Semester : SEMESTER 8
Subject : Principles of Information Security
Year : 2019
Term : MAY
Branch : COMPUTER SCIENCE AND ENGINEERING
Scheme : 2015 Full Time
Course Code : CS 472
Page:1
Reg No.:_
Max. Marks: 100
1
2
3
4
5
6
8
9
10
11 a)
b)
0)
12 ಖ
0)
111066 Pages: 2
Name:
APJ ABDUL KALAM TECHNOLOGICAL UNIVERSITY
EIGHTH SEMESTER B.TECH DEGREE EXAMINATION, MAY 2019
Course Code: CS472
Course Name: PRINCIPLES OF INFORMATION SECURITY
PARTA
Answer all questions, each carries 4 marks.
What is brute force attack?
Discuss different types of attacks that can occur in an organization.
Describe discretionary policies for Biba model.
What is phishing? Give an example.
Differentiate between polymorphic and metamorphic worm.
How do you reduce the impact of XSS vulnerabilities?
Describe frame spoofing with a neat diagram.
Describe the security enhancements present in UMTS.
What is SOAP binding? Explain with the help of a HTTP message.
List the security threats in RFID based identification and tracking systems.
PART تا
Answer any two full questions, each carries 9 marks.
What is role based access control. Illustrate with suitable example the concept
of role inheritance.
Differentiate between Discretionary and Role based access control.
Briefly discuss Mandatory access control implemented in a typical secure
operating system.
Demonstrate Chinese wall security model with neat diagram.
Classify each of the following as a violation of confidentiality, integrity,
availability or some combination thereof. Also justify your answer.
i. John copies Mary's homework.
ii. Paul crashes Linda's system
iii. Carol changes the amount of Angelo's check from 100 to 1000
iv. Gina forges Roger's signature on a deed.
Page lof 2
Duration: 3 Hours
Marks
(4)
(4)
(4)
(4)
(4)
(4)
(4)
(4)
(4)
(4)
(4)
(2)
(3)
(5)
(4)