Preview

Tutorial

Satisfactory Essays
Open Document
Open Document
341 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Tutorial
Sub : INFORMATION SECURITY M.E.(CSE) I Sem

Tutorial-1

1. What is security attack? Explain active attacks and passive attacks? 2. Explain objectives of Information Security. 3. Distinguish among vulnerability, threat, and control 4. Preserving confidentiality, integrity, and availability of data is a restatement of the concern over interruption, interception, modification, and fabrication. How do the first three concepts relate to the last four? That is, is any of the four equivalent to one or more of the three? Is one of the three encompassed by one or more of the four? 5. Describe an example of data whose confidentiality has a short timeliness, say, a day or less. Describe an example of data whose confidentiality has a timeliness of more than a year. 6. Consider a program that allows consumers to order products from the web. Who might want to attack the program? What types of harm might they want to cause? What kinds of vulnerabilities might they exploit to cause harm?

Tutorial-2

1. What is the difference between a block cipher and a stream cipher?

2. What is the difference between a monoalphabetic cipher and a polyalphabetic cipher?

3. A ciphertext has been generated with an affine cipher. The most frequent letter of the ciphertext is 'B', and the second most frequent letter of the ciphertext is 'U'. Break this code.

4. When the PT-109 American patrol boat, under the command of Lieutenant John F. Kennedy, was sunk by a Japanese destroyer, a message was received at an Australian wireless station in Playfair code: KXJEY UREBE ZWEHE WRYTU HEYFS KREHE GOYFI WTTTU OLKSY CAJPO BOTEI ZONTX BYBNT GONEY CUZWR GDSON SXBOU YWRHE BAAHY USEDQ The key used was royal new zealand navy. Decrypt the message. Translate TT into tt.

5. Using the Vigenère cipher, encrypt the word "explanation" using the key leg.

6. Encrypt the message "meet me at the

You May Also Find These Documents Helpful

  • Good Essays

    1. Go to http://www.cybercrime.gov. Go to the section on computer crimes press release. Select one of the cases randomly. Describe the type of attacker and the type of attack(s), according to the categories that are defined as in the textbook…

    • 542 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    3. Identify and document at least three vulnerabilities and the solutions related to the client configurations.…

    • 290 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    The following table presents the possible threats, the potential vulnerabilities each threat may exploit, and area of the system effected by the threats:…

    • 745 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    It255 Final Study Guide

    • 843 Words
    • 4 Pages

    7. Which of the following is any weakness in a system that makes it possible for a threat to cause it harm?…

    • 843 Words
    • 4 Pages
    Powerful Essays
  • Good Essays

    Nt1310 Unit 3 Assignment 1

    • 1244 Words
    • 5 Pages

    Analysis and explanation of the threat and vulnerability pairs and their likelihood of occurrence. The chart explains the aspects of the vulnerabilities and threats. b\Because we have no data on these threats on the amount of occurrences we cannot assign an impact rating or a probability rating in which is high medium an low (reference page 121 of book)…

    • 1244 Words
    • 5 Pages
    Good Essays
  • Satisfactory Essays

    Identify risks that could lead to an information security breach, Identify vulnerabilities in system security, software operation, network design or employee procedures that could lead to a network failure.…

    • 339 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Lab #2

    • 402 Words
    • 2 Pages

    2. What is the relationship between risks, threats, and vulnerabilities as it pertains to information systems…

    • 402 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    3. Identify and document at least three vulnerabilities and the solutions related to the client configurations.…

    • 286 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Unit 4222 - 307

    • 395 Words
    • 2 Pages

    6. About the rights of individuals e.g.[10] personal data shall be processed in accordance with the rights of data subjects (individuals).…

    • 395 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    How to Make a Tutorial

    • 682 Words
    • 3 Pages

    As an assistant manager of Noblewood Textiles in San Diego, California, you must help prepare an annual report for the board of directors.…

    • 682 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    3. The amount of time between when a vulnerability is discovered and when it is eliminated is usually 8 days.…

    • 446 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    According to Price-wright, “For three years, 400 Navajo troops--mostly Marines--used the code in battles with the Japanese. No messages were ever decoded. It is still the only spoken U.S. military code that has never been broken. The Navajo code talkers played an important role in the U.S. victory in World War II. But their work was a secret until 1968. Even after the mission and…

    • 1790 Words
    • 8 Pages
    Good Essays
  • Better Essays

    Defense against web attacks is a key element in a security professional’s skill set. For this assignment, your manager has asked you to review the Aim Higher College’s Web server and application security and to suggest appropriate defenses. For each of the following scenarios, explain what the threat or threats are, what defenses you would recommend, and why.…

    • 1988 Words
    • 8 Pages
    Better Essays
  • Satisfactory Essays

    Risk Management

    • 426 Words
    • 2 Pages

    Provide and explain an example of an information technology security threat. Analyze how administrative, detective, preventative, and corrective could be used to mitigate the threat.…

    • 426 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    IS3445 Project Part 4

    • 565 Words
    • 2 Pages

    The security of a web application should become top priority when it comes to ensuring the security of the information that the application contains. When we, as an organization, think of security, we should all think of ways that the attacker would attempt to breach the application in order to gain access to the network, or exploit the vulnerability to his or her own benefits. There are many weaknesses pertaining to web applications, and these weaknesses each have an attack associated with it, with the attacker having his or her own motivation for the attack. The attacker’s motivation deeply depends on the type of attack that has occurred at that time. Listed below is a list of the common weaknesses and attacks associated with e-commerce and social networking applications.…

    • 565 Words
    • 2 Pages
    Good Essays