MORE IN Information and Cyber Security
SPPU Information Technology (Semester 7)
Information and Cyber Security
December 2016
Total marks: --
Total time: --
INSTRUCTIONS
(1) Assume appropriate data and state your reasons
(2) Marks are given to the right of every question
(3) Draw neat diagrams wherever necessary

Solve any one question.Q1(a,b) Q2(a,b)
1(a) List and briefly types of cryptanalytic attacks based on what is kown to the attacker.
6 M
Solve any one question.Q1(a,b) Q2(a,b)
1(a) List and briefly define types of cryptanalytic attacks based on what is known to attacker.
6 M
1(b) Determine ged (24140,
16762).
4 M
1(b) Determine ged (24140,
16762)
4 M

2(a) Using the extended Euclidean algorithm, find the multiplicative inverse of
i) 1234 mod 4321
ii) 24140 mod 40902
6 M
2(a) Using the extended Euclidean algorithm, find the multiplicative inverse of
i) 1234 mod 4321
ii) 24140 mod 40902
6 M
2(b) What is the difference between a monoalphabetic cipher and a polyaphabetic cipher?
4 M
2(b) What is the difference between a monophabetic cipher and a polyalphabetic cipher?
4 M

Solve any one question.Q3(a,b) Q4(a,b)
3(a) What characteristics are needed in a secure hash function?
6 M
Solve any one question.Q3(a,b) Q4(a,b)
3(a) What characteristics are needed in a secure hash function?
6 M
3(b) In what order should the signature function and the confidentiality function be applied to a message, and why?
4 M
3(b) In what order should the signature function and the confidentiality function be applied to a message, and why?
4 M

4(a) What are the properties a digital signature should have?
6 M
4(a) What are the properties a digital signature should have?
6 M
4(b) What four requirment were defined for Kerberos?
4 M
4(b) What four requirement were defined for Kerberos?
4 M

Solve any one question.Q5(a,b) Q6(a,b)
5(a) Give examples of applications of IPSec. What service are provided by IPSec? What is the difference between transport mode and tunnel mode in IPSec?
8 M
Solve any one question.Q5(a,b) Q6(a,b)
5(a) Give example of applications of IPSec. What services are provided by IPSec? What is the difference between transport mode and tunnel mode in IPSec?
8 M
5(b) What protocols comprise SSL. Draw a neat diagram? What is the difference between an SSL connection and SSL session?
8 M
5(b) What protocols comprise SSL. Draw a neat digaram? What is the difference between an SSL connection and SSL session?
8 M

6(a) What services are provided by the SSL Record Protocol? What steps are involved in the SSL Record protocol transmission?
8 M
6(a) What services are provided by the SSL Record Protocol? What steps are involved in the SSL Record Protocol transmission?
8 M
6(b) What are three benefit that can be provided by an intrusion detection system? What is the difference between statistical anomaly detection and rule-based intrusion detection?
8 M
6(b) What are three benefits that can be provided by an instruction detection system? What is the difference between statistical anomaly detection and rule-based intrusion detection?
8 M

Solve any one question.Q7(a,b) Q8(a,b)
7(a) What is cybersquatting. Who are cybersqatters and how does in work.
8 M
Solve any one question.Q7(a,b) Q8(a,b)
7(a) What is cybersquatting. Who are cycbersquatters and how does it work.
8 M
7(b) What are social engineering attacks and classify and explain them?
8 M
7(b) What are social engineering attacks and classify and explain them?
8 M

8(a) What is cyberstalking. Explain cyberstalking and explain how it works.
8 M
8(a) What is cyberstalking. Explain cyberstalking and explain how it works.
8 M
8(b) Classify and expalin cybercrimes against property.
8 M
8(b) Classify and explain cybercrimes against property.
8 M

Solve any one question.Q9,Q10
9 Write short notes on:
a) Viruses
b) Worms and logic bombs
c) Botnets
18 M
Solve any one question.Q9(a,b,c) &Q10(a,b,c)
9(a) Write notes on:
Viruses
6 M
9(b) Worms and logic bombs
6 M
9(c) Botnels
6 M

10 Write short note on:
a) Cloud computing and cybercrimes
b) Indian legal perspective on cybercrimes
c) Software Piracy
18 M
10(a) Write notes on:
Colud computing and cybercrimes
6 M
10(b) Indian legal perspective on cybercrrimes
6 M
10(c) Software Piracy
6 M

More question papers from Information and Cyber Security