
Or
8. Discuss about Secure Electronic Transactions.
9. Explain about Viruses and other Malicious Content
Or
10. Give an account on the following: a) Password Management
b) LaPadula (BLP) Model.
APRIL / MAY 2012 (CSE/IT)
1. Explain the Data Encryption standard.
Or
2. Give an illustrate account of modular arithmetic.
3. Illustrate AES Key expansion and implementation aspects.
Or
4. Explain any two types of transformations.
5. Explain Diffie-Hellman key exchange algorithm.
Or
6. Describe the concept of digital signatures.
7. Give an account of pretty good privacy.
Or
8. Discuss about SSL architecture and SSL record protocol.
9. Explain the virus countermeasures.
Or
10. Discuss the trusted systems
APRIL / MAY 2014 (IT)
1. Explain about the Data Encryption Standard. Or
2. Write about the Uses of Encryption.
3. Discuss about the Viruses and other Malicious Code.
Or
4. Explain about the control against program Threats.
5. Briefly explain about the memory and protection.
Or
6. Write about the User Authentication.
7. Explain about the Database Security Requirements.
Or
8. Describe about the Intrusion Detection System.
9. Briefly explain about the Risk Analysis.
Or
10. Write about the Ethical Issues in Computer Security.
APRIL/MAY 2010 (CSE/ECE/IT)
1. Explain in detail on OSI security architecture.
Or
2. Compare the following terms with one another
a) Block Cipher and Stream Cipher.
b) Diffusion and Confusion.
c) Differential and linear cryptanalysis. 3. Explain the three distinguish classes of polynomial arithmetic.
Or
4. A) Discuss on criteria that were used in the final evaluation of Advanced Encryption Standard.
B) Briefly describe the key expansion algorithm.
5. Explain in detail on Rivest-Shamir-Adleman algorithm.
Or
6. A) Explain four different schemes for the distribution of public keys.
B) Briefly explain Diffie-Hellman Key exchanges.
7. Explain in detail on the role of internet protocol in Internetworking.
Or
8. a) Discuss in detail on web security considerations.
b) Briefly explain the participations of secure Electronic Transactions.
9. Discuss on Password Management.
Or
10. Write short note on following:
a) Virus countermeasures,
b) Firewalls.
APRIL -2011(CSE/IT)
1. Explain in details with necessary diagrams the model for network security.
Or 2. Draw the stages for key generation and encryption for S-DES Algorithm.
3. Draw the structure for AES Encryption and Decryption.
Or
4. Draw the architecture for Blowfish Encryption and Decryption and also draw the detailed sketch for Blowfish Single Round.
5. Explain with diagrams, the steps and applications of public Key Cryptography.
Or
6.A) Compare the SHA properties.
B) Draw the block diagram for MD5 Single step operation.
7. Explain LZ77 compression and Decompression Algorithm with diagram.
Or
8. Compare the Threats on Web Security.
9. Explain in detail the Intrusion Techniques.
Or
10. Explain the characterisitics of BELL 94 and SMIT 97.
NOVEMBER 2012 (IT)
1. List and briefly explain the categories of passive and active security attacks.
Or
2. Explain the security systems development life cycle. 3. Discuss the components of Risk Identification and Risk Assessment.
Or
4. Explain the categories of risk control.
5. Describe the architecture for distributed Intrusion detection.
Or
6. Explain the types of Viruses.
7. Discuss about the distribution of public keys.
Or
8. Explain the approaches to attack the RSA algorithm.
9. Explain the application of Fusion methods.
Or
10. Explain the FFT based Transformation.
APRIL/MAY 2014 (IT)
1. Briefly discuss the categories of security threats to information security.
Or
2. Explain about the ethical concepts in information security.
3. Discuss about the asset identification and valuation in risk management.
Or
4. Discuss the NIST SP 800-26 Security Self-Assessment Guide for IT systems.
5. What are the different approaches of Intrusion Detection Systems? Discuss.
Or
6. Explain the four common architectural implementation of firewalls.
7. a) Differentiate between conventional encryption and public key encryption. b) Discuss the Diffie-Hellman Key Exchange Algorithm.
Or
8. Discuss the variety of approaches for the digital signature function.
9. Explain the different types of biometrics.
Or
10. Describe the various biometric fusion methods.
APRIL - 2013 (IT)
1. Explain the various phases of SecSDLC.
Or
2. Discuss the major types of attacks used against controlled systems.
3. Briefly describe about Risk assessment.
Or
4. Discuss Issue Specific Security Policy (ISSP) in detail.
5. Explain the various categories of firewall based on processing mode.
Or
6. a)List the disadvantages of HIDS.
b)Write short notes on Signature-based IDSI.
7. Elucidate RSA algorithm with suitable example.
Or
8. Mention the two approaches to Digital signature and sketch the algorithm.
9. Explain the Facial Recognition technology.
Or
10. Draw the flow diagram of biometric system and explain its components. NOVEMBER-2013
1. List and briefly explain the categories of passive and active security attacks.
Or
2. Explain the security systems development life cycle.
3. Discuss about the asset identification and valuation in risk management.
Or
4. Discuss the NIST SP 800-26 Security Self-Assessment Guide for IT systems.
5. Discuss in detail about RSA algorithm.
Or
6. Discuss about distribution of public key.
7. Give an account of pretty good privacy.
Or
8. Discuss about SSL architecture and SSL record protocol.
9. Discuss on Password Management.
Or
10. Write short note on following:
a) Virus countermeasures,
b) Firewalls.
NOVEMBER-2010
1. Explain the Data Encryption standard. Or
2. Give an illustrate account of modular arithmetic.
3. Discuss about Multiple Encryption and DES in detail.
Or
4. Discuss in detail about block chipper mode operations.
5. Explain Diffie-Hellman key exchange algorithm.
Or
6. Describe the concept of digital signatures.
7. Explain about the Database Security Requirements.
Or
8. Describe about the Intrusion Detection System
9. Explain the application of Fusion methods.
Or
10. Explain the FFT based Transformation.