Do as directed (any 7): 1. What is Information Security, Computer Security, Intranet Security & Internet Security? 2. Two types of attack are _________ and ______. 3. Nonce is _________. 4. Three classes of intruders are ______, ______ & ______. 5. Firewalls are classified into ________________. 6. X/MIME stands for _____________ 7. The number of key(s) used in Asymmetric Cryptography is/are ____. 8. Phil Zimmermann is the founder of ____________. 9. KDC is responsible for ____________. 10. What is clear signed data in S/MIME? 11. IP address spoofing means _____________. 12. Use of subject field in X.509 certificate.
[7 marks]Differentiate between (any 2): 1. Active attack & Passive attack 2. Security service & Security mechanism 3. SSL and TLS
[7 marks]Discuss RC4 algorithm in detail.
[7 marks]Discuss RSA Public-Key Encryption with a suitable example.
[7 marks](i) What is Elliptic Curve Cryptography (ECC)? (ii) What is a Digital Signature? (iii) Explain benefits of IPSec.
[3 marks]Discuss Kerberos in detail. Write any 3 differences between version 4 and 5.
[7 marks]Discuss Diffie-Hellman key exchange algorithm in detail with suitable example.
[7 marks]Discuss SSL architecture. Also draw and explain the SSL Record Protocol.
[7 marks]Discuss in detail Public Key Infrastructure architecture (PKIX) with diagram.
[7 marks]Discuss IEEE 802.11i Services.
[7 marks]What is Pretty Good Privacy (PGP)? Discuss its services in detail.
[7 marks]What is ESP (Encapsulating Security Payload)? Discuss ESP packet format in detail with diagram.
[7 marks]Explain the X.509 certificate in detail with suitable diagram.
[7 marks]Discuss WAP infrastructure.
[7 marks]What do you mean by a Firewall? How it protects a machine/network? Discuss any one type of firewall and explain its configuration.
[7 marks]Short notes on: 1. Statistical Anomaly Detection 2. Honeypots 3. CIA Triad 4. Design & parameters of HMAC 5. Block & Stream Ciphers 6. Anti-replay window in IPSec 7. Heuristic rules for intrusion detection.
[7 marks]Discuss IPsec Association Database and IPsec Policy database in detail with suitable diagram.
[7 marks]