CS8792 CNS 2marks 16marks, CRYPTOGRAPHY AND NETWORK SECURITY Question Bank, CNS 7th Sem

0

CS8792 CNS 2marks

Anna University Regulation 2017 COMPUTER SCIENCE ENGINEERING CS8792 CNS 2marks & 16marks for all 5 units are provided below. CS8792 CNS Short answers, Question Bank for CRYPTOGRAPHY AND NETWORK SECURITY Engineering are listed down for students to make perfect utilization and score maximum marks with our study materials.

CS8792 CNS CRYPTOGRAPHY AND NETWORK SECURITY

1. Define cryptography
Cryptography is associated with the process of converting ordinary plain text into
unintelligible text and vice-versa. It is a method of storing and transmitting data in a
particular form so that only those for whom it is intended can read and process it.
Cryptography not only protects data from theft or alteration, but can also be used for user
authentication.
2. Define cryptanalysis.
Techniques used for deciphering a message without any knowledge of the enciphering
details fall into the area of cryptanalysis. Cryptanalysis is what the layperson calls
“breaking the code.”
3. Define security Attack, mechanism and service
• Security attack: Any action that compromises the security of information owned by an
organization.
• Security mechanism: A process (or a device incorporating such a process) that is
designed to detect, prevent, or recover from a security attack.
• Security service: A processing or communication service that enhances the security of
the data processing systems and the information transfers of an organization. The services
are intended to counter security attacks, and they make use of one or more security
mechanisms to provide the service.
4. Distinguish Threat and Attack
Threat -A potential for violation of security, which exists when there is a circumstance,
capability, action, or event that could breach security and cause harm. That is, a threat is a
possible danger that might exploit vulnerability.
Attack -An assault on system security that derives from an intelligent threat; that is, an
intelligent act that is a deliberate attempt (especially in the sense of a method or technique)
to evade security services and violate the security policy of a system.
5. Differentiate active attacks and passive attacks.
A passive attack attempts to learn or make use of information from the system but does not
affect system resources. Two types of passive attacks are the release of message contents
and traffic analysis.
An active attack attempts to alter system resources or affect their operation. It can be
subdivided into four categories: masquerade, replay, modification of messages, and denial
of service.
6. Specify the components of encryption algorithm
 Plaintext
 Encryption algorithm
 Secret key
 Cipher text
 Decryption algorithm
7. Describe security mechanism.
• Security mechanism: A process (or a device incorporating such a process) that is
designed to detect, prevent, or recover from a security attack.

CS8792 CNS Unit 1 2marks & 16marks – Download Here

CS8792 CNS Unit 2 2marks & 16marks – Download Here

CS8792 CNS Unit 3 2marks & 16marks – Download Here

CS8792 CNS Unit 4 2marks & 16marks – Download Here

CS8792 CNS All Units 2marks & 16marks – Download Here

If you require any other notes/study materials, you can comment in the below section.

Related Links

For CS8792 CNS Previous Year Question Papers – Click here

For CS8792 CNS Important Questions/Answer Key – Click here

For CS8792 CNS Lecture Handwritten Notes – Click here

Search Terms

CS8792 CNS 2marks

Anna University 7th Sem COMPUTER SCIENCE ENGINEERING CNS 2marks 16 marks

CS8792 CRYPTOGRAPHY AND NETWORK SECURITY Engineering question bank free download

Anna University COMPUTER SCIENCE ENGINEERING CNS short answers Regulation 2017

CS8792 2marks, CNS Unit wise short answers – COMPUTER SCIENCE ENGINEERING 7th Semester

Share.

Comments are closed.