This document contains an assignment on computer system security from Babu Banarasi Das Northern India Institute of Technology. It includes 5 questions related to system security concepts like confinement principle, system call interposition, rootkits, software fault isolation, and intrusion detection systems. Students are instructed to write their answers on an assignment copy and submit it before the last date of May 12th. The document also provides references for textbooks and online resources on computer security.
Download as DOCX, PDF, TXT or read online on Scribd
0 ratings0% found this document useful (0 votes)
16 views
Assignment 2 CSS 2021-22
This document contains an assignment on computer system security from Babu Banarasi Das Northern India Institute of Technology. It includes 5 questions related to system security concepts like confinement principle, system call interposition, rootkits, software fault isolation, and intrusion detection systems. Students are instructed to write their answers on an assignment copy and submit it before the last date of May 12th. The document also provides references for textbooks and online resources on computer security.
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 1
BABU BANARASI DAS
NORTHERN INDIA INSTITUTE OF TECHNOLOGY
Affiliated to Dr. A.P.J. Abdul Kalam Technical University (AKTU Code : 056) Approved by All India Council for Technical Education (AICTE) AKTU Code : 056 Sector II, Dr Akhilesh Das Nagar, Faizabad Road, Lucknow (UP) – India, 226028 Website : www.bbdniit.ac.in Department of Information Technology IT 2nd Year / Fourth Semester / 2022-23 Name of Subject: Computer System AKTU Subject Code: KNC401 Security NBA Subject Code (To C228 Unit Covered: Unit II be filled by Faculty): Date of Issue: 06.05.22 Last Date of Submission: 12.05.22
Max Marks: 25 Name of Faculty: Mr. REETESH
GUPTA
Q# Question Description CO BTL M
1 Brief explain the confinement principle? 2 K2 5
2 What do you mean by system call interposition? 2 K1 5
3 Explain the term rootkit, how attacker used as toolkit their program. 2 K2 5
4 Write short notes on software fault isolation. 2 K1 5
5 Explain the term IDS (Intrusion detection system), also explain the types of IDS. 2 K2 5
CO: Course Outcome BTL: Bloom's Taxonomy Level M: Marks
NOTE: Write assignment on Assignment copy and submit it in the department before last date. RERERENCES: TEXT BOOKS Edition &Year of Ref. [ID] Authors Book Title Publisher/Press Publication
Michael T. Goodrich and “Introduction to Computer Addison
[T1] Security” 2019 Roberto Tamassia Wesley “Network Security William Stallings Essentials: Applications and [T2] Standards” Prentice Hall 2017 REFERENCE BOOKS Edition &Year of Ref. [ID] Authors BookP Title Publisher/Press Publication