Brief Answer Questions:
[10 × 1 = 10]Define masquerading.
Covert plain text "Bimsixth" into cipher text using Caesar cipher.
List a major difference between ESP and AH.
List the fundamental problem of password based system.
Define improper sequencing.
List out the components of intrusion detection system.
Different between rabbit and bacteria.
List the limitation of SMTP.
Define cyber bulling.
Define cyber law.
Exercise Problems:
[5 × 4 = 20]Why is human consider as weakest as well as strongest link in security mechanism?
As a Security Software designer of your organization, you are required to design a secure system, list and explain the various principles you consider while designing it.
Explain DSS and RSA approach for creating digital signature.
Define RSA algorithm with an example.
Define Secure electronic transaction (SET). Explain the role of various participants of SET.
Comprehensive Questions:
[2 × 5 = 10]As a database security administrator, what factors do you consider while designing and implementing database security policy.
Define Intrusion Detection System. How intrusion is handled once it is detected? Explain.