SECURITY IN COMPUTING Sem 6
SECURITY IN COMPUTING Sem 6
UNIT 1
2022-23
a. Explain 3D’s (Defense, Detection, and Deterrence) aspects of security can be applied to any situation.
b. Explain various Application-layer attacks which include any exploit directed at the applications running on top of
the OSI protocol stack.
c. Write a short note on CIA Triad Model with reference to Security in Computing.
d. With the help of diagram, explain how Onion Defence Model is better than other Model for security.
e. What is meant by Zone of Trust? Explain the importance of Zone of Trust for communication through with
diagram.
f. What are the various countermeasures that, anyone can implement to minimize the risk of successful attack?
2019 MAY
c. What are the three recognized variants of malicious mobile code? Explain.
2019 ATKT
b Explain the statement that “Achieving 100 percent protection against all conceivable attacks is an impossible job”
d What are Application layer attacks? Explain following Application layer attacks: i) Buffer overflows ii) Password
cracking
UNIT 2
2022-23
a. Explain different types of Authentication in detail.
b. How Kerberos Authentication Process takes place? Explain each step with diagram.
d. What is meant by Extensible Authentication Protocol (EAP)? Explain its different types.
e. Explain role of PKI (Public Key Infrastructure) in Security in Computing and Structure and Function of PKI.
f. “Each layer of security is designed for a specific purpose and can be used to provide authorization rules”.Explain
this statement with reference to Database Security Layers and its types.
2019 MAY
d. What are the three primary categories of storage infrastructure in modern storage security? Discuss.
2019 ATKT
UNIT 3
2022-23
b. With reference to OSI model in which layer does Router operate? Explain the working of Routing Protocols.
2019 MAY
f. What are the countermeasures against the possible abuse of wireless LAN?
2019 ATKT
UNIT 4
2022-23
c How Mandatory Access Control Lists (MACL) differ from Discretionary access control lists (DACLs)? Explain.
e What is meant by Security Reference Monitor? Explain Windows Security Reference Monitor in detail.
2019 MAY
2019 ATKT
i) Governing Standard
ii) Purpose
iii) Function
v) Recommendations
d What is Private Branch Exchange (PBX)? How will you secure PBX?
f Explain the reference monitor concept and windows security reference monitor.
UNIT 5
2022-23
a. What is meant by Hypervisor machine? Explain Why it is necessary to protect this machine.
c. With the help of diagram explain the concept of Secure development lifecycle in Agile.
d. Explain phishing mechanism and 3D’s aspects of security with reference to it.
e. Give a reason in brief, why it is mandatory to update application patches? Explain various mechanisms for easily
updating applications.
f. Explain various concerns for web application security to be considered with reference to Security in Computing.
2019 MAY
a. Define virtual machine. How is hypervisor responsible for managing all guest OS installations on a VM server?
c. Explain the application security practices and decisions that appear in most secure development lifecycle.
d. Explain the reasons for remote administration security. What are advantages of web remote administration?
f. Explain the different factors for securing the assets with physical security devices.
2019 ATKT
a Explain how to protect the Guest OS, Virtual Storage and Virtual Networks in Virtual machines.
f Explain Locks and Entry Controls that should be considered while securing assets with physical security devices