Information Security Nov Dec 2010
Information Security Nov Dec 2010
(Common to M.E. Software Engineering and M.Tech. Information Technology) (Regulation 2009) Time : Three hours
Give the levels of security needed for a medium sized Public organization. List the types of key(s) used in a public key cryptography system. State the need for key exchange. Define the term Access Control.
Give the names of places where group identity is needed rather than individual identity. Define the term e-Audit. What are the types of Intrusions? Mention the need for security to server systems. Classify the computer users based on the types of security requirements.
7. 8. 9.
30
10.
30
30 3
Maximum : 100 Marks
PART B (5 16 = 80 Marks) 11. (a) Describe the need for Security Analysis and explain the various aspects of it. Or (b)
Discuss the levels of security needed and explain how security policy is incorporated into large organizations.
12.
(a)
Explain the terms Text Digest and Digital Signature and describe the use of these terms with their requirements. Or
(b)
Discuss the need for third party key generation and explain how such keys are distributed. Describe the implementation of Access Control Mechanisms in detail.
13.
(a)
(b)
Explain the design of information flow amongst the employees of various levels in a large organization, in a secured way. Discuss the use of system log in auditing and explain how this log can be preserved in times of attack. Or
14.
(a)
(b)
Describe the types of user behavior and explain how this helps in intrusion detections. Discuss the security needed for an email system that charges its customers. Or
15.
(a)
(b)
Discuss how spoofing and impersonation are overcome and explain how they can be minimized.
3 30
30
2
Or
30 3
97733