You are on page 1of 2

Sinhgad Technical Education Society’s

SINHGAD INSTITUTE OF TECHNOLOGY


(Affiliated to Savitribai Phule Pune University, Pune and Approved by, AICTE, New Delhi.)
Gat No. 309/310 , Kusgaon (Bk), off Mumbai –Pune, Expressway.
Lonavala, Pune, 410401, Website : sit.sinhgad.edu
Department of E&TC Engineering

TE [HONOUR IN CYBER SECURITY]


Information and Cyber Security [310401] (2019 Pattern)
INSEM question bank AY 2023-24 (SEM-I)

1 What are the basic components in cyber security fundamaentals


1.firewall: barrier between comp and threat
2.antivrus software : delect and remove malicious software
3. passwords and authentication: ensure only authorized personel has access
4.encryption:
5. patch management: to keep system up to date
6. security policies and procedures: to guide behaviour and maintain security
7.intrusion detection system and prevention system : block prevent potential threat to security
8.security auditing: reguraly viewing and analysis logs and eventas
9.education and training:
10.physical security:

2 What are the different challenges in cyber security


. CYBER ATTACKS
. CONSTANT EVOLVINGF ATTACKS
. HUMAN ERRORS
. INSIDE THREATS
. LIMITED RESOURCES
. TECHNOLOGY COMPLEXITY
. RAPID TECHNOLOGICAL ADVANCEMENT
. CLOUD SECURITY
. SUPPLY CHAIN RISK
. INCIDENT REPONSE AND RECOVERY

3 Explain the different types of attacks in cyber security


MALWARE
PHISHING
RANSOMWARE
SOCIAL ENGINEERING
SQL INJECTION

4 Explain the terms Authenticity and Accountability


AUTHENTICITY:
.means ensuring something is genuine and real
.verify a person or system
.ex. you are proving to be rightful owner

ACCOUNTABILITY:
. taking responsibility of actions
. individual system can be traced back and held accountable for their actions

5 Explain the use of modular arithmetic in cyber security


. wrapping number aroung mathematical clock ofr encryption and hashing
.ENCRYPTION:
Microcontrollers TE[ETC]
It scrambles info in such way that it can only be unscramble using specific key
HASHING:
Create unique fingerprint for data
Modular arithmetic ensure hash value fall within range

6 Explain Classical encryption techniques

CAESAR CIPHER:
Each letter in plaintext is shifted place up or down
SUBSTITUTION CIPHER:
Each letter is replaced by another letter or number or symbol

7 Explain Visualize modulus with clocks in detail


8 Explain The Euclidean Algorithm with example
Divide larger number by smaller
Replace larger number by smaller and smaller by remainder

9 Explain Security Mechanisms in cyber security


10 ExplainThe Extendede Euclidean Algorithm with example
GCD(a,b) =ax + by
11 What is Access control matrix? Explain with example

Master list which specifies what can do what with certain resources in computer
F1 f2 f3
Alice read write -
Bob read - write
Carol - read write

12 Find the value of 8 mod 4=? By Visualize modulus with clocks


. Finding the remainder for 8 mod 4
. imagine clock faces (1,2,3,4)
. if you move 8 hours clockwise then you end up at 1 again

**Best Luck**

Dept Tel.:+91 2114-673360, Office :02114 673355 ,673356, Telefax: 02114-278304 email:hodmech.sit@sinhgad.edu

You might also like