Beruflich Dokumente
Kultur Dokumente
University Faculty of Engineering and Technology Department Of Electronics and Communication Engineering
QUESTION BANK
Class Subject Code Subject : : : 1st M.Tech (Embedded System Technology) 1I Sem EM552 Cryptography and Network security
UNIT- I PART-A
1.
2. When the system will get attack and what is the way to avoid attack? 3. What is the meaning of computer security? 4. What is the difference between interception and interruption? 5. What are all the three things the attackers must have? 6. Write short notes on Hardware Vulnerabilities.
7.
What is Trojan horse and trapdoor? Write short notes about Computer criminals What is the use of policies and procedures? What are all the ways the computers has been used by terrorists? Who is called Amateur? What is the principle of adequate protection?
What is Computer intrusion? Explain Characteristics of computer intrusion. Explain classes of threats. Explain about (i) Crackers (ii)Career criminals (iii)terrorists Explain Effectiveness of control in Defense. Explain about Controls that attempt to prevent exploiting a computing systems vulnerabilities.
8. List at least three kinds of harm a company could suffer when the integrity of a program or company data is compromised.
UNIT- II PART-A 1. What is cryptography? 2. What is plain text and ciphertext? 3. What is symmetric cipher. 4. What are the two basic functions used in encryption algorithms? 5. How many keys are required for two people to communicate via a cipher? 6. What is the difference between a block cipher and a stream cipher? 7. What are the two general approaches to attacking a cipher? 8. List and briefly define types of cryptanalytic attacks based on what is known to the attacker. 9. What is the difference between an unconditionally secure cipher and a computationally secure cipher? 10. What is Caesar cipher? 11. What is monoalphabetic cipher. 12. Briefly define the Playfair cipher.
13.
14. What is a transposition cipher? 15. What is steganography? 16. What is the difference between diffusion and confusion? 17. What is the purpose of the S-boxes in DES? 18. What are the basic elements of a public-key cryptosystem? 19. What are the roles of public and private key?
20.
PART-B 1. Draw the block diagram and explain cryptosystem. 2. Explain all the Substitution techniques 3. Explain simplified DES algorithm with neat diagram. 4. Draw a neat diagram of general depiction of DES Encryption algorithm and explain. 5. Explain RSA public key encryption and give one example.
6.
p=3;q=11,e=7;M=5
7. In an RSA algorithm, the public key of a given user is e=31,n=3599. What is the private key of this user?
UNIT-III PART-A 1. What is fence? 2. Write basic separation methods of Operating system. 3. What is segmentation and where it is needed? 4. Define briefly paging. 5. Give some examples of the kinds of objects for which protection is desirable. 6. Give short notes about Kerberos. 7. Why file protection is important? 8. What is the use of passwords? 9. Which systems are called Loose-Lipped Systems? 10. Who is called indiscreet users? 11. What is the advantage of One-Time Passwords? 12. If two users share access to a segment, they must do so by the same name. Must their protection rights to it be the same? Why or Why not? PART-B
1.
2. Explain Memory and address protection by using proper diagram 3. With neat diagram explain Control of access to general objects.
4.
5. Explain the ways of attacks on passwords. 6. Explain the methods of selecting passwords. 7. Explain Fixing Flaws in the authentication process. UNIT-IV PART-A
1.
What is DBMS?
2. Give some advantages of using data bases. 3. Write short notes on security requirements of database system. 4. What is two phase update? 5. What is element integrity? 6. What is Database integrity?
7.
10. Draw the diagram of security versus precision of database 11. What is inference? 12. Give short notes about direct attack. 13. How indirect attacks can be done? 14. What are all the methods available to protect database from indirect attacks? 15. What is the use of multilevel databases? 16. Give some database security issues 17. How to correct mistakes in data? PART-B 1. Explain about a. Concept of a database b. Components of databases c. advantages of databases
2.
3. Explain database reliability and integrity 4. With one example explain two phase update. 5. What is data redundancy? Give short notes about Concurrency/Consistency 6. Explain al the types of disclosures. 7. What is the importance of sensitive data and explain methods of creating sensitive data.
8.
9. Explain direct attacks and tracker attacks. 10. Explain all the methods of database security issues 11. Explain the proposals for multilevel security. 12. What is data mining? Explain detail. UNIT- V PART-A
1.
2. What is the role of encryption in the operation of virus. 3. Give the importance of email security. 4. Define IP security 5. What is Web security 6. What is wire tapping? 7. In general terms, how does a worm propagate?
8.
9. List three design goals for a firewall. 10. List four techniques used by firewalls to control access and enforce a security policy. 11. What is a circuit-level gateway? 12. What is the difference between packet filtering router and a stateful inspection firewall? 13. What is an application-level gateway?
14.
2. Explain Email security and give one example. 3. Explain the types of Viruses. 4. What is worm? How it will affect the system? What are all the methods to protect a system from worms? 5. Explain the design procedure of firewalls with neat diagram. 6. Explain web security. Give the importance of web security.
7.
Explain all the communication medias and give one example Prepared by K.Vadivukkarasi.