Answer the following 1. What is vulnerability? 2. What is Integrity? 3. List Fundamental Security properties and for each give an example. 4. Name any three non-malicious programming errors. 5. Distinguishes between a hacker and cracker. 6. List any three Virus Effect and How It Is Caused. 7. What is characteristic of a good security policy?
[7 marks]Answer the following 1. Name different Message integrity threats. 2. List three and explain one website vulnerability. 3. List out the requirement for Database security. 4. What is Eavesdropping and Wiretapping? 5. List out the Seven Issues in Security Plan. 6. List Seven Steps to Protect Against Privacy Loss. 7. What is Trademark?
[7 marks]Describe Interception, Interruption and modification System Security threats.
[7 marks]Explain the Unexpected Behavior.
[7 marks]What is computer security? Explain any three important aspects of any Computer-related System
[7 marks]What is Security Policy? Explain Clark Wilson Commercial Security Policy.
[7 marks]What is a Trusted System? Explain key characteristics.
[7 marks]What is an incomplete mediation? Explain possible security implication of the same.
[7 marks]Explain BellLa Padula Confidentiality Model with Simple Security Property.
[7 marks]Does Military Security Policy exist in real? If so explain different sensitive levels.
[7 marks]List of requirements for Database Security and Explain any four requirements.
[7 marks]Explain SQL injection attack with a code example.
[7 marks]Explain characteristics of a Good Security Policy.
[7 marks]List and explain message integrity threats.
[7 marks]Describe three form of protection and compare in several significant ways.
[7 marks]List Computer related privacy problems and explain any one.
[7 marks]Can reverse engineering uncover the patented software? How?
[7 marks]