Download as pdf or txt
Download as pdf or txt
You are on page 1of 1

Set-1

1.Which of the authentication method, according to you, is most secure and efficient. Support
your answer with appropriate reason and example.
2. What are Bell-LaPadula Model? Why it is required. Discuss any real-world scenario in order to
safeguard Confidentiality
3- What is the database protocol that should be followed to create a biometric database?

Set-2

4- Suppose you are security admin of ICLinfotech company. You want to enhance the security of
the organization by deploying Biometric authentication, but you are facing certain challenges.
Discuss what challenges you faced and how to solve it.
5- What are Trusted Computing Base (TCB)? Why it is required. Discuss any real-world scenario in
order to safeguard privacy and integrity.
6- What are Biba model? Why it is required. Discuss any real-world scenario in order to safeguard
Integrity.

You might also like