0% found this document useful (0 votes)
8 views2 pages

II Year, B Tech - Computer Science & Engineering: Principles of Information Security

This document outlines the examination structure for the III Semester of the B Tech in Computer Science & Engineering, focusing on Principles of Information Security. It includes various questions covering topics such as computer networks, cryptography, message integrity, firewalls, and password management. Each question is designed to assess students' understanding of key concepts and their applications in network security.

Uploaded by

azamali73372
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
8 views2 pages

II Year, B Tech - Computer Science & Engineering: Principles of Information Security

This document outlines the examination structure for the III Semester of the B Tech in Computer Science & Engineering, focusing on Principles of Information Security. It includes various questions covering topics such as computer networks, cryptography, message integrity, firewalls, and password management. Each question is designed to assess students' understanding of key concepts and their applications in network security.

Uploaded by

azamali73372
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

Sub Code: CST-001 /CSET001 ROLL NO……………..……………..

III SEMESTER EXAMINATION, 2023 – 24


II year, B Tech – Computer Science & Engineering
nd

Principles of Information Security

Duration: 3:00 hrs Max Marks: 100


Note: - Attempt all questions. All Questions carry equal marks. In case of any ambiguity or missing data,
the same may be assumed and state the assumption made in the answer.

Q 1. Answer any four parts of the following. 5x4=20


a) Define computer networks and explain their significance in modern computing.
Provide examples of different types of computer networks.
b) Compare and contrast the OSI and TCP/IP reference models. Highlight the key
layers in each model and explain their functions.
c)Enumerate and describe common security attacks on computer networks. Discuss
how these attacks can compromise the confidentiality, integrity, and availability of
data.
d)Define security services in the context of computer networks. Provide examples
of security services and explain how they contribute to network protection.
e) Investigate and discuss emerging trends in network security. Highlight how
advancements in technology are impacting the landscape of network security, and
what challenges and opportunities they bring.
f) Outline the key considerations in designing a secure computer network. Discuss
the role of network architecture in achieving a balance between performance and
security.
Q 2. Answer any four parts of the following. 5x4=20
a) Explain the concept of integer arithmetic and its relevance in cryptography.
Provide examples to illustrate how integer arithmetic is used in cryptographic
operations.
b) Define modular arithmetic and discuss its significance in cryptography. Illustrate
the process of encryption and decryption using modular arithmetic with an example.
c) Compare and contrast traditional symmetric key ciphers. Discuss the strengths
and weaknesses of substitution ciphers and transposition ciphers.
d) Explain the RSA cryptosystem, including the key generation process, encryption,
and decryption. Discuss the security features of RSA and its applications in secure
communication.
e) Provide an overview of the Elliptic Curve Cryptosystem (ECC). Explain how
elliptic curves are utilized in cryptography and discuss the advantages of ECC over
traditional asymmetric algorithms.
f) Provide an introduction to asymmetric cryptography. Explain the fundamental
differences between symmetric and asymmetric cryptography, highlighting
scenarios where asymmetric cryptography is preferred.
Q 3. Answer any two parts of the following. 10x2= 20
a) Define Message Authentication Code (MAC) and explain its role in ensuring
message integrity. Describe the process of generating and verifying a MAC.
Discuss scenarios in which MACs are commonly used for secure communication.
b) Provide an in-depth explanation of SHA-512 (Secure Hash Algorithm 512-bit).
Discuss the key features of SHA-512, including its hash function properties and the
use of padding. Explain how SHA-512 contributes to message integrity in
cryptographic applications.
c) Introduce the concept of digital signatures and their importance in message
authentication. Compare digital signatures with Message Authentication Codes
(MACs). Discuss the properties of a secure digital signature scheme.
Q 4. Answer any two parts of the following. 10x2= 20
a) Explore the principles of firewalls in network security. Discuss types (e.g.,
packet-filtering, stateful inspection) and their roles in preventing unauthorized
access. Explain the importance of firewall placement.
b) Compare and contrast Pretty Good Privacy (PGP) and Secure/Multipurpose
Internet Mail Extensions (S/MIME) in terms of providing security at the application
layer. Discuss the key features, strengths, and weaknesses of each cryptographic
protocol.
c) Explain the principles of Intrusion Detection Systems (IDS). Discuss the different
types of IDS (e.g., host-based and network-based) and their respective roles in
identifying and responding to security incidents. Provide examples of situations
where IDS would be particularly effective.
Q 5. Answer any two parts of the following. 10x2= 20
a) Explore the importance of effective password management. Discuss best
practices for creating and managing secure passwords, addressing challenges, and
considering multi-factor authentication.
b) Provide an overview of viruses and related threats. Discuss common types,
impact, and countermeasures, including antivirus solutions. Evaluate limitations
and propose additional mitigation strategies.
c) Explain the key steps and considerations in implementing trusted systems.
Discuss benefits and potential drawbacks.

**********

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy