Attempt any Eight questions.
[8*5=40]
4.
Discuss about two factor authentication with an example. [5]
5.
Explain the different types of access control principles. [5]
6.
Describe any two types of malicious software. [5]
7.
What is risk assessment? Describe the security auditing architecture. [5]
8.
Do cybercrime and computer crimes refers to same? Justify with relevant scenarios. [5]
9.
What do you mean by countermeasures for malwares? Discuss about audit trail analysis. [5]
10.
List some issues for user authentication. What is trust framework? [5]
11.
What is the role of digital signature in message authentication? List any two natures of zombies. [5]
12.
Write the algorithm for RSA key generation with encryption and decryption. [5]