Semester : SEMESTER 8
Subject : Principles of Information Security
Year : 2019
Term : MAY
Branch : COMPUTER SCIENCE AND ENGINEERING
Scheme : 2015 Full Time
Course Code : CS 472
Page:2
13
14
15
16
17
18
19
a)
b)
a)
b)
a)
b)
a)
b)
a)
b)
a)
b)
a)
b)
H1066 Pages: 2
Interpret about the star property in Bell -LaPadula model.
Write Windows access control algorithm.
PART C
Answer any two full questions, each carries 9 marks.
How Buffer OverFlow (BOF) vulnerability makes software insecure. Explain
different ways in which BOF exploitations occur.
Explain XSS vulnerabilities.
Describe Kermack-McKendrick Model of worm propagation.
Explain any two categories of topological worms.
Explain how can you detect and prevent SQL Injection vulnerabilities.
Name any worm that exploited buffer overflow vulnerability. Explain its
characteristics.
PART 0
Answer any two full questions, each carries 12 marks.
Explain link level security provided by Bluetooth.
Describe entity authentication and key agreement in GSM Networks.
How security is implemented in online credit card payment systems?
What are the main concerns involved in online credit card payment systems?
Explain MAC generation and encryption in CCMP.
Explain any two technologies for web services.
Page 2of 2
(4)
(5)
(5)
(4)
(5)
(4)
(5)
(4)
(6)
(6)
(8)
(4)
(6)
(6)