SPPU Information Technology (Semester 7)
Information and Cyber Security
December 2015
Total marks: --
Total time: --
INSTRUCTIONS
(1) Assume appropriate data and state your reasons
(2) Marks are given to the right of every question
(3) Draw neat diagrams wherever necessary


Solve any one question from Q1 and Q2
1 (a) State the Chinese Remainder theorem with example.
6 M
1 (b) In a public key cryptosystem using RSA, given N=187 and the encryption key (E) as 17, find out the corresponding private key (D).
4 M

2 (a) Draw AES block diagram and explain the steps in detail.
6 M
2 (b) Define following.
i) Discrete logarithm
ii) Fermat theorem
4 M

Solve any one question from Q3 and Q4
3 (a) Explain X.509 standard for Digital Certificate.
6 M
3 (b) Explain permutation and substitution steps in DES algorithm.
4 M

4 (a) Using Euclidean algorithm calculate
i) GCD (48, 30)
ii) GCD (105, 80)
4 M
4 (b) What problem was Kerberos designed to address. Describe Kerberos realm.
6 M

Solve any one question from Q5 and Q6
5 (a) Define IKE protocol and illustrate IKE format in detail.
8 M
5 (b) Discuss SSL with respect to four phases
i) Establish security capabilities
ii) Server authentication and key exchange
iii) Client authentication and key exchange
iv) Finish
8 M

6 (a) Explain various categories of Intrusion Detection system (IDS).
8 M
6 (b) How AH and ESP are differs while working under transport and tunnel mode.
8 M

Solve any one question from Q7 and Q8
7 (a) Describe the classification of Cyber Crime.
10 M
7 (b) Define cyber security and information security with example.
6 M

8 (a) Explain with example how social engineering is playing wide role in cyber crime.
10 M
8 (b) Write a short note on Indian legal perspective.
6 M

Solve any one question from Q9 and Q10
9 (a) What is SQL injection? Explain in detail.
8 M
Write short note on:
9 (b) (i) Indian IT act
5 M
9 (b) (ii) Different ways of password cracking
5 M

Define the differentiate:
10 (a) Proxy server and an anonymizer.
6 M
10 (b) DOS and DDOS
6 M
10 (c) Virus and worm.
6 M



More question papers from Information and Cyber Security
SPONSORED ADVERTISEMENTS