You are on page 1of 2

8. What is Cyber Crime ? Discuss categories of Roll No. .......................

Exam Code : S-20


Cyber Crime. What are punishment liable for
spreading viruses as per IT Act, 2000 ? Subject Code—3507
9. Explain the following : B. Tech. (CSE/IT) EXAMINATION
(a) Web Threats for Organizations
(Main/Reappear Batch 2016-2017)
(b) Section 79 of Indian IT Act, 2000.
(Eighth Semester)
INFORMATION AND CYBER-SECURITY
(CSE)
CSE-404-L

Time : 2½ Hours Maximum Marks : 70

Note : Attempt Four questions in all. All questions


carry equal marks.

1. Briefly describe the following questions :


(a) Define Malicious Program.
(b) What is meant by Intrusion detection
system ?
(c) Define Trojan Horse.

J-3507 4 100 (3-24-19-0920) J-3507 P.T.O.


(d) Differentiate between Authentication and 4. Write short notes on the following :
Authorization. (a) Security Problems in Coding
(b) Windows Access Control Algorithm
(e) What is meant by firewall ?
(c) Form Authentication.
(f) Write a short note on hacking.
(g) What is Intellectual Property Law ? 5. (a) How OS security helps in protection of
system resources ? Briefly discuss various
2. (a) Define DES. In the Diffie-Hellman models of OS security.
protocol, what happens if x and y have (b) Differentiate between Discretionary and
Role based access control. Also, briefly
the same value ? That is, Alice and Bob
discuss Mandatory access control for a
have accidently chosen same number. Are
typical secure operating system.
the value of R1 and R2 are same ?
6. (a) What do you mean by Intellectual
(b) How Digital signature is used for message
Property in the cyber space ? Explain
authentication ? Discuss the components various types of security policies.
of digital signature. (b) What is Steganography ? Briefly explain
any three techniques used for
3. (a) Write the steps of RSA Key generation.
steganography.
Differentiate between Public Key
encryption and Private Key encryption. 7. (a) How can we say that intrusion detection
system is the backbone of information
(b) Draw a block level diagram to depict the
system ? Justify along with its categories.
structure of AES with strength and (b) Explain, how can you detect and prevent
weakness of AES. SQL Injection vulnerabilities ?

J-3507 2 (3-24-20-0920) J-3507 3 P.T.O.

You might also like