Question Paper: Cryptography & System Security : Question Paper May 2014 - Computer Engineering (Semester 7) | Mumbai University (MU)

Cryptography & System Security - May 2014

Computer Engineering (Semester 7)

(1) Question 1 is compulsory.
(2) Attempt any three from the remaining questions.
(3) Assume data if required.
(4) Figures to the right indicate full marks.
1 (a) What are the different security goals ?(5 marks) 1 (b) What is keyless transposition cipher?Give any example of Rail-fence cipher.(5 marks) 1 (c) What are the different parameters to measure the accuracy of biometric techniques? Also write the application of biometrics.(5 marks) 1 (d) What are the various types of IP Spoofing?(5 marks) 2 (a) Explain the TCP/IP vulnerabilities at each layer.(10 marks) 2 (b) What are the typical characteristics of enterprise wide networks ? Explain its different router vulnerabilities and firewall vulnerabilities.(10 marks) 3 (a) Explain A5/1 algorithm in detail.(10 marks) 3 (b) What are passive and active attacks? Categorize these attacks and explain one example of each.(10 marks) 4 (a) What is SHA-1?Explain different steps of working in SHA-1.(10 marks) 4 (b) What are the different methods of malware detection? Explain with their advantages and disadvantages.(10 marks) 5 (a) What is Bell-LaPadula? How does Bell-LaPadula model works?(10 marks) 5 (b) Explain different method to commit a session hijack and methods to prevent session hijacking.(10 marks) 6 (a) Why Secure Socket Layer is needed? What are the different features SSL provide? Explain how SSL works?(10 marks) 6 (b) How does Kerberos work? Explain with example.(10 marks)

Write short notes on the following

7 (a) Multiple DES(10 marks) 7 (b) Software Reverse Engineering (SRE) and prevention of SRE(10 marks)

Please log in to add an answer.