You are on page 1of 1

Reg. No.

:
Name :

MID EXAM – Nov 2022


Programme : B.Tech – Cyber Security and Digital Forensics Semester : Interim 2022-2023
Course : Secure Software Engineering Code : CSD3002
Faculty : Dr. AZATH Slot/Class No. : A11+A12+A13+A14+A15/
BL2022234000564
Time : 1½ hours Max. Marks : 50

Answer all the Questions

Q. No. Question Description Marks

Justify the reasons with appropriate parameters exist behind the comparison for given table 3-5.
1

10

2 Use a tabulation to relate the attack pattern components with your own example.
10

3 Demonstrate a security assurance case example in order to assert and specify the desired security
10
properties with neat schematic diagram.
4 Apply your own creative inputs and outputs for the respective techniques and participants
10
involved in the nine steps of the SQUARE process model.
5 Demonstrate a source code in C language with sample I/O, for insecure coding which can be
exploited by attackers such as ‘Buffer overflow Attacks’. 10



Page 1 of 1

You might also like