0% found this document useful (0 votes)
16 views

Assignment 2 CSS 2021-22

This document contains an assignment on computer system security from Babu Banarasi Das Northern India Institute of Technology. It includes 5 questions related to system security concepts like confinement principle, system call interposition, rootkits, software fault isolation, and intrusion detection systems. Students are instructed to write their answers on an assignment copy and submit it before the last date of May 12th. The document also provides references for textbooks and online resources on computer security.
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
16 views

Assignment 2 CSS 2021-22

This document contains an assignment on computer system security from Babu Banarasi Das Northern India Institute of Technology. It includes 5 questions related to system security concepts like confinement principle, system call interposition, rootkits, software fault isolation, and intrusion detection systems. Students are instructed to write their answers on an assignment copy and submit it before the last date of May 12th. The document also provides references for textbooks and online resources on computer security.
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 1

BABU BANARASI DAS

NORTHERN INDIA INSTITUTE OF TECHNOLOGY


Affiliated to Dr. A.P.J. Abdul Kalam Technical University (AKTU Code : 056)
Approved by All India Council for Technical Education (AICTE)
AKTU Code : 056 Sector II, Dr Akhilesh Das Nagar, Faizabad Road, Lucknow (UP) – India, 226028
Website : www.bbdniit.ac.in
Department of Information Technology
IT 2nd Year / Fourth Semester / 2022-23
Name of Subject: Computer System AKTU Subject Code: KNC401
Security
NBA Subject Code (To C228 Unit Covered: Unit II
be filled by Faculty):
Date of Issue: 06.05.22 Last Date of Submission: 12.05.22

Max Marks: 25 Name of Faculty: Mr. REETESH


GUPTA

Q# Question Description CO BTL M

1 Brief explain the confinement principle? 2 K2 5

2 What do you mean by system call interposition? 2 K1 5

3 Explain the term rootkit, how attacker used as toolkit their program. 2 K2 5

4 Write short notes on software fault isolation. 2 K1 5


5 Explain the term IDS (Intrusion detection system), also explain the types of IDS. 2 K2 5

CO: Course Outcome BTL: Bloom's Taxonomy Level M: Marks


NOTE: Write assignment on Assignment copy and submit it in the department before last date.
RERERENCES:
TEXT BOOKS
Edition &Year of
Ref. [ID] Authors Book Title Publisher/Press
Publication

Michael T. Goodrich and “Introduction to Computer Addison


[T1] Security” 2019
Roberto Tamassia Wesley
“Network Security
William Stallings Essentials: Applications and
[T2]
Standards” Prentice Hall 2017
REFERENCE BOOKS
Edition &Year of
Ref. [ID] Authors BookP Title Publisher/Press Publication

“Alfred J. “Handbook of Applied


[R1] Cryptography” CRC Press 2017
Menezes”
ONLINE/DIGITALREFERENCES
Ref. [ID] Source Name Source
Hyperlink
[D1] NPTEL https://ict.iitk.ac.in/product/computer-system-security/

BBDNIIT 2021-22(Even Semester) Page1

You might also like