Information Security June 2010
Information Security June 2010
J7661
(Common to M.E Software Engineering and M.Tech. Information Technology) (Regulation 2009) Time : Three hours Answer ALL Questions Maximum : 100 Marks
1. 2. 3. 4. 5. 6. 7. 8. 9.
What do you mean by Representing Identity? Write short notes on Information flow. Write about the malicious logic. What is meant by Intrusion Detection? Define Network security. What is meant by program security?
30
10.
30
30 3
Reg. No. :
PART B (5 16 = 80 Marks) 11. (a) Explain in detail the Access control matrix and Security policies. Or (b) 12. (a)
Discuss in detail the Integrity policies and confidentiality policies. Describe the key exchange and key generation techniques. Or
(b)
13.
(a)
Discuss in detail : (i) (ii) Design principles of information security systems. Access control mechanisms. (8) (8)
(b)
Explain the information flow and confinement problem with suitable examples. Describe different approaches for Vulnerability analysis in current scenario. Or
14.
(a)
Discuss in detail the Auditing and Intrusion Detection. Describe the system security issues and available solutions. Or
(b)
Discuss in detail the user security and program security issues and available solutions.
30
30
2
3
Or
30 3
(6) (10)
J7661