N.B. (1) Question No. 1 is compulsory.
(2) Attempt any four out of remaining six questions.
(3) Assume suitable data if necessary & state the assumptions clearly.
Q. 1. (a) What the attacks in information transfer? Also write the security service used to prevent these attacks. 
(b) How ASE is better than DES? 
(c) Compare ACL with C-list. 
(d) Explain session hijacking. 
Q. 2. (a) Explain RSA cryptosystem in detail. 
(b) Explain network layer attacks. Discuss packet sniffing in detail. 
Q. 3. (a) What is symmetric key cryptography? Explain A5/l algorithm. 
(b) Discuss denial service of attack with its causes, preventive and reactive measures. 
Q. 4. (a) Discuss various categories of malware and ways to detect them. 
(b) Explain different types of firewalls. At which layer of internet protocol stack do each operate? 
Q.5. (a) Explain cryptography hash function and explain tiger hash in detail. 
(b) What are the security policies used by banks during the time of disaster. 
Q. 6. (a) Discuss different biometric means used for authentication. Compare them with password authentication. 
(b) Compare signature based and anormaly based IDS with suitable examples. 
Q. 7. Write notes on any three of the following. 
(a) Knapsack cryptosystem.
(b) Covert channel.
(c) Risk analysis.
(d) Web server vulnerabilitie