You are on page 1of 1

System & Web Security

Assignment 1

1 Consider an Online Voting System. People will cast their votes through
Internet. For this system identify Vulnerabilities, Threats & Attacks

2 Discuss with example how knapsack is used in cryptography?

3 Differentiate between

1. Authentication & Authorization


2. Mutual authentication & Multifactor Authentication.
3. Password Based Authentication & Biometric Authentication.
4 Distinguish between Kerberos Authentication Protocol & Certificate based
Authentication with their working principle.

5 An organization has employee hierarchy as CEO, Department Head, Project


Manager, Programmer, & a IT Officer (System+Netwok Administrator). All
have access to online information system having the data like Client
information, Bidding Details, Project details, Employee Appraisal Details,
Software Program code &data, System logs, Network device details etc.

Identify subjects and objects and apply Bell La Padulla Access Control Model
and design an ACM for the same.

6 Explain covert channel attack with examples.

You might also like