Brief Answer Question:
[10×1=10]i. Define denial of receipt.
ii. List the differences between Block and stream cipher.
iii. List different types of VPN.
iv. List the characteristics of proactive password checker.
v. Define Principle of Psychological Acceptability.
vi. Differentiate between Virus and Worm.
vii. Differentiate between Hacker and Cracker.
viii. Define the Concept of Secure Email.
ix. Define Inference control.
x. Differentiate between Trade mark and Patent.
Exercise Problems:
[5×4=20]Explain Biba integrity model with example.
In a public-key system using RSA, you intercept the ciphertext C=8 sent to a user whose public key is e=3, n=33. What is the plaintext M?
Explain DSS approach and RSA approach with figure.
Illustrate SSL handshake protocol action.
Explain the architecture of intrusion detection systems.
Comprehensive Questions:
[2×5=10]List and explain any four Common Security related programming problems.
Define Digital Forensics. Explain digital forensic investigation procedures in brief.