Bachelors Level/Third Year/Fifth Semester/Science bit/fifth semester/information security/syllabus wise questions

Bachelors In Information Technology

Institute of Science and Technology, TU

Information Security (BIT303)

Year Asked: 2079, syllabus wise question

Access Control
1.
What is access control? Explain attribute based access control with example. [5]
IT Security Management, Risk Assessment and Security Auditing
1.
What is security risk assessment? What are different aspects of a successful security risk assessment? [5]
Legal and Ethical Issues
1.
Explain different ethical issues in computing? Explain RSA algorithm with suitable numerical example. [10]
Malicious Software
1.
Differentiate between virus, worm and Trojan horse. [5]
2.
What is Security threat and attack? Describe different types of attacks in brief. [5]
3.
Write Short Notes on: a. Phishing Attack b. Two Factor Authentication [5]
Message Authentication
1.
What is hash function? Describe how 128-bit of hash value is generated by taking an input message of variable size using MD5 algorithm? [10]
Symmetric and Asymmetric Encryption Algorithms
1.
What is symmetric cryptography? Explain round operation of DES algorithm. Describe Sub-Key generation process for DES rounds. [10]
2.
Decrypt the cipher text "CRHG" using the Hill cipher with the key matrix .

$\begin{bmatrix} 3 & 4 \\ 3 & 5 \end{bmatrix}$
[5]
3.
Define Euler Totient function. Determine whether 37 is Composite or not using Miller Rabin Primality testing. [5]
User Authentication
1.
Define authentication. How Biometric information can be used for authentication? [5]
2.
Explain Diffie Hellman Key Exchange Protocol with suitable example. [5]