Cyber Security Imp
Cyber Security Imp
unit 3
1) Describe the Deffie-Hellman Key Exchange in detail. [6]
2) User A and B use the Diffie-Helliman key exchange technique with a common prime q = 71
and a primitive root α = 7. [6] (2)
ii) If user B has private key XB = 12, what is B’s public key YB?
11) Explain the RSA algorithm in detail with the help of diagram. [6]
12) Perform encryption and decryption using RSA algorithm for p=l 7, q=31, e = 7 and M = 2. [6]
(2)
13) If user A has private key XA = 5, what is A’s public key YA ? If user B has private key XB = 12,
Unit 4
1) Explore Secure Socket Layer Handshake protocol in detail. [6]
4) Describe IPSec Protocol with its components and Security Services. [6] (2)
9) Identify Threats to web Security and figure out how any of two among listed are countered
by particular feature of SSL. [6]
10) List and explain various participants involved in Secure Electronic Transaction (SET). [6]
(2)
Unit 5
1) Differentiate packet filtering router and stateful Inspection firewall. [6]
7) List and Explain types of intrusion detection system (IDS) [6] (3)
Unit 6
a) What is Cyber Staking. [6] (2)
a) Identify and explore the different types of Cyber stalker attacks. [6]
c) List VoIP hacking types and explore any 3? What are the counter measures for it. [6]
a) Who are cyber criminals? What are types of cyber crimes. [6]
i) Virus
ii) Phishing
iii) Spoofing
v) Internet pharming