0% found this document useful (0 votes)
47 views1 page

Oct - 2022

The document discusses computer security concepts like policy and mechanism, goals of security, protection state and access control models. It also discusses assurance, components of computer security, threats and security services. The questions cover topics like the extended Euclidean algorithm, transposition cipher, DES algorithm, substitution and transposition techniques, block cipher design principles, modulus and properties of congruences.

Uploaded by

ELECTRO CLASHING
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
47 views1 page

Oct - 2022

The document discusses computer security concepts like policy and mechanism, goals of security, protection state and access control models. It also discusses assurance, components of computer security, threats and security services. The questions cover topics like the extended Euclidean algorithm, transposition cipher, DES algorithm, substitution and transposition techniques, block cipher design principles, modulus and properties of congruences.

Uploaded by

ELECTRO CLASHING
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 1

Total No. of Questions : 4] SEAT No.

8
23
P9646 [Total No. of Pages : 1

ic-
Oct-22/TE/Insem-645

tat
T.E. (Honors/Minors)

2s
INFORMATION AND CYBER SECURITY

8:2
(2019 Pattern) (Semester-I) (310401)

02 91
0:3
0
Time : 1 Hour] [Max. Marks : 30

21
1/1 13
Instructions to the candidates:
1) Answer Q.1 or Q.2, Q.3 or Q.4.
0
0/2
.23 GP

2) Neat diagram must be draw wherever necessary.


3) Figures to the right indicate full marks.
E
81

8
4) Assume suitable data if necessary.
C

23
5) Use of scientific calculator is permitted.

ic-
16

tat
Q1) a) What is Policy and Mechanism in computer security? [5]
8.2

2s
b) Explain in detail goals of security. [5]
.24

8:2
91
c) What is protection state? How access control model can be used as a
49

0:3
model for protection state. [5]
30
21

OR
01
02

Q2) a) What is assurance? What basis for used for determining “how much” to
0/2
GP

trust a system? [5]


1/1

b) What are basic components of computer security? [5]


CE
81

8
c) What is threat? How security services counter threats to the security of

23
.23

system? [5]
ic-
16

tat
8.2

2s

Q3) a) How extended Euclidean Algorithm can be used to calculate greatest


.24

8:2

common divisor? [5]


91
49

0:3

b) What is Transposition Cipher? Use Transposition Cipher to encrypt the


30

plain text “We Are The BEST” use key “HEAVEN” [5]
21

c) Is DES algorithm block cipher? List and explain strengths of DES


01
02

algorithm. [5]
0/2
GP

OR
1/1

Q4) a) Differentiate between substitution and transposition techniques. [5]


CE
81

b) Describe block cipher design principles. [5]


.23

c) What is modulus? List different properties of Congruences. [5]


16
8.2


.24
49

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy