You are on page 1of 2

Year : 2014-2015

UNIT IV

Sem.: EVEN

SYSTEM IMPLEMENTATION
Subject Code:

NE 7202

Branch

ME-CSE

Subject Name:

NETWORK AND INFORMATION SECURITY

Year/Sem

I/ II

PART A
1. What is meant by Identity?
2. Define the principle of fail-safe defaults
3. What is principle of complete mediation?
4. Define the principle of Psychological Acceptability.
5. What is meant by Files and Objects?
6. What is meant by a Users, Groups, Roles and Frameworks?
7. How Naming and Certificates can de be achieved
8. What is Access control list?
9. What are the Capabilities of Access Control Lists?
10.What is lock and Key Technique?
11.What is Ring-Based Access Control?
12.What is meant by Propagated Access Control Lists?
13.What is meant by the term Identity on the Web?
14.How the Internet handles identity conflict?
15.Differentiate static and dynamic identifiers.
16.Define Confinement problem.
17.What is the use of sandboxes?
18.Define virtual machine
19.What is Capability list? Give an example
20.List the top ten OWASP Vulnerabilities
21.Define the information flow of an Assignment statement with example.
22.What is meant by Non lattice Information Flow Policies?
23.Define Compiler-Based Mechanisms and Execution-Based Mechanisms
24.What is meant by Isolation?
25.What is meant by Penetration Studies?
26.List the Classification of Vulnerability.
27.What is buffer overflow?
28.Define information flow of procedure calls
29.What is the use of covert channel?
30.Define the use of Fentons data Mark machine.
31.What is meant by incomplete mediation?
32.Define XSS.
33.What is meant by Anti Cross Site Scripting Libraries?
34.What is meant by Canonical Data Format? Give an example
35.Define Command Injection.
36.List some of the Application Controls
37.Define state and cookies.

PART B
1.
2.
3.
4.
5.
6.
7.
8.

Describe in detail about Design principles with examples.


Explain in detail about Identity of the web
Describe in detail about Access Control list with example
Explain in detail about Compiler base information Mechanism of information flow
Explain in detail about Representation of identity
Describe in detail Capabilities and Access control list with example
Explain in detail about confinement problem with example
Describe the following OWASP Vulnerabilities
i. Buffer overflows ii. Anti Cross site Scripting Libraries
iii.Command Injection
iv.Canonical data Format
9. Explain in detail about top ten OWASP Vulnerabilities
10.Explain in detail about Entropy based Analysis and Non lattice Information Flow Policies
11.Explain in detail about Gupta and Gligor's Theory of Penetration Analysis
12.Explain in detail about Buffer Overflows? With an example
13.Explain in detail about Anti Cross Site Scripting Libraries
14.Define Canonical Data Format. Explain Canonical Data Format with an example.
15.Explain in detail about Command Injection
16.What is meant by Inference? Explain different types of interfaces.
17.What is meant by Application Controls? List some of the Application Controls.

Prepared by:

Verified by:

M.Azhagiri.
Asst.Prof./ CSE

Dr. U.V. Arivazhagu


HOD/ CSE

You might also like