
<p> Christ College of Engineering and Technology (Approved by AICTE and Affiliated to Pondicherry University) </p><p>Pitchaveeranpet, Moolakulam, Oulgaret, Puducherry – 605 010</p><p>DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING</p><p>LAST FIVE YEARS QUESTION PAPERS YEAR/SEM: IV/VIII ‘B’</p><p>INFORMATION SECURITY</p><p>11 MARKS</p><p>NOVEMBER 2011 (CSE/IT)</p><p>1. Discuss about symmetric cipher model.</p><p>Or</p><p>2. Discuss about DES in detail.</p><p>3. Discuss about Multiple Encryption and DES in detail.</p><p>Or</p><p>4. Discuss in detail about block chipper mode operations.</p><p>5. Discuss in detail about RSA algorithm.</p><p>Or</p><p>6. Discuss about distribution of public key.</p><p>7. Discuss about PGP scheme in detail.</p><p>Or</p><p>8. Discuss about Secure Electronic Transactions.</p><p>9. Explain about Viruses and other Malicious Content</p><p>Or</p><p>10. Give an account on the following: a) Password Management</p><p> b) LaPadula (BLP) Model.</p><p>APRIL / MAY 2012 (CSE/IT)</p><p>1. Explain the Data Encryption standard.</p><p>Or</p><p>2. Give an illustrate account of modular arithmetic.</p><p>3. Illustrate AES Key expansion and implementation aspects.</p><p>Or</p><p>4. Explain any two types of transformations.</p><p>5. Explain Diffie-Hellman key exchange algorithm.</p><p>Or</p><p>6. Describe the concept of digital signatures.</p><p>7. Give an account of pretty good privacy.</p><p>Or</p><p>8. Discuss about SSL architecture and SSL record protocol.</p><p>9. Explain the virus countermeasures.</p><p>Or</p><p>10. Discuss the trusted systems</p><p>APRIL / MAY 2014 (IT)</p><p>1. Explain about the Data Encryption Standard. Or</p><p>2. Write about the Uses of Encryption.</p><p>3. Discuss about the Viruses and other Malicious Code.</p><p>Or</p><p>4. Explain about the control against program Threats.</p><p>5. Briefly explain about the memory and protection.</p><p>Or</p><p>6. Write about the User Authentication.</p><p>7. Explain about the Database Security Requirements.</p><p>Or</p><p>8. Describe about the Intrusion Detection System.</p><p>9. Briefly explain about the Risk Analysis.</p><p>Or</p><p>10. Write about the Ethical Issues in Computer Security.</p><p>APRIL/MAY 2010 (CSE/ECE/IT)</p><p>1. Explain in detail on OSI security architecture.</p><p>Or</p><p>2. Compare the following terms with one another</p><p> a) Block Cipher and Stream Cipher.</p><p> b) Diffusion and Confusion.</p><p> c) Differential and linear cryptanalysis. 3. Explain the three distinguish classes of polynomial arithmetic.</p><p>Or</p><p>4. A) Discuss on criteria that were used in the final evaluation of Advanced Encryption Standard.</p><p>B) Briefly describe the key expansion algorithm.</p><p>5. Explain in detail on Rivest-Shamir-Adleman algorithm.</p><p>Or</p><p>6. A) Explain four different schemes for the distribution of public keys.</p><p>B) Briefly explain Diffie-Hellman Key exchanges.</p><p>7. Explain in detail on the role of internet protocol in Internetworking.</p><p>Or</p><p>8. a) Discuss in detail on web security considerations.</p><p> b) Briefly explain the participations of secure Electronic Transactions.</p><p>9. Discuss on Password Management.</p><p>Or</p><p>10. Write short note on following:</p><p> a) Virus countermeasures,</p><p> b) Firewalls.</p><p>APRIL -2011(CSE/IT)</p><p>1. Explain in details with necessary diagrams the model for network security.</p><p>Or 2. Draw the stages for key generation and encryption for S-DES Algorithm.</p><p>3. Draw the structure for AES Encryption and Decryption.</p><p>Or</p><p>4. Draw the architecture for Blowfish Encryption and Decryption and also draw the detailed sketch for Blowfish Single Round.</p><p>5. Explain with diagrams, the steps and applications of public Key Cryptography.</p><p>Or</p><p>6.A) Compare the SHA properties.</p><p>B) Draw the block diagram for MD5 Single step operation.</p><p>7. Explain LZ77 compression and Decompression Algorithm with diagram.</p><p>Or</p><p>8. Compare the Threats on Web Security.</p><p>9. Explain in detail the Intrusion Techniques.</p><p>Or</p><p>10. Explain the characterisitics of BELL 94 and SMIT 97.</p><p>NOVEMBER 2012 (IT)</p><p>1. List and briefly explain the categories of passive and active security attacks.</p><p>Or</p><p>2. Explain the security systems development life cycle. 3. Discuss the components of Risk Identification and Risk Assessment.</p><p>Or</p><p>4. Explain the categories of risk control.</p><p>5. Describe the architecture for distributed Intrusion detection.</p><p>Or</p><p>6. Explain the types of Viruses.</p><p>7. Discuss about the distribution of public keys.</p><p>Or</p><p>8. Explain the approaches to attack the RSA algorithm.</p><p>9. Explain the application of Fusion methods.</p><p>Or</p><p>10. Explain the FFT based Transformation.</p><p>APRIL/MAY 2014 (IT)</p><p>1. Briefly discuss the categories of security threats to information security.</p><p>Or</p><p>2. Explain about the ethical concepts in information security.</p><p>3. Discuss about the asset identification and valuation in risk management.</p><p>Or</p><p>4. Discuss the NIST SP 800-26 Security Self-Assessment Guide for IT systems.</p><p>5. What are the different approaches of Intrusion Detection Systems? Discuss.</p><p>Or</p><p>6. Explain the four common architectural implementation of firewalls.</p><p>7. a) Differentiate between conventional encryption and public key encryption. b) Discuss the Diffie-Hellman Key Exchange Algorithm.</p><p>Or</p><p>8. Discuss the variety of approaches for the digital signature function.</p><p>9. Explain the different types of biometrics.</p><p>Or</p><p>10. Describe the various biometric fusion methods.</p><p>APRIL - 2013 (IT)</p><p>1. Explain the various phases of SecSDLC.</p><p>Or</p><p>2. Discuss the major types of attacks used against controlled systems.</p><p>3. Briefly describe about Risk assessment.</p><p>Or</p><p>4. Discuss Issue Specific Security Policy (ISSP) in detail.</p><p>5. Explain the various categories of firewall based on processing mode.</p><p>Or</p><p>6. a)List the disadvantages of HIDS.</p><p> b)Write short notes on Signature-based IDSI.</p><p>7. Elucidate RSA algorithm with suitable example.</p><p>Or</p><p>8. Mention the two approaches to Digital signature and sketch the algorithm.</p><p>9. Explain the Facial Recognition technology.</p><p>Or</p><p>10. Draw the flow diagram of biometric system and explain its components. NOVEMBER-2013</p><p>1. List and briefly explain the categories of passive and active security attacks.</p><p>Or</p><p>2. Explain the security systems development life cycle.</p><p>3. Discuss about the asset identification and valuation in risk management.</p><p>Or</p><p>4. Discuss the NIST SP 800-26 Security Self-Assessment Guide for IT systems.</p><p>5. Discuss in detail about RSA algorithm.</p><p>Or</p><p>6. Discuss about distribution of public key.</p><p>7. Give an account of pretty good privacy.</p><p>Or</p><p>8. Discuss about SSL architecture and SSL record protocol.</p><p>9. Discuss on Password Management.</p><p>Or</p><p>10. Write short note on following:</p><p> a) Virus countermeasures,</p><p> b) Firewalls.</p><p>NOVEMBER-2010</p><p>1. Explain the Data Encryption standard. Or</p><p>2. Give an illustrate account of modular arithmetic.</p><p>3. Discuss about Multiple Encryption and DES in detail.</p><p>Or</p><p>4. Discuss in detail about block chipper mode operations.</p><p>5. Explain Diffie-Hellman key exchange algorithm.</p><p>Or</p><p>6. Describe the concept of digital signatures.</p><p>7. Explain about the Database Security Requirements.</p><p>Or</p><p>8. Describe about the Intrusion Detection System</p><p>9. Explain the application of Fusion methods.</p><p>Or</p><p>10. Explain the FFT based Transformation. </p>
Details
-
File Typepdf
-
Upload Time-
-
Content LanguagesEnglish
-
Upload UserAnonymous/Not logged-in
-
File Pages10 Page
-
File Size-