You are on page 1of 1

CCS 3402 COMPU SECURITY AND CRYPTOGRAPHY

MAKEUP CAT
1. Explain the following classes of attacks on computer systems. For each state a suitable
exaple.
i. Known key attack
ii. Known plaintext attack
iii. Choosen ciphertext attack. [3 Marks]
2. Distinguish between digital certificates and encryption and briefly explain how they can be
used to improve computer security. [3 Marks]

3. Explain three main models used to evaluate security of computer systems.


[3 Marks]
4. Explain any controls that can be used to protect database systems in order to maintain data
integrity. [3 Marks]
5. Distinguish between active and passive wiretapping. Show where each can be applied.
[4 Marks]

6. Explain how the HILL cipher algorithm works. You may use the plaintext PLAY to and the
key SECRET to show its encipherment procedure. [5 Marks]

7. Distinguish between provable and unconditional security as models for evaluating security.
[3 Marks]

You might also like