Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
18 views7 pages

Solution of Information Security CSI-619 Spring-2022

The document outlines the course details for Information Security at Government College University, Faisalabad, including multiple-choice questions and subjective questions related to security mechanisms, cryptography, and types of cyber-attacks. It covers key concepts such as encryption, digital signatures, and the differences between hashing and digital signatures. Additionally, it discusses passive and active security attacks, as well as cryptanalysis techniques.

Uploaded by

nicoje1544
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
18 views7 pages

Solution of Information Security CSI-619 Spring-2022

The document outlines the course details for Information Security at Government College University, Faisalabad, including multiple-choice questions and subjective questions related to security mechanisms, cryptography, and types of cyber-attacks. It covers key concepts such as encryption, digital signatures, and the differences between hashing and digital signatures. Additionally, it discusses passive and active security attacks, as well as cryptanalysis techniques.

Uploaded by

nicoje1544
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 7

GOVERNMENT COLLEGE UNIVERSITY, FAISALABAD​

BSCS 8th Semester​


SESSION: Spring-2022​
COURSE CODE: CSI-619​
COURSE TITLE: Information Security​
MAX. MARKS: 80​
TIME ALLOWED: 01:40 Hours​
ROLL NO: ___________​
Credit Hours: 3(3-0)

Multiple-Choice Questions & Answers

1.​ Which of the following is defined as an attempt to steal, spy, damage, or


destroy computer systems, networks, or their associated information?
○​ a) Cyber-attack
○​ b) Computer security
○​ c) Cryptography
○​ d) Digital hacking​
Correct Answer: a) Cyber-attack
2.​ Which of the following is not a cybercrime?
○​ a) Denial of Service
○​ b) Man-in-the-Middle
○​ c) Malware
○​ d) AES​
Correct Answer: d) AES
3.​ Which of the following is a type of cyber-attack?
○​ a) Phishing
○​ b) SQL Injections
○​ c) Password Attack
○​ d) All of the above​
Correct Answer: d) All of the above
4.​ Which of the following is defined as an attempt to harm, damage, or
cause a threat to a system or network?
○​ a) Digital crime
○​ b) Threats
○​ c) System hijacking
○​ d) Cyber-attack​
Correct Answer: b) Threats
5.​ Which of the following online services' privacy cannot be protected
using Tor?
○​ a) Browsing data
○​ b) Instant messaging
○​ c) Login using ID
○​ d) Relay chats​
Correct Answer: c) Login using ID
6.​ Which of the following is the least strong security encryption standard?
○​ a) WPA3
○​ b) WPA2
○​ c) WPA
○​ d) WEP​
Correct Answer: c) WPA
7.​ Which of the following can diminish the chance of data leakage?
○​ a) Steganography
○​ b) Chorography
○​ c) Cryptography
○​ d) Authentication​
Correct Answer: a) Steganography
8.​ A ________ can gain access illegally to a system if the system is not
properly tested in the scanning and access-gaining phase.
○​ a) Security Officer
○​ b) Malicious Hacker
○​ c) Security Auditor
○​ d) Network Analyst​
Correct Answer: b) Malicious Hacker
9.​ In which phase do hackers install backdoors so they can maintain
access to the victim's system?
○​ a) Scanning
○​ b) Maintaining access
○​ c) Maintaining Access (Duplicate option)
○​ d) Gaining access​
Correct Answer: b) Maintaining access
10.​_________ is the tool used for this purpose.
○​ a) Powersploit
○​ b) Aircrack-ng
○​ c) Snort
○​ d) Nmap​
Correct Answer: b) Aircrack-ng
11.​_________ is the scrambled message produced as output.
○​ a) Plain Text
○​ b) Cipher Text
○​ c) Secret Key
○​ d) Cryptanalysis​
Correct Answer: b) Cipher Text
12.​The most important symmetric algorithm, all of which are block ciphers,
include DES, Triple DES, and ________.
○​ a) SHA
○​ b) RSA
○​ c) AES
○​ d) DSS​
Correct Answer: c) AES
13.​On average, ________ of all possible keys must be tried in order to
achieve success with a brute-force attack.
○​ a) One-fourth
○​ b) Half
○​ c) Two-thirds
○​ d) Three-fourths​
Correct Answer: b) Half
14.​The purpose of a ________ is to produce a "fingerprint" of a file,
message, or another block of data.
○​ a) Secret Key
○​ b) Digital Signature
○​ c) Key Stream
○​ d) Hash Function​
Correct Answer: d) Hash Function
15.​_________ is a block cipher in which the plaintext and ciphertext are
integers between 0 and n-1 for some n.
○​ a) SHA
○​ b) RSA
○​ c) AES
○​ d) DSS​
Correct Answer: b) RSA
16.​What data should be subject to a data classification scheme?
○​ a) Sensitive data
○​ b) Critical data
○​ c) Classified data
○​ d) All data​
Correct Answer: d) All data
17.​The original message or data that is fed into the algorithm is ________.
○​ a) Encryption Algorithm
○​ b) Public Key
○​ c) Decryption Algorithm
○​ d) Plain Text​
Correct Answer: d) Plain Text
18.​The ________ is the encryption algorithm run in reverse.
○​ a) Encryption Algorithm
○​ b) Public Key
○​ c) Decryption Algorithm
○​ d) Private Key​
Correct Answer: c) Decryption Algorithm
19.​Transmitted data stored locally are referred to as ________.
○​ a) Cipher Text
○​ b) DES
○​ c) Data at rest
○​ d) ECC​
Correct Answer: c) Data at rest
20.​Digital signatures and key management are the two most important
applications of ________ encryption.
○​ a) Private Key
○​ b) Public Key
○​ c) Preimage resistant
○​ d) Advanced​
Correct Answer: b) Public Key

SUBJECTIVE PART

Note: Attempt all questions.

Q.1 List and briefly define categories of security mechanisms. (20 Marks)

Answer:​
Security mechanisms are employed to detect, prevent, or recover from security
attacks. The key categories are:

●​ Encipherment (Encryption): Transforming data into an unreadable format to


maintain confidentiality.
○​ Example: Using AES (Advanced Encryption Standard) to encrypt a file.
●​ Digital Signatures: Attaching a cryptographic signature to a message to
verify the sender’s identity and ensure integrity.
○​ Example: Using RSA to sign an email digitally.
●​ Access Control: Restricting access to resources based on user identity and
roles.
○​ Example: Implementing user accounts with passwords and
permissions.
●​ Data Integrity: Ensuring data accuracy and immutability during transmission
or storage.
○​ Example: Using hash functions like SHA-256.
●​ Authentication Exchange: Verifying the identity of communicating entities.
○​ Example: Implementing Kerberos authentication.
●​ Traffic Padding: Introducing dummy data to conceal actual transmission
patterns.
○​ Example: Sending dummy packets along with real data to confuse
attackers.
●​ Routing Control: Ensuring secure data transmission paths.
○​ Example: Using VPNs for encrypted network communication.
●​ Notarization: Employing a trusted third party to verify data authenticity.
○​ Example: Utilizing certificate authorities (CAs) for digital certificates.

Q.2 Briefly define the difference between hashing and digital signatures.
(20 Marks)

Answer:

Hashing:

●​ Purpose: Ensures data integrity by generating a fixed-size hash from a given


input.
●​ Key Feature: A one-way function that makes it infeasible to reverse-engineer
the original input.
●​ Security: Detects unauthorized data modifications.
●​ Example: SHA-256, MD5 (MD5 is now considered insecure).

Digital Signatures:

●​ Purpose: Provides authentication, integrity, and non-repudiation.


●​ Key Feature: Uses asymmetric cryptography (public and private keys) to sign
message hashes.
●​ Security: Ensures sender authenticity and prevents repudiation.
●​ Example: RSA digital signatures, DSA (Digital Signature Algorithm).

Key Difference:

●​ Hashing secures data integrity, while digital signatures ensure integrity,


authentication, and non-repudiation.

Q.3 Define cryptography and explain symmetric key cryptography. (20


Marks)

Answer:

Cryptography: Cryptography is the practice of secure communication through data


transformation techniques that ensure confidentiality, integrity, authentication, and
non-repudiation.
Symmetric Key Cryptography: Symmetric key cryptography, also known as secret
key cryptography, employs the same key for both encryption and decryption.

Process:

1.​ A secret key is generated and securely shared.


2.​ The sender encrypts plaintext using the shared key.
3.​ The ciphertext is transmitted over an insecure channel.
4.​ The receiver decrypts the ciphertext using the same key.

Advantages:

●​ Faster than asymmetric encryption.


●​ Simpler implementation.

Disadvantages:

●​ Secure key distribution is challenging.


●​ Scalability issues arise with multiple users.

Examples:

●​ AES (Advanced Encryption Standard)


●​ DES (Data Encryption Standard)
●​ 3DES (Triple DES)
●​ Blowfish

Q.4a) List and briefly define categories of passive and active security
attacks. (10*2=20 Marks)

Answer:

Passive Attacks: (Monitoring without modification)

●​ Eavesdropping: Unauthorized interception of communications.


○​ Example: Sniffing network traffic for passwords.
●​ Traffic Analysis: Inferring communication details through transmission
patterns.
○​ Example: Analyzing encrypted message frequencies.

Active Attacks: (Modification or creation of malicious data)

●​ Masquerade: Impersonating an entity for unauthorized access.


○​ Example: Using stolen credentials to access a system.
●​ Replay: Capturing and resending valid data packets.
○​ Example: Replaying login authentication requests.
●​ Message Modification: Altering message content during transmission.
○​ Example: Changing financial transaction details.
●​ Denial of Service (DoS): Disrupting service availability by overwhelming
resources.
○​ Example: Flooding a server with traffic.
●​ Denial of Repudiation: Falsely denying message transmission.
○​ Example: A user denying an email they sent.

Q.4b) What is the difference between differential and linear


cryptanalysis? (10 Marks)

Answer:

Differential Cryptanalysis:

●​ Focus: Examines how differences in plaintexts affect ciphertexts.


●​ Method: Analyzes statistical patterns between input-output differences.
●​ Goal: Identify key relationships to break encryption.
●​ Target: Primarily block ciphers.

Linear Cryptanalysis:

●​ Focus: Uses linear approximations of encryption behavior.


●​ Method: Finds statistical biases in plaintext, ciphertext, and key bit relations.
●​ Goal: Recover key bits by leveraging these approximations.
●​ Target: Primarily block ciphers.

Key Differences:

●​ Approach: Differential cryptanalysis examines differences between plaintexts


and ciphertexts, while linear cryptanalysis uses linear algebra techniques.
●​ Analysis: Differential cryptanalysis observes change propagation; linear
cryptanalysis identifies statistical biases.
●​ Mathematical Basis: Differential cryptanalysis employs XOR differences,
whereas linear cryptanalysis uses correlation-based equations.

You might also like