APJ ABDUL KALAM TECHNOLOGICAL UNIVERSITY Previous Years Question Paper & Answer

Course : B.Tech

Semester : SEMESTER 8

Year : 2020

Term : SEPTEMBER

Scheme : 2015 Full Time

Course Code : CS 472

Page:2





PDF Text (Beta):

13

14

15

16

17

18

19

a)

b)

a)
b)
a)
b)
a)
b)

a)
b)
a)
b)
a)
b)

04000CS472052002

Rima, shankar and david are three users of a computer system. They own the
files A, B and C respectively
Rima is able to write the files B and C
shankar can read and write files A & C
David can read file A and write file B.
The owner of each of these files can execute it.
Create the corresponding access control matrix
Demonstrate Chinese wall Security model with a neat diagram.
PART C

Answer any two full questions, each carries 9 marks.
What are topological worms? Illustarte email and P2P worms.
Explain Kermack-McKendrick Model of worm propagation.
Describe SQL injection vulnerability.
How can a shell code be used for exploiting stack overflow?
Discuss cross site scripting vulnerabilities.
Explain different worm characteristics.

PART D

Answer any two full questions, each carries 12 marks.
Explain Integrity protection and encryption in UMTS.
Illustrate the need for frame spoofing.
What are the various elements in XML signatures?
Describe Secure Electronic Transaction.
Explain Authentication and Key Agreement in 802.111.
Explain any one mechanism used in RFID for ensuring the security. Mention

any one attack that can occur in RFID system.

Page 2of 2

(4)

(5)

(5)
(4)
(5)
(4)
(4)
(5)

(6)
(6)
(6)
(6)
(6)
(6)

Similar Question Papers