Dr. S. & S. S.
Ghandhy College of Engineering and Technology, Surat
Information Technology Department
Course Title: Cyber Security and Digital Forensics
Assignment for Unit-1
Q. 1 Answer the below short questions:
(1) Why we need to secure Information?
(2) What is Information security?
(3) List out various goals of Information security.
(4) List out basic components of the OSI Security Architecture.
(5) Define the terms: Confidentiality, Integrity, Availability, Nonrepudiation, accountability,
Authenticity
(6) Define the terms: Plaintext, Ciphertext, Cryptography, Cryptanalysis, Encryption,
Decryption, Algorithm, Cryptology
(7) Differentiate: Attack and threat.
(8) List out different Substitution encryption techniques.
(9) List out different Transposition encryption techniques.
(10) What do you mean by brute-force attack? Explain with simple example.
Q. 2 Explain the below questions:
(1) Explain fundamental goals of Information Security.
(2) Explain OSI Security Architecture in brief.
(3) Short note on: Cryptography
(4) What do you mean by Substitution technique? Explain with one simple technique.
(5) Explain Play fair cipher technique with suitable example.
(6) What do you mean by Transposition technique? Explain with simple example.
(7) Explain Basic simple columnar transposition technique.
(8) Explain Vernam Cipher technique with suitable example.
(9) Differentiate: Symmetric Cryptography V/s Asymmetric Cryptography.
(10) Explain hashing with suitable example and working diagram.
(11) Explain hashing with its applications.
(12) Explain Message Digest 5 with its working, advantages and disadvantages.
(13) Explain Secure Hashing Algorithm in brief.
(14) Explain RSA Algorithm with suitable example.
(15) Describe CIA triad with example.