Explain the different types of access control principles.[5]
IT Security Management, Risk Assessment and Security Auditing
1.
What is risk assessment? Describe the security auditing architecture.[5]
Legal and Ethical Issues
1.
Do cybercrime and computer crimes refers to same? Justify with relevant scenarios.[5]
Malicious Software
1.
Describe any two types of malicious software.[5]
2.
What do you mean by countermeasures for malwares? Discuss about audit trail analysis.[5]
Message Authentication
1.
Describe the role of hash functions in authenticating message? How SHA - 1 algorithm is used to produce hash value of a message? Explain.[10]
2.
What is the role of digital signature in message authentication? List any two natures of zombies.[5]
Symmetric and Asymmetric Encryption Algorithms
1.
Define Euler totient function with an example. Find the GCD of 12 and 32 using Extended Euclidean algorithm.[10]
2.
Write the algorithm for RSA key generation with encryption and decryption.[5]
User Authentication
1.
Distinguish between threats and attack. Discuss some computer security strategy. Assume a prime number 23 and 9 as its primitive root. Alice select a private key 5 and Bob select the private key 6. Now find the secret key value that Alice and Bob shared using Diffie - Hellman protocol.[10]
2.
Discuss about two factor authentication with an example.[5]
3.
List some issues for user authentication. What is trust framework?[5]