Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
0% found this document useful (0 votes)
2 views

CSDF Assignment Unit-1

The document is an assignment for a Cyber Security and Digital Forensics course at Dr. S. & S. S. Ghandhy College of Engineering and Technology. It includes short questions and explanations on topics such as information security, OSI security architecture, cryptography, encryption techniques, and various algorithms. The assignment aims to assess students' understanding of fundamental concepts in cybersecurity.

Uploaded by

Hetal Vasava
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
2 views

CSDF Assignment Unit-1

The document is an assignment for a Cyber Security and Digital Forensics course at Dr. S. & S. S. Ghandhy College of Engineering and Technology. It includes short questions and explanations on topics such as information security, OSI security architecture, cryptography, encryption techniques, and various algorithms. The assignment aims to assess students' understanding of fundamental concepts in cybersecurity.

Uploaded by

Hetal Vasava
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

Dr. S. & S. S.

Ghandhy College of Engineering and Technology, Surat

Information Technology Department


Course Title: Cyber Security and Digital Forensics

Assignment for Unit-1

Q. 1 Answer the below short questions:

(1) Why we need to secure Information?

(2) What is Information security?

(3) List out various goals of Information security.

(4) List out basic components of the OSI Security Architecture.

(5) Define the terms: Confidentiality, Integrity, Availability, Nonrepudiation, accountability,


Authenticity

(6) Define the terms: Plaintext, Ciphertext, Cryptography, Cryptanalysis, Encryption,


Decryption, Algorithm, Cryptology

(7) Differentiate: Attack and threat.

(8) List out different Substitution encryption techniques.

(9) List out different Transposition encryption techniques.

(10) What do you mean by brute-force attack? Explain with simple example.

Q. 2 Explain the below questions:

(1) Explain fundamental goals of Information Security.

(2) Explain OSI Security Architecture in brief.

(3) Short note on: Cryptography

(4) What do you mean by Substitution technique? Explain with one simple technique.

(5) Explain Play fair cipher technique with suitable example.

(6) What do you mean by Transposition technique? Explain with simple example.
(7) Explain Basic simple columnar transposition technique.

(8) Explain Vernam Cipher technique with suitable example.

(9) Differentiate: Symmetric Cryptography V/s Asymmetric Cryptography.

(10) Explain hashing with suitable example and working diagram.

(11) Explain hashing with its applications.

(12) Explain Message Digest 5 with its working, advantages and disadvantages.

(13) Explain Secure Hashing Algorithm in brief.

(14) Explain RSA Algorithm with suitable example.

(15) Describe CIA triad with example.

You might also like