II Year, B Tech - Computer Science & Engineering: Principles of Information Security
This document outlines the examination structure for the III Semester of the B Tech in Computer Science & Engineering, focusing on Principles of Information Security. It includes various questions covering topics such as computer networks, cryptography, message integrity, firewalls, and password management. Each question is designed to assess students' understanding of key concepts and their applications in network security.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0 ratings0% found this document useful (0 votes)
8 views2 pages
II Year, B Tech - Computer Science & Engineering: Principles of Information Security
This document outlines the examination structure for the III Semester of the B Tech in Computer Science & Engineering, focusing on Principles of Information Security. It includes various questions covering topics such as computer networks, cryptography, message integrity, firewalls, and password management. Each question is designed to assess students' understanding of key concepts and their applications in network security.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2
Sub Code: CST-001 /CSET001 ROLL NO……………..……………..
III SEMESTER EXAMINATION, 2023 – 24
II year, B Tech – Computer Science & Engineering nd
Principles of Information Security
Duration: 3:00 hrs Max Marks: 100
Note: - Attempt all questions. All Questions carry equal marks. In case of any ambiguity or missing data, the same may be assumed and state the assumption made in the answer.
Q 1. Answer any four parts of the following. 5x4=20
a) Define computer networks and explain their significance in modern computing. Provide examples of different types of computer networks. b) Compare and contrast the OSI and TCP/IP reference models. Highlight the key layers in each model and explain their functions. c)Enumerate and describe common security attacks on computer networks. Discuss how these attacks can compromise the confidentiality, integrity, and availability of data. d)Define security services in the context of computer networks. Provide examples of security services and explain how they contribute to network protection. e) Investigate and discuss emerging trends in network security. Highlight how advancements in technology are impacting the landscape of network security, and what challenges and opportunities they bring. f) Outline the key considerations in designing a secure computer network. Discuss the role of network architecture in achieving a balance between performance and security. Q 2. Answer any four parts of the following. 5x4=20 a) Explain the concept of integer arithmetic and its relevance in cryptography. Provide examples to illustrate how integer arithmetic is used in cryptographic operations. b) Define modular arithmetic and discuss its significance in cryptography. Illustrate the process of encryption and decryption using modular arithmetic with an example. c) Compare and contrast traditional symmetric key ciphers. Discuss the strengths and weaknesses of substitution ciphers and transposition ciphers. d) Explain the RSA cryptosystem, including the key generation process, encryption, and decryption. Discuss the security features of RSA and its applications in secure communication. e) Provide an overview of the Elliptic Curve Cryptosystem (ECC). Explain how elliptic curves are utilized in cryptography and discuss the advantages of ECC over traditional asymmetric algorithms. f) Provide an introduction to asymmetric cryptography. Explain the fundamental differences between symmetric and asymmetric cryptography, highlighting scenarios where asymmetric cryptography is preferred. Q 3. Answer any two parts of the following. 10x2= 20 a) Define Message Authentication Code (MAC) and explain its role in ensuring message integrity. Describe the process of generating and verifying a MAC. Discuss scenarios in which MACs are commonly used for secure communication. b) Provide an in-depth explanation of SHA-512 (Secure Hash Algorithm 512-bit). Discuss the key features of SHA-512, including its hash function properties and the use of padding. Explain how SHA-512 contributes to message integrity in cryptographic applications. c) Introduce the concept of digital signatures and their importance in message authentication. Compare digital signatures with Message Authentication Codes (MACs). Discuss the properties of a secure digital signature scheme. Q 4. Answer any two parts of the following. 10x2= 20 a) Explore the principles of firewalls in network security. Discuss types (e.g., packet-filtering, stateful inspection) and their roles in preventing unauthorized access. Explain the importance of firewall placement. b) Compare and contrast Pretty Good Privacy (PGP) and Secure/Multipurpose Internet Mail Extensions (S/MIME) in terms of providing security at the application layer. Discuss the key features, strengths, and weaknesses of each cryptographic protocol. c) Explain the principles of Intrusion Detection Systems (IDS). Discuss the different types of IDS (e.g., host-based and network-based) and their respective roles in identifying and responding to security incidents. Provide examples of situations where IDS would be particularly effective. Q 5. Answer any two parts of the following. 10x2= 20 a) Explore the importance of effective password management. Discuss best practices for creating and managing secure passwords, addressing challenges, and considering multi-factor authentication. b) Provide an overview of viruses and related threats. Discuss common types, impact, and countermeasures, including antivirus solutions. Evaluate limitations and propose additional mitigation strategies. c) Explain the key steps and considerations in implementing trusted systems. Discuss benefits and potential drawbacks.