Security attacks

Name
Haider Abbas
Reg No
2018-kiu-5495
Date
12/10/2020
Department
BS IT 4th
Course
Information Security
Q # 1 Answer the following Question
1. What are the types of security attacks?
Answer: A security attack is an unauthorized attempt to steal, damage, or
expose data from an information system such as your website. Malicious
hackers can go about this in a variety of ways, including the ones listed
below. There are many types of security attacks some are following.
1. Malware,
2. Drive-by downloads
3. Phishing
2. Describe authentication factors in details
Answer: Authentication is the process of recognizing a user’s identity. It is the
mechanism of associating an incoming request with a set of identifying credentials.
The credentials provided are compared to those on a file in a database of the
authorized user’s information on a local operating system or within an authentication
server. Authentication process can be described in two distinct phases
1. Identification
2. Actual
Identification
Identification phase provides a user identity to the security system. This
identity is provided in the form of a user ID. The security system will
search all the abstract objects that it knows and find the specific one of
which the actual user is currently applying. Once this is done, the user has
been identified. The fact that the user claims does not necessarily mean
that this is true.
Actual
An actual user can be mapped to other abstract user object in the system,
and therefore be granted rights and permissions to the user and user must
give evidence to prove his identity to the system. The process of
determining claimed user identity by checking user-provided evidence is
called authentication and the evidence which is provided by the user
during process of authentication is called a credential.
3. Discuss Access Control and Its types.
Answer: Access control is a method of guaranteeing that users are who
they say they are and that they have the appropriate access to company
data. There are three types of access control
1. Mandatory Access Control (MAC)
2. Role-Based Access Control (RBAC)
3. Discretionary Access Control (DAC)
4. Define Fail-Safe Principal?
Answer: A control operation or function that prevents improper system functioning
or catastrophic degradation in the event of a failure within the system or in the
event of an operator error. The capability of a device to fail without creating
danger to operating personnel, to itself, or to other devices.
5. Explain Vegenere Cipher.
Answer: Vigenere cipher is a poly-alphabetic substitution system that use
a key and a double-entry table.
In order to cipher a text, take the first letter of the message and the first
letter of the key, add their value (letters have a value depending on their rank
in the alphabet, starting with 0). The result of the addition modulo 26 (26=the
number of letter in the alphabet) gives the rank of the ciphered letter.
6. Encrypt Plaintext “Defend the east wall of the castle” using Caesar cipher.
Answer:
Plaintext: Defend the wall of the castle.
Cipher Text: Ghihqg wkh hdvw zdoo ri wkh fdvwoh
Q # 2. Solve the following Question.
1. Consider the following: Plaintext: “PROTOCOL” Secret key: “NETWORK”
What is the corresponding cipher text using play fair cipher method?
Answer:
Plane text: PROTOCOL
Key: NETWORK
Cipher Text: LANWCINS
2. Construct a table for the Keyword “Warning” and encrypt the following
message (Plaintext) “Hide yourself as soon as possible” using play-fair
Cipher.
Answer:
W
A
R
N
I
G
B
C
D
E
F
K
H
L
M
O
P
Q
S
T
U
V
X
Y
Z
KEY WORD: WARNING
PLAINE TEXT: HIDE YOURSELF AS SOON AS
POSSIBLE
CIPHER TEXT: MAEG USXWTDMH NP TPSW NP QPQYTNDHCZ
3. Encrypt the Plaintext HELLO with Key XMCKL using one-time pad cipher.
ANSWER:
Cipher Text: Eqnvz
4. What are the characteristics of Auto Key Cipher? Take a plaintext os your
choice and encrypt by using Auto Key Cipher.
Answer:
Characteristics of auto key cipher
600/5 = 120 characters will be encrypted with each alphabet. If someone attacks
our cipher and is able to determine the length of the keyword, they can strip the.
Plane text: go in side
Key word: attention
Cipher text: gh br fbl
The end.

Calculate the price
Make an order in advance and get the best price
Pages (550 words)
$0.00
*Price with a welcome 15% discount applied.
Pro tip: If you want to save more money and pay the lowest price, you need to set a more extended deadline.
We know how difficult it is to be a student these days. That's why our prices are one of the most affordable on the market, and there are no hidden fees.

Instead, we offer bonuses, discounts, and free services to make your experience outstanding.
How it works
Receive a 100% original paper that will pass Turnitin from a top essay writing service
step 1
Upload your instructions
Fill out the order form and provide paper details. You can even attach screenshots or add additional instructions later. If something is not clear or missing, the writer will contact you for clarification.
Pro service tips
How to get the most out of your experience with StudyAcademia.com
One writer throughout the entire course
If you like the writer, you can hire them again. Just copy & paste their ID on the order form ("Preferred Writer's ID" field). This way, your vocabulary will be uniform, and the writer will be aware of your needs.
The same paper from different writers
You can order essay or any other work from two different writers to choose the best one or give another version to a friend. This can be done through the add-on "Same paper from another writer."
Copy of sources used by the writer
Our college essay writers work with ScienceDirect and other databases. They can send you articles or materials used in PDF or through screenshots. Just tick the "Copy of sources" field on the order form.
Testimonials
See why 20k+ students have chosen us as their sole writing assistance provider
Check out the latest reviews and opinions submitted by real customers worldwide and make an informed decision.
11,595
Customer reviews in total
96%
Current satisfaction rate
3 pages
Average paper length
37%
Customers referred by a friend
OUR GIFT TO YOU
15% OFF your first order
Use a coupon FIRST15 and enjoy expert help with any task at the most affordable price.
Claim my 15% OFF Order in Chat