0% found this document useful (0 votes)
29 views2 pages

BIS Assignment

The document outlines assignments for a course on Basics of Information Security, detailing tasks related to key security principles, ITU-T security services, various types of attacks, and cryptographic concepts. It includes multiple assignments with specific questions on topics such as encryption methods, firewalls, and digital signatures. Submission deadlines are indicated for each assignment.

Uploaded by

Parva Suthar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
29 views2 pages

BIS Assignment

The document outlines assignments for a course on Basics of Information Security, detailing tasks related to key security principles, ITU-T security services, various types of attacks, and cryptographic concepts. It includes multiple assignments with specific questions on topics such as encryption methods, firewalls, and digital signatures. Submission deadlines are indicated for each assignment.

Uploaded by

Parva Suthar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

SAL Institute of Diploma Studies

Department of Computer Engineering


Basics of Information Security (4360702)
Assignment-1
1. What are the key principles of security?(CIA) COa

2. List out ITU-T security services and explain any three services. COa
3. List and discuss any one passive attack. COa
4. What is Denial-of-service attack? COa
5. List out any four security mechanisms. COa

Last Date of Submission:

Assignment-2
Write any 8.

1. Define Terms: COb


Cryptography,cryptanalysis,cryptology,encryption,decryption,steganography.

2. What is plain Text?What is cipher text? Give an example of transformation of COb


plain text into cipher text.

3. Describe symmetric cipher model. COb

4. write a brief note on caesar cipher. COb

5. write a brief note on a monoalphabetic cipher. COb

6. Solve this example:Encrypt the following message using Mono-alphabetic COb


substitution cipher with key=4.”This is a book of IS”

7. What is the difference between a substitution cipher and transposition cipher. COb

8. Explain Playfair cipher with an example. COb

9. Write an algorithm of rail fence technique and take any example of it and solve it. COb
10. In DES encryption, explain key generation.

Last Date of Submission:

Assignment-3
1. Perform encryption and decryption using the RSA algorithm for following:(a) COc
p=3,q=11,e=7,M=6 (b) p=7,q=11,e=17,M=9
2. Briefly describe the RSA algorithm. COc
3. Write applications for public-key cryptosystems. COc
4. Write difference between conventional encryption and public key encryption. COc

5. Define:Digital signature COc

6. Write steps for obtaining a digital certificate and steps for verifying authenticity and COc
integrity of a certificate.
Last Date of Submission:
Assignment-4
Write any 7.
1. List out types of firewall.Explain packet filtering firewall. COd

2. What is tunneling? Explain it. COd

3. List out security topologies. COd

4. Explain application-level gateway firewall and circuit-level firewall. COd

5. Write down advantages and disadvantages of NIDS. COe

6. What is an intruder?Explain IDS technique. COe

7. What are threats? Write down types of threats. COe

8. Define: IP spoofing and ARP Spoofing. COe

9. Write down traditional problems associated with computer crime. COe

Last Date of Submission:

List of online courses:


Coursera: IbhhhhhhNPTEL:
Name Of faculty: Name & sign of HOD:

You might also like