0% found this document useful (0 votes)
0 views

Cyber Security Imp

The document outlines various topics related to cyber security, including key exchange methods, authentication services, encryption algorithms, and protocols like SSL and IPSec. It covers practical exercises involving Diffie-Hellman and RSA algorithms, as well as discussions on cyber crimes, cyber forensics, and the Indian IT Act. Additionally, it addresses the architecture of firewalls, intrusion detection systems, and the implications of personal identifiable information (PII).

Uploaded by

rohitwaghmodeop
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
0 views

Cyber Security Imp

The document outlines various topics related to cyber security, including key exchange methods, authentication services, encryption algorithms, and protocols like SSL and IPSec. It covers practical exercises involving Diffie-Hellman and RSA algorithms, as well as discussions on cyber crimes, cyber forensics, and the Indian IT Act. Additionally, it addresses the architecture of firewalls, intrusion detection systems, and the implications of personal identifiable information (PII).

Uploaded by

rohitwaghmodeop
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

CYBER SECURITY

unit 3
1) Describe the Deffie-Hellman Key Exchange in detail. [6]

2) User A and B use the Diffie-Helliman key exchange technique with a common prime q = 71
and a primitive root α = 7. [6] (2)

i) If user A has private key XA = 5, what is A’s public key YA?

ii) If user B has private key XB = 12, what is B’s public key YB?

iii) What is the shared secret key?

3) Identify and explain the authentication methods. [6]

4) Distinguish between Kerberos and X.509 authentication service. [5]

5) Explain X.509 Authentication Service. [6] (2)

6) Explain the operations of Kerberos. [6] (2)

7) What is Digital Signature Standard? Explain the DSS approach. [6]

8) Explain Message Digest algorithm in detail. [5]

9) Explain operation of MD5 message digest algorithm. [6] (2)

10) Explain Public Key Cryptography. [6] (2)

11) Explain the RSA algorithm in detail with the help of diagram. [6]

12) Perform encryption and decryption using RSA algorithm for p=l 7, q=31, e = 7 and M = 2. [6]
(2)

13) If user A has private key XA = 5, what is A’s public key YA ? If user B has private key XB = 12,

what is B’s public key YB ? What is the shared secret key?

Unit 4
1) Explore Secure Socket Layer Handshake protocol in detail. [6]

2) What is VPN? Explain types of VPN. Components of VPN [6] (3)


3) List and explain components of IPSec protocol. [6]

4) Describe IPSec Protocol with its components and Security Services. [6] (2)

5) Explain ISAKMP protocol of IPSec. [6]

6) Explain working of PGP in details. [6] (2)

7) What is S/MIME’? What are the benefits of S/MIME? [6] (2)

8) Distinguish between PGP and S/MIME. [6]

9) Identify Threats to web Security and figure out how any of two among listed are countered
by particular feature of SSL. [6]

10) List and explain various participants involved in Secure Electronic Transaction (SET). [6]
(2)

13) Describe the SSL protocol in details. [6] (2)

Unit 5
1) Differentiate packet filtering router and stateful Inspection firewall. [6]

2) What is trusted system? Explain in brief. [6] (3)

3) Explain the architecture of firewall. [6] (2)

4) List limitations of Firewall. [5]

5) Illustrate Screened subnet firewall Architecture. [6]

6) Describe operation of packet filtering firewall. [5] (2)

7) List and Explain types of intrusion detection system (IDS) [6] (3)

8) Identify and explore any two-password management practice. [5]

9) Difference between IDS and IPS. [5] (2)

10) What is access control security service? [6] (2)

Unit 6
a) What is Cyber Staking. [6] (2)
a) Identify and explore the different types of Cyber stalker attacks. [6]

b) Illustrate life cycle of cyber forensics? [6]

c) List VoIP hacking types and explore any 3? What are the counter measures for it. [6]

a) Who are cyber criminals? What are types of cyber crimes. [6]

b) What is Botnet? How to protect from botnet? [6]

c) Explain the terms: [6]

i) Virus

ii) Phishing

iii) Spoofing

iv) Phone phishing

v) Internet pharming

vi) Cyber Forensic

b) Write short note on Mobile Hacking. [6]

c) Explain Indian IT Act. [5] (2)

a) Explain PII impact level with examples. [6]

b) Write short note on Cybercrime. [6] (2)

c) Write Advantages of cyber law. [5] (2)

b) Write short note on Mobile Hacking.

a) Explain PII impact level with examples.

You might also like