0% found this document useful (0 votes)
49 views2 pages

Information Security June 2010

This document contains the question paper for an examination on Information Security. It includes 15 questions across two sections. Section A contains 10 short questions worth 2 marks each. Section B contains 5 long-form questions worth 16 marks each, asking students to explain security concepts in detail like access control matrices, integrity and confidentiality policies, key exchange techniques, information flow and confinement problems, auditing and intrusion detection, and issues regarding user and program security. The examination code is provided at the top along with information on the course, time duration, and maximum marks.
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
49 views2 pages

Information Security June 2010

This document contains the question paper for an examination on Information Security. It includes 15 questions across two sections. Section A contains 10 short questions worth 2 marks each. Section B contains 5 long-form questions worth 16 marks each, asking students to explain security concepts in detail like access control matrices, integrity and confidentiality policies, key exchange techniques, information flow and confinement problems, auditing and intrusion detection, and issues regarding user and program security. The examination code is provided at the top along with information on the course, time duration, and maximum marks.
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

Question Paper Code:

J7661

M.E./M.Tech. DEGREE EXAMINATION, JUNE 2010 Second Semester

Computer Science and Engineering

CS9224 INFORMATION SECURITY

(Common to M.E Software Engineering and M.Tech. Information Technology) (Regulation 2009) Time : Three hours Answer ALL Questions Maximum : 100 Marks

1. 2. 3. 4. 5. 6. 7. 8. 9.

What is meant by Computer Security? Define Hybrid policies.

Write a short note on key management. Define Digital Signatures.

What do you mean by Representing Identity? Write short notes on Information flow. Write about the malicious logic. What is meant by Intrusion Detection? Define Network security. What is meant by program security?

30
10.

30

PART A (10 2 = 20 Marks)

30 3

Reg. No. :

PART B (5 16 = 80 Marks) 11. (a) Explain in detail the Access control matrix and Security policies. Or (b) 12. (a)

Discuss in detail the Integrity policies and confidentiality policies. Describe the key exchange and key generation techniques. Or

(b)

Briefly explain : (i) (ii) Cryptographic key infrastructure. Cipher techniques.

13.

(a)

Discuss in detail : (i) (ii) Design principles of information security systems. Access control mechanisms. (8) (8)

(b)

Explain the information flow and confinement problem with suitable examples. Describe different approaches for Vulnerability analysis in current scenario. Or

14.

(a)

(b) 15. (a)

Discuss in detail the Auditing and Intrusion Detection. Describe the system security issues and available solutions. Or

(b)

Discuss in detail the user security and program security issues and available solutions.

30

30
2

3
Or

30 3
(6) (10)

J7661

You might also like