Module - 3
1. Explain the role of digital signatures in ensuring the security of electronic payments.
2. Differentiate private-key and public-key cryptography with real-world examples.
3. Demonstrate the use of a hash function (SHA-256) and its role in password
protection.
4. Explain the differences between MD5 and SHA-256 in terms of their structure, output
size, and general applications.
5. Explain steganography and its differences from encryption with practical examples.
6. Demonstrate biometric authentication and identify its strengths and limitations.
7. Explain the working principle of private-key and public-key cryptography. Provide
one real-time application scenario for each.
8. Demonstrate the use of a SHA-256 hash function on a sample input using any tool or
code (e.g., Python, OpenSSL). Explain its significance.
9. A company uses digital signatures for document verification. Explain the generation
and verification process with a neat labeled diagram.
10. Compare and contrast biometric authentication with password-based systems in terms
of security, usability, and implementation.
Module - 4
1. Describe the mechanism of DNS spoofing. How does it compromise user
confidentiality and trust?
2. Demonstrate a simulation of a DoS attack and propose methods for its detection and
mitigation.
3. Differentiate between DoS and DDoS attacks. What are the key prevention techniques
used against each?
4. Demonstrate a password cracking technique using a dictionary attack and discuss its
effectiveness.
5. Define phishing and malware. Discuss the social engineering techniques involved in
phishing.