Explain the different types of access control principles. [5]
IT Security Management, Risk Assessment and Security Auditing
1.
What is risk assessment? Describe the security auditing architecture. [5]
Legal and Ethical Issues
1.
Do cybercrime and computer crimes refers to same? Justify with relevant scenarios. [5]
Malicious Software
1.
Describe any two types of malicious software. [5]
2.
What do you mean by countermeasures for malwares? Discuss about audit trail analysis. [5]
Message Authentication
1.
Describe the role of hash functions in authenticating message? How SHA - 1 algorithm is used to produce hash value of a message? Explain. [10]
2.
What is the role of digital signature in message authentication? List any two natures of zombies. [5]
Symmetric and Asymmetric Encryption Algorithms
1.
Define Euler totient function with an example. Find the GCD of 12 and 32 using Extended Euclidean algorithm. [10]
2.
Write the algorithm for RSA key generation with encryption and decryption. [5]
User Authentication
1.
Distinguish between threats and attack. Discuss some computer security strategy. Assume a prime number 23 and 9 as its primitive root. Alice select a private key 5 and Bob select the private key 6. Now find the secret key value that Alice and Bob shared using Diffie - Hellman protocol. [10]
2.
Discuss about two factor authentication with an example. [5]
3.
List some issues for user authentication. What is trust framework? [5]