0% found this document useful (0 votes)
50 views

Cryptography Assignment 1

Uploaded by

Abhi Saini
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
50 views

Cryptography Assignment 1

Uploaded by

Abhi Saini
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 2

JECRC University, Jaipur

School of Computer Applications


Assignment I August 2024
BCA V Semester
Subject Name: Cryptography and Cyber Security
Course Code: BCA178A
Release Date: 31/08/2024
Submission Date: 05/09/2024
Maximum Marks: 64
Course Outcomes (COs):
1. To understand basics of Cryptography and Network Security.
2. To learn about how to maintain the Confidentiality, Integrity and Availability of a data.
3. To understand various protocols for network security to protect against the threats in the networks.
4. To know about various encryption techniques such as digital signatures use.
5. To study about message authentication and cybercrime security.

Note: Assignment will be accepted via LMS only within the given deadline, otherwise 0 marks will be given
automatically.

Instructions:
1. Attempt all the questions.
2. Illustrate your answers with suitable examples and diagrams, wherever necessary.
3. Write relevant question numbers before writing the answer.

Section 1. (Answer the following questions) (5x2=10marks)

Q.1. [CO1] What are the few major applications of cryptography in the modern world?

Q.2. [CO1] What exactly do you know about RSA?

Q.3. [CO1] Define Hashing & Steganography.

Q.4. [CO1] Differentiate between Risk, Threat &Vulnerability.

Q.5. [CO1] What is Zero day?

Section 2. (Answer the following questions) (3x7=21 marks)

Q.1. [CO1] Explain the difference between symmetric and asymmetric cryptography.

Q.2. [CO1] What is a ransomware attack and how would you protect the organization against it?

Q.3. [CO1] In case a Cryptography tool is not available and you need to send secret information, would you
proceed or wait till the presence of the tool?

Section 3. (Answer the following questions) (3x11=33 marks)

Q.1.[CO1] How Security System should evolve to handle cyber security Threat & Vulnerabilities.

Q.2. [CO1] How are cryptographic algorithms classified? Explain any one algorithm with example

Q.3. [CO1] Consider the following scenario: A large financial institution has recently fallen victim to a
Consider the following scenario: A large financial institution has recently fallen victim to a sophisticated cyber
attack. The attackers employed a multi-stage attack strategy, starting with a phishing email campaign targeting
the institution’s employees. After successfully compromising an employee's account, the attackers gained
access to the internal network. They then escalated their privileges, deployed malware, and eventually
exfiltrated sensitive customer data, including financial records and personal information.

Based on this scenario:

1. Identify and describe the types of cyber-attacks that were utilized in each stage of the attack. Explain
how each attack type operates and how it contributed to the overall breach.

2. Discuss the role of cybersecurity awareness and training in preventing such attacks. How can
organizations ensure their employees are better equipped to recognize and respond to phishing attempts
and other social engineering tactics?

You might also like