1. List and explain key principles of computer security
2. Describe the term authentication and explain its methods
3. Define Virus and explain phases of virus
4. Compare between virus and worm
5. Explain the term
i. Sniffing
ii. Replay Attack
iii. Ping of Death attack
6. Explain active attack and passive attack with suitable diagram
7. Define spoofing and Explain IP spoofing in detail.
8. Explain SYN flooding attack in detail.
9. List and explain types of viruses
10. Explain password selection criteria with suitable example.
11. Explain Piggybacking and shoulder surfing
12. Explain Dumpster diving and how it is avoided.
13. State four problems due to installation of unauthorized s/w
14. Which are the individual user responsibilities in security?
15. Define access control. Explain access control types.
16. Explain Bio-metric system with suitable diagram.
17. Define
i. Cryptography
ii. Encryption
iii. Secret key
iv. Ciphertext
v. Cryptology
vi. Cryptanalysis
vii. Decryption.
18. Encrypt "COME HOME TOMORROW" using Caesar's cipher with key 5
19. Convert the "Welcome to Computer World" using Rail Fence
technique
20. Encrypt "Meet Me after party" using simple columnar
transposition technique with key 4,6,1,2,5,3
No comments:
Post a Comment