Semester : SEMESTER 8
Subject : Principles of Information Security
Year : 2020
Term : SEPTEMBER
Branch : COMPUTER SCIENCE AND ENGINEERING
Scheme : 2015 Full Time
Course Code : CS 472
Page:2
13
14
15
16
17
18
19
a)
b)
a)
b)
a)
b)
a)
b)
a)
b)
a)
b)
a)
b)
04000CS472052002
Rima, shankar and david are three users of a computer system. They own the
files A, B and C respectively
Rima is able to write the files B and C
shankar can read and write files A & C
David can read file A and write file B.
The owner of each of these files can execute it.
Create the corresponding access control matrix
Demonstrate Chinese wall Security model with a neat diagram.
PART C
Answer any two full questions, each carries 9 marks.
What are topological worms? Illustarte email and P2P worms.
Explain Kermack-McKendrick Model of worm propagation.
Describe SQL injection vulnerability.
How can a shell code be used for exploiting stack overflow?
Discuss cross site scripting vulnerabilities.
Explain different worm characteristics.
PART D
Answer any two full questions, each carries 12 marks.
Explain Integrity protection and encryption in UMTS.
Illustrate the need for frame spoofing.
What are the various elements in XML signatures?
Describe Secure Electronic Transaction.
Explain Authentication and Key Agreement in 802.111.
Explain any one mechanism used in RFID for ensuring the security. Mention
any one attack that can occur in RFID system.
Page 2of 2
(4)
(5)
(5)
(4)
(5)
(4)
(4)
(5)
(6)
(6)
(6)
(6)
(6)
(6)