Tribhuwan University

Institute of Science and Technology

2080

Bachelor Level / Third Year / Fifth Semester / Science

Bachelors in Information Technology (BIT303)

(Information Security)

Full Marks: 60

Pass Marks: 24

Time: 3 Hours

Candidates are required to give their answers in their own words as for as practicable.

The figures in the margin indicate full marks.

Section A

Long Answers Questions

Attempt any TWO questions.
[2*10=20]
1.
Define Euler totient function with an example. Find the GCD of 12 and 32 using Extended Euclidean algorithm.[10]
2.
Describe the role of hash functions in authenticating message? How SHA - 1 algorithm is used to produce hash value of a message? Explain.[10]
3.
Distinguish between threats and attack. Discuss some computer security strategy. Assume a prime number 23 and 9 as its primitive root. Alice select a private key 5 and Bob select the private key 6. Now find the secret key value that Alice and Bob shared using Diffie - Hellman protocol.[10]
Section B

Short Answers Questions

Attempt any Eight questions.
[8*5=40]
4.
Discuss about two factor authentication with an example. [5]
5.
Explain the different types of access control principles. [5]
6.
Describe any two types of malicious software. [5]
7.
What is risk assessment? Describe the security auditing architecture. [5]
8.
Do cybercrime and computer crimes refers to same? Justify with relevant scenarios. [5]
9.
What do you mean by countermeasures for malwares? Discuss about audit trail analysis. [5]
10.
List some issues for user authentication. What is trust framework? [5]
11.
What is the role of digital signature in message authentication? List any two natures of zombies. [5]
12.
Write the algorithm for RSA key generation with encryption and decryption. [5]