Sie sind auf Seite 1von 5

Subject Code Subject

: :

EM552 Cryptography and Network security

UNIT- I PART-A 1. Differentiate threat and Vulnerability. 2. When the system will get attack and what is the way to avoid attack? 3. What is the meaning of computer security? 4. What is the difference between interception and interruption? 5. What are all the three things the attackers must have? 6. Write short notes on Hardware Vulnerabilities. 7. What is Trojan horse and trapdoor? 8. What is Data integrity? 9. Write short notes about Computer criminals 10. Differentiate Hardware and software controls. 11. What is the use of policies and procedures? 12. What are all the ways the computers has been used by terrorists? 13. Who is called Amateur? 14. What is the principle of adequate protection? PART B 1. What is Vulnerability and explain about types of Vulnerabilities. 2. What is Computer intrusion? Explain Characteristics of computer intrusion. 3. Explain classes of threats. 4. Explain about Security Goals 5. Explain about (i) Crackers (ii)Career criminals (iii)terrorists 6. Explain Effectiveness of control in Defense. 7. Explain about Controls that attempt to prevent exploiting a computing systems vulnerabilities. 8. List at least three kinds of harm a company could suffer when the integrity of a program or company data is compromised. UNIT- II PART-A 1. What is cryptography? 2. What is plain text and ciphertext? 3. What is symmetric cipher.

4. What are the two basic functions used in encryption algorithms? 5. How many keys are required for two people to communicate via a cipher? 6. What is the difference between a block cipher and a stream cipher? 7. What are the two general approaches to attacking a cipher? 8. List and briefly define types of cryptanalytic attacks based on what is known to the attacker. 9. What is the difference between an unconditionally secure cipher and a computationally secure cipher? 10. What is Caesar cipher? 11. What is monoalphabetic cipher. 12. Briefly define the Playfair cipher. 13. What are two problems with the one-time pad? 14. What is a transposition cipher? 15. What is steganography? 16. What is the difference between diffusion and confusion? 17. What is the purpose of the S-boxes in DES? 18. What are the basic elements of a public-key cryptosystem? 19. What are the roles of public and private key? 20. What are three broad categories of applications of public-key cryptosystems? PART-B 1. Draw the block diagram and explain cryptosystem. 2. Explain all the Substitution techniques 3. Explain simplified DES algorithm with neat diagram. 4. Draw a neat diagram of general depiction of DES Encryption algorithm and explain. 5. Explain RSA public key encryption and give one example. 6. Perform encryption and decryption using the RSA algorithm.] a. p=3;q=11,e=7;M=5 b. p=5; q=11, e=3; M=9

7. In an RSA algorithm, the public key of a given user is e=31,n=3599. What is the private key of this user?

UNIT-III PART-A 1. What is fence? 2. Write basic separation methods of Operating system. 3. What is segmentation and where it is needed?

4. Define briefly paging. 5. Give some examples of the kinds of objects for which protection is desirable. 6. Give short notes about Kerberos. 7. Why file protection is important? 8. What is the use of passwords? 9. Which systems are called Loose-Lipped Systems? 10. Who is called indiscreet users? 11. What is the advantage of One-Time Passwords? 12. If two users share access to a segment, they must do so by the same name. Must their protection rights to it be the same? Why or Why not? PART-B 1. Explain Security methods of operating system. 2. Explain Memory and address protection by using proper diagram 3. With neat diagram explain Control of access to general objects. 4. Explain File protection mechanism and it types. 5. Explain the ways of attacks on passwords. 6. Explain the methods of selecting passwords. 7. Explain Fixing Flaws in the authentication process. UNIT-IV PART-A 1. What is DBMS? 2. Give some advantages of using data bases. 3. Write short notes on security requirements of database system. 4. What is two phase update? 5. What is element integrity? 6. What is Database integrity? 7. What are error detection and correction codes? 8. What is sensitive data? 9. Give the types of disclosures. 10. Draw the diagram of security versus precision of database 11. What is inference? 12. Give short notes about direct attack. 13. How indirect attacks can be done? 14. What are all the methods available to protect database from indirect attacks?

15. What is the use of multilevel databases? 16. Give some database security issues 17. How to correct mistakes in data? PART-B 1. Explain about a. Concept of a database b. Components of databases c. advantages of databases 2. Explain about security requirements. 3. Explain database reliability and integrity 4. With one example explain two phase update. 5. What is data redundancy? Give short notes about Concurrency/Consistency 6. Explain al the types of disclosures. 7. What is the importance of sensitive data and explain methods of creating sensitive data. 8. Explain indirect attacks. 9. Explain direct attacks and tracker attacks. 10. Explain all the methods of database security issues 11. Explain the proposals for multilevel security. 12. What is data mining? Explain detail. UNIT- V PART-A 1. What is the role of compression in the operation of a virus. 2. What is the role of encryption in the operation of virus. 3. Give the importance of email security. 4. Define IP security 5. What is Web security 6. What is wire tapping? 7. In general terms, how does a worm propagate? 8. Differentiate Viruses and Worms 9. List three design goals for a firewall. 10. List four techniques used by firewalls to control access and enforce a security policy. 11. What is a circuit-level gateway? 12. What is the difference between packet filtering router and a stateful inspection firewall? 13. What is an application-level gateway?

14. What are the some weaknesses of a packet-filtering router ? 15. Give short notes on intruders PART- B 1. Explain the Various types of Firewalls with suitable diagrams 2. Explain Email security and give one example. 3. Explain the types of Viruses. 4. What is worm? How it will affect the system? What are all the methods to protect a system from worms? 5. Explain the design procedure of firewalls with neat diagram. 6. Explain web security. Give the importance of web security. 7. Explain all the communication medias and give one example