Ins Sem-5 QB Unit-1
Ins Sem-5 QB Unit-1
1. What is computer security? What are the objectives of computer security?
2. Define the following terms:
i. Cryptography
ii. Cryptanalysis
iii. Brute-force attack
iv. Confidentiality
v. Integrity
vi. Availability
vii. Symmetric key Cryptography
viii. Asymmetric key Cryptography
3. Explain the challenges of computer security.
4. Explain Principles of security.
5. Write a note on OSI security architecture.
6. State and explain Types of active attacks.
7. State and explain Types of passive attacks.
8. What is a security service? Explain different types of security services.
9. List and briefly define categories of security services.
10.List and briefly define categories of security mechanisms.
11. What are the components of a simple symmetric cipher model?
12.What are substitution techniques? Explain any one with the help of an example.
13.With the help of an example, explain the encryption and decryption process of Shift Cipher.
14.With the help of an example, explain the encryption and decryption process of Ceaser Cipher.
15.With the help of an example, explain the encryption and decryption process of Vernam
Cipher.
16.Using Shift Cipher encrypt and decrypt text “CORONA” using key=6.
17.Using Vernam Cipher encrypt and decrypt text “COVID” using key “NCBTA”.
18.With the help of an example, explain the encryption and decryption process of Vigenère
Cipher.
19.Using Vigenère Cipher encrypt and decrypt text “BAD” using key “ADD”.
20.What are transposition techniques? Explain any one with the help of an example.
21.What are the two general approaches to attacking a cipher?
22.What is the principle behind One Time pad? Why is it highly secure?
23.Explain Mono-alphabetic cipher with example.
24.What are Polyalphabetic Ciphers? Explain with examples.
25.Explain Playfair Cipher, encrypt the plain text “SECRET MESSAGE” by using
keyword “PROBLEM”.
26.Explain Hill Cipher with an example.
27.With the help of an example, explain the encryption and decryption process of Hill Cipher.