Test I, CSCI 277, Spring 2022


  1. Vulnerability, Threat, Control
    1. [2 points each] Define each.
  2. C-I-A security triad.
    1. [2 points each] Name and describe the three components of this triad.
  3. Passwords
    1. [4 points] On many systems, a password is stored in a one-way hash. What does this mean and how can a password stored in such a hash be authenticated?
    2. [3 points] On many systems, a salt is added to a password to produce a password hash. What is the purpose of the salt?
    3. [4 points] Why is it important to not use the same password on many different systems? Your answer should include relevant information for this class, the book and labs.
  4. Access Control
    1. [3 points] At multiple points the book discusses access control. What is access control?
    2. [3 points] The book states that access policies frequently are, but should not be formed capriciously. Explain this statement.
  5. Symmetric vs Asymmetric Cipher systems.
    1. [2 points] What is the difference between a symmetric and an asymmetric encryption system?
    2. [5 points] Using the book's notation, show how to encrypt and decrypt a message in each. Make sure to label you notation as symmetric or asymmetric. In addition, explain all abbreviations used.
  6. Work Factor in encryption
    1. [3 points] Define work factor as it relates to cryptography.
    2. [3 points] Define an adequate encryption system as it relates to work factor.
  7. DES/AES
    1. [8 points] The DES encryption system, while still in use, has a number of problems, both technical and non-technical. Describe one technical and one non-technical problem with DES. How does AES overcome this each of these problems?