Tutorial-1
1. What is security attack? Explain active attacks and passive attacks? 2. Explain objectives of Information Security. 3. Distinguish among vulnerability, threat, and control 4. Preserving confidentiality, integrity, and availability of data is a restatement of the concern over interruption, interception, modification, and fabrication. How do the first three concepts relate to the last four? That is, is any of the four equivalent to one or more of the three? Is one of the three encompassed by one or more of the four? 5. Describe an example of data whose confidentiality has a short timeliness, say, a day or less. Describe an example of data whose confidentiality has a timeliness of more than a year. 6. Consider a program that allows consumers to order products from the web. Who might want to attack the program? What types of harm might they want to cause? What kinds of vulnerabilities might they exploit to cause harm?
Tutorial-2
1. What is the difference between a block cipher and a stream cipher?
2. What is the difference between a monoalphabetic cipher and a polyalphabetic cipher?
3. A ciphertext has been generated with an affine cipher. The most frequent letter of the ciphertext is 'B', and the second most frequent letter of the ciphertext is 'U'. Break this code.
4. When the PT-109 American patrol boat, under the command of Lieutenant John F. Kennedy, was sunk by a Japanese destroyer, a message was received at an Australian wireless station in Playfair code: KXJEY UREBE ZWEHE WRYTU HEYFS KREHE GOYFI WTTTU OLKSY CAJPO BOTEI ZONTX BYBNT GONEY CUZWR GDSON SXBOU YWRHE BAAHY USEDQ The key used was royal new zealand navy. Decrypt the message. Translate TT into tt.
5. Using the Vigenère cipher, encrypt the word "explanation" using the key leg.
6. Encrypt the message "meet me at the