Friday, August 7, 2015

Computer Security 17514 Question Bank

1. List and explain key principles of computer security
2. Describe the term authentication and explain its methods
3. Define Virus and explain phases of virus
4. Compare between virus and worm
5. Explain the term
            i. Sniffing
            ii. Replay Attack
            iii. Ping of Death attack
6. Explain active attack and passive attack with suitable diagram
7. Define spoofing and Explain IP spoofing in detail.
8. Explain SYN flooding attack in detail.
9. List and explain types of viruses
10. Explain password selection criteria with suitable example.
11. Explain Piggybacking and shoulder surfing
12. Explain Dumpster diving and how it is avoided.
13. State four problems due to installation of unauthorized s/w
14. Which are the individual user responsibilities in security?
15. Define access control. Explain access control types.
16. Explain Bio-metric system with suitable diagram.
17. Define
            i. Cryptography
            ii. Encryption
            iii. Secret key
            iv. Ciphertext
            v. Cryptology
            vi. Cryptanalysis
            vii. Decryption.
18. Encrypt "COME HOME TOMORROW" using Caesar's cipher with key 5
19. Convert the "Welcome to Computer World" using Rail Fence technique

20. Encrypt "Meet Me after party" using simple columnar transposition technique with key 4,6,1,2,5,3