0% found this document useful (0 votes)
9 views1 page

IA2 Portion

The document outlines various topics related to digital security, including the role of digital signatures in electronic payments, the differences between private-key and public-key cryptography, and the use of hash functions like SHA-256 for password protection. It also covers steganography, biometric authentication, DNS spoofing, and different types of cyber attacks such as DoS and DDoS, along with prevention techniques. Additionally, it discusses password cracking techniques and the social engineering aspects of phishing and malware.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
9 views1 page

IA2 Portion

The document outlines various topics related to digital security, including the role of digital signatures in electronic payments, the differences between private-key and public-key cryptography, and the use of hash functions like SHA-256 for password protection. It also covers steganography, biometric authentication, DNS spoofing, and different types of cyber attacks such as DoS and DDoS, along with prevention techniques. Additionally, it discusses password cracking techniques and the social engineering aspects of phishing and malware.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 1

Module - 3

1. Explain the role of digital signatures in ensuring the security of electronic payments.
2. Differentiate private-key and public-key cryptography with real-world examples.
3. Demonstrate the use of a hash function (SHA-256) and its role in password
protection.
4. Explain the differences between MD5 and SHA-256 in terms of their structure, output
size, and general applications.
5. Explain steganography and its differences from encryption with practical examples.
6. Demonstrate biometric authentication and identify its strengths and limitations.
7. Explain the working principle of private-key and public-key cryptography. Provide
one real-time application scenario for each.
8. Demonstrate the use of a SHA-256 hash function on a sample input using any tool or
code (e.g., Python, OpenSSL). Explain its significance.
9. A company uses digital signatures for document verification. Explain the generation
and verification process with a neat labeled diagram.
10. Compare and contrast biometric authentication with password-based systems in terms
of security, usability, and implementation.

Module - 4
1. Describe the mechanism of DNS spoofing. How does it compromise user
confidentiality and trust?
2. Demonstrate a simulation of a DoS attack and propose methods for its detection and
mitigation.
3. Differentiate between DoS and DDoS attacks. What are the key prevention techniques
used against each?
4. Demonstrate a password cracking technique using a dictionary attack and discuss its
effectiveness.
5. Define phishing and malware. Discuss the social engineering techniques involved in
phishing.

You might also like