0% found this document useful (0 votes)
122 views2 pages

Information Security Nov Dec 2010

This document is a question paper for an examination on Information Security. It contains two parts: Part A contains 10 short answer questions worth 2 marks each on topics related to information security such as access control matrices, key types in public key cryptography, security levels needed in organizations, and types of computer users. Part B contains 5 long answer questions worth 16 marks each, with options to answer either part (a) or (b) for each question. The questions cover topics such as security analysis, access control mechanisms, information flow in organizations, system logging and auditing, intrusion detection, email security, and overcoming spoofing and impersonation.
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
122 views2 pages

Information Security Nov Dec 2010

This document is a question paper for an examination on Information Security. It contains two parts: Part A contains 10 short answer questions worth 2 marks each on topics related to information security such as access control matrices, key types in public key cryptography, security levels needed in organizations, and types of computer users. Part B contains 5 long answer questions worth 16 marks each, with options to answer either part (a) or (b) for each question. The questions cover topics such as security analysis, access control mechanisms, information flow in organizations, system logging and auditing, intrusion detection, email security, and overcoming spoofing and impersonation.
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

Reg. No.

Question Paper Code : 97733

M.E./M.Tech. DEGREE EXAMINATION, NOVEMBER/DECEMBER 2010 Second Semester

Computer Science and Engineering

CS 9224 INFORMATION SECURITY

(Common to M.E. Software Engineering and M.Tech. Information Technology) (Regulation 2009) Time : Three hours

PART A (10 2 = 20 Marks) 1. 2. 3. 4. 5. 6. State the Components of an Access Control Matrix.

Give the levels of security needed for a medium sized Public organization. List the types of key(s) used in a public key cryptography system. State the need for key exchange. Define the term Access Control.

Give the names of places where group identity is needed rather than individual identity. Define the term e-Audit. What are the types of Intrusions? Mention the need for security to server systems. Classify the computer users based on the types of security requirements.

7. 8. 9.

30

10.

30

Answer ALL questions

30 3
Maximum : 100 Marks

PART B (5 16 = 80 Marks) 11. (a) Describe the need for Security Analysis and explain the various aspects of it. Or (b)

Discuss the levels of security needed and explain how security policy is incorporated into large organizations.

12.

(a)

Explain the terms Text Digest and Digital Signature and describe the use of these terms with their requirements. Or

(b)

Discuss the need for third party key generation and explain how such keys are distributed. Describe the implementation of Access Control Mechanisms in detail.

13.

(a)

(b)

Explain the design of information flow amongst the employees of various levels in a large organization, in a secured way. Discuss the use of system log in auditing and explain how this log can be preserved in times of attack. Or

14.

(a)

(b)

Describe the types of user behavior and explain how this helps in intrusion detections. Discuss the security needed for an email system that charges its customers. Or

15.

(a)

(b)

Discuss how spoofing and impersonation are overcome and explain how they can be minimized.

3 30

30
2

Or

30 3
97733

You might also like