- The Chinese Wall model is a model of security policy. Explain Chinese model step by step with example. Also compare and write difference between Bell-LaPadula and Chinese Wall Model (10 points)
- Explain clinical information systems step by step with example. Also compare and write difference between Bell-LaPadula and clinical information systems. (10 points)
- Explain DES by step by step with detail description of each step. (10 points)
- Explain transposition cipher and substitution cipher. Provide example for each cipher. Explain the difference between two ciphers (15 points)
- What are session key and interchange key (5 points)
- From classical cryptographic key exchange and authentication, Explain step by step for Denning/Sacco protocol and Otway-Rees protocol. What are the difference between two protocols (15 points)
- What is n stage linear feedback shift register? Explain the procedure step by step. (15 points)
- Explain self-healing property (5 points)
- Explain two types of dictionary attack with example (20 points)
- What is password aging? Explain with example (15 points)
- List and describe methods of using biometrics as authentication methods (15 points)
- Describe Encrypted key exchange protocol (15 points)
Sample Solution