Preview

Information Security Question Paper

Satisfactory Essays
Open Document
Open Document
713 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Information Security Question Paper
Subject: Computer and Information Security Course: M.Sc. Tech ITM Duration: 90 Minutes Max. Marks: 50

1. Briefly explain - a. classification of crypt analysis attack. B. DES algorithm in detail (10+10 =20 Marks)

2. Explain RC4 algorithm. Encrypt the Message “HI” using RC4 algorithm, with four states and 2 bit key values are [2,5] ASCII value for H – 1001000I – 1001001 (5+5=10 Marks)

3. a. Find the plaintext from the ciphertext using cesar cipher – VSRQJHEREVTXDUHSDQWU b. Encipher “CHUCK NORRIS IS A TOUGH GUY” using a rail fence cipher. c. Decipher “JYENR BOALR ERIIE LOLAR ISNDE TLYRC ACIFB PE” using a simple 4 column transposition. (2.5+ 2.5+5 =10 Marks ) (P.T.O)

Subject: Computer and Information Security Course: M.Sc. Tech ITM Duration: 90 Minutes Max. Marks: 50

1. Briefly explain - a. classification of crypt analysis attack. B. DES algorithm in detail (10+10 =20 Marks)

2. Explain RC4 algorithm. Encrypt the Message “HI” using RC4 algorithm, with four states and 2 bit key values are [2,5] ASCII value for H – 1001000I – 1001001 (5+5=10 Marks)

3. a. Find the plaintext from the ciphertext using cesar cipher – VSRQJHEREVTXDUHSDQWU b. Encipher “CHUCK NORRIS IS A TOUGH GUY” using a rail fence cipher. c. Decipher “JYENR BOALR ERIIE LOLAR ISNDE TLYRC ACIFB PE” using a simple 4 column transposition. (2.5+ 2.5+5 =10 Marks ) (P.T.O)

Subject: Computer and Information Security Course: M.Sc. Tech ITM Duration: 90 Minutes Max. Marks: 50

1. Briefly explain - a. classification of crypt analysis attack. B. DES algorithm in detail (10+10 =20 Marks)

2. Explain RC4 algorithm. Encrypt the Message “HI” using RC4 algorithm, with four states and 2 bit key values are [2,5] ASCII value for H – 1001000I – 1001001

You May Also Find These Documents Helpful

  • Good Essays

    Match common encryption algorithms and methods with the scenarios representing real-world business applications and requirements.…

    • 406 Words
    • 2 Pages
    Good Essays
  • Good Essays

    1. Go to http://www.cybercrime.gov. Go to the section on computer crimes press release. Select one of the cases randomly. Describe the type of attacker and the type of attack(s), according to the categories that are defined as in the textbook…

    • 542 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Nt1310 Unit 7 Exercise 1

    • 641 Words
    • 3 Pages

    Triple DES was designed to replace the original Data Encryption Standard (DES) algorithm, which hackers eventually learned to defeat with relative ease. At one time, Triple DES was the recommended standard and the most widely used symmetric algorithm in the industry.…

    • 641 Words
    • 3 Pages
    Powerful Essays
  • Good Essays

    Nt1310 Unit 3 Assignment 1

    • 1244 Words
    • 5 Pages

    Analysis and explanation of the threat and vulnerability pairs and their likelihood of occurrence. The chart explains the aspects of the vulnerabilities and threats. b\Because we have no data on these threats on the amount of occurrences we cannot assign an impact rating or a probability rating in which is high medium an low (reference page 121 of book)…

    • 1244 Words
    • 5 Pages
    Good Essays
  • Powerful Essays

    Isc363 Phase 3

    • 1899 Words
    • 8 Pages

    As we progress forward, a few specific requirements such as software and data, information and hardware must be obtained in order to identify the type of system needed. The collected information is vital when determining the type of classifications and what is needed to insure the items or information is being secured. When it comes to threat identification, are level of threats is categorize…

    • 1899 Words
    • 8 Pages
    Powerful Essays
  • Better Essays

    Cmgt400 Week3

    • 1493 Words
    • 6 Pages

    References: 1. (2010). Principles of Computer Security: CompTIA Security+ and Beyond (2nd ed.). : McGraw-Hill.…

    • 1493 Words
    • 6 Pages
    Better Essays
  • Satisfactory Essays

    Lab 4

    • 342 Words
    • 2 Pages

    5. During the scanning step of the hacking attack process, you identified known software vulnerabilities in a Windows XP Professional Workstation. List the name and number of the critical Microsoft vulnerabilities identified. What is vulnerability ''MSO8-067"?…

    • 342 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    IS4560 Graded Assingments

    • 5563 Words
    • 23 Pages

    This particular report provides information on cutting edge and growing threats to Internet security. Using the background provided by the class so far, as well as your own critical thinking skill, you need to write a summary of the top threats described in the whitepaper. Explain why the threats are important issues and how these threats have changed or are changing.…

    • 5563 Words
    • 23 Pages
    Powerful Essays
  • Satisfactory Essays

    NT2580

    • 526 Words
    • 5 Pages

    Introduction to Information Security © ITT Educational Services, Inc. All rights reserved. Page 2 Key Concepts  Attacks, threats, and vulnerabilities in a typical IT infrastructure …

    • 526 Words
    • 5 Pages
    Satisfactory Essays
  • Good Essays

    Unit 8 Assignment

    • 594 Words
    • 3 Pages

    e. ___Encryption______ is the use of an algorithm to scramble data into a format that can be read only by reversing the algorithm.…

    • 594 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Kizza Chapter *

    • 528 Words
    • 3 Pages

    2. List three important facts that the author uses to support the main idea: A. Verification and Validation involves static formal mathematical techniques such as proof of correctness and dynamic techniques such as testing to show consistency between the code and the basic initial specifications. B. Consumer protection consists of laws and organizations designed to ensure the rights of consumers as well as fair trade competition and the free flow of truthful information in the marketplace. The laws are designed to prevent businesses that engage in fraud or specified unfair practices from gaining an advantage over competitors and may provide additional protection for the weak and those unable to take care of themselves. C. Software is an integral part of a computer system and the security of such a system depends on its hardware but even more so on the software component. There are more security attacks on systems through software “holes” than hardware, mainly through piracy, deletion and alteration of programs and data.…

    • 528 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    quiz 2

    • 651 Words
    • 3 Pages

    9. In this type of password attack the attacker has some information about the password. For example, the attacker knows the password contains a two or three digit number.…

    • 651 Words
    • 3 Pages
    Satisfactory Essays
  • Better Essays

    References: Conklin, W. A., White, G., Williams, D., Davis, R., & Cothren, C. (2012). Principles of computer security: CompTIA Security+™ and beyond (3rd ed.). New York, NY: McGraw Hill.…

    • 1432 Words
    • 5 Pages
    Better Essays
  • Powerful Essays

    Osi Attack

    • 6295 Words
    • 26 Pages

    In order to perform described Data Link layer attacks, we'll be using a tool called…

    • 6295 Words
    • 26 Pages
    Powerful Essays
  • Good Essays

    DES (Data Encryption Standard) is the most commonly used cipher. It was developed in the early 70’s and the US government has adopted it as a standard. The DES operates on a 64-bit blocks and uses a 56-bit key. One of the contrasts between this cipher and the Alberti- Vigenere Cipher is that it can be decrypted with use of special hardware (Sweigart, 2018, 35). Governments, cooperation’s and criminals can use special hardware to decrypt information that has been encrypted by using secure cryptosystems. In 1997 a call was issued by the (NIST) National Institute for Standards and Technology for development of a new encryption standard which was known as AES (Advanced Encryption Standard). These required the systems to operate on 128-bit blocks instead of the previous 64-bit blocks and they would also support key sizes of 128 to 256 bits (Pieprzyk & Cryptographers' Track, 2010, 27). Computer systems also use cryptographic hash for password storage. A password in a computer does not need to be decrypted as verification is the only requirement. The computer doe not store the password but it stores the corresponding hash. When a user signs in, his password is hashed which is then compared to the stored value. The user is given access if there is a…

    • 742 Words
    • 3 Pages
    Good Essays

Related Topics