SlideShare a Scribd company logo
CYBER SECURITY LAB PROGRAMS
1. Write a program in python/ Java/ Scala/ C++/ HTML5 to implement password data encryption.
Use encryption method overloading (any to methods studied).
2. A message is to be transmitted using network resources from one machine to another calculate
and demonstrate the use of a Hash value equivalent to SHA-1. Develop peogram in C+
+/Python/Scala/Java using Eclipse
3. Write a program to generate a pseudorandom number generator for generating the long-term
private key and the ephemeral keys used for each signing based on SHA-1 using Python/Java/C+
+. Disregard the use of existing pseudorandom number generators available.
4. Write a program to produce a DSA signature using parameter tuple¡p,q,g¿, long term key pair
and a message digest.
5. Write a Python/ Java program to validate the parameter tuple for the security of the DSA.
Design necessary classes. Use Miller-Rabin primality testing may be used.
6. Write a program in Python/ Java/ C++ /Scala using Eclipse to Start/Stop the IDS, View current
traffic, View blocked list (IP, Domains), view current firewall rules and unblock users. Create
Necessary GUI.

More Related Content

PDF
Tools Hacking
PPTX
Distributed tracing
PDF
Distributed Tracing
PDF
Distributed Tracing
PPTX
Shhh!: Secret Management Practices for Infrastructure as Code
PDF
A survey on detection of website phishing using mcac technique
PPT
Cipher techniques
PDF
resumePdf
Tools Hacking
Distributed tracing
Distributed Tracing
Distributed Tracing
Shhh!: Secret Management Practices for Infrastructure as Code
A survey on detection of website phishing using mcac technique
Cipher techniques
resumePdf

Similar to Cyber security programs (20)

PDF
Sambhab_Mohapatra
DOCX
FBI & Secret Service- Business Email Compromise Workshop
PDF
TripathiAkriti_resume
DOCX
Lab 7 manual.docx Of Information security for students
PDF
Demystify Information Security & Threats for Data-Driven Platforms With Cheta...
DOCX
sudipto_resume
PDF
Abhilash Owk - Resume
DOCX
CCS354 Network Security Manual ...(1).docx
PDF
Perfomatix - NodeJS Coding Standards
PPTX
Making Security Agile
DOCX
kumarResume
PPTX
Crypto failures every developer should avoid
PPTX
Crypto failures every developer should avoid
DOCX
FBI & Secret Service- Business Email Compromise Workshop
PDF
ChongLiu-MaliciousURLDetection
DOCX
Raju ponnam CV
PPTX
AppSec California 2016 - Making Security Agile
PPTX
Why meteor
PPTX
(Don't) Go Tracing Server Calls
PPTX
Hunting for APT in network logs workshop presentation
Sambhab_Mohapatra
FBI & Secret Service- Business Email Compromise Workshop
TripathiAkriti_resume
Lab 7 manual.docx Of Information security for students
Demystify Information Security & Threats for Data-Driven Platforms With Cheta...
sudipto_resume
Abhilash Owk - Resume
CCS354 Network Security Manual ...(1).docx
Perfomatix - NodeJS Coding Standards
Making Security Agile
kumarResume
Crypto failures every developer should avoid
Crypto failures every developer should avoid
FBI & Secret Service- Business Email Compromise Workshop
ChongLiu-MaliciousURLDetection
Raju ponnam CV
AppSec California 2016 - Making Security Agile
Why meteor
(Don't) Go Tracing Server Calls
Hunting for APT in network logs workshop presentation
Ad

Recently uploaded (20)

PPTX
IB Computer Science - Internal Assessment.pptx
PDF
Fluorescence-microscope_Botany_detailed content
PDF
22.Patil - Early prediction of Alzheimer’s disease using convolutional neural...
PPTX
Acceptance and paychological effects of mandatory extra coach I classes.pptx
PPTX
STERILIZATION AND DISINFECTION-1.ppthhhbx
PPTX
Introduction to Basics of Ethical Hacking and Penetration Testing -Unit No. 1...
PDF
Clinical guidelines as a resource for EBP(1).pdf
PPTX
Computer network topology notes for revision
PPTX
Business Ppt On Nestle.pptx huunnnhhgfvu
PPTX
Supervised vs unsupervised machine learning algorithms
PPT
Quality review (1)_presentation of this 21
PPTX
Microsoft-Fabric-Unifying-Analytics-for-the-Modern-Enterprise Solution.pptx
PPTX
DISORDERS OF THE LIVER, GALLBLADDER AND PANCREASE (1).pptx
PPTX
Database Infoormation System (DBIS).pptx
PDF
Galatica Smart Energy Infrastructure Startup Pitch Deck
PPTX
climate analysis of Dhaka ,Banglades.pptx
PPT
ISS -ESG Data flows What is ESG and HowHow
PPTX
Introduction to Firewall Analytics - Interfirewall and Transfirewall.pptx
PPTX
Introduction to machine learning and Linear Models
PPTX
SAP 2 completion done . PRESENTATION.pptx
IB Computer Science - Internal Assessment.pptx
Fluorescence-microscope_Botany_detailed content
22.Patil - Early prediction of Alzheimer’s disease using convolutional neural...
Acceptance and paychological effects of mandatory extra coach I classes.pptx
STERILIZATION AND DISINFECTION-1.ppthhhbx
Introduction to Basics of Ethical Hacking and Penetration Testing -Unit No. 1...
Clinical guidelines as a resource for EBP(1).pdf
Computer network topology notes for revision
Business Ppt On Nestle.pptx huunnnhhgfvu
Supervised vs unsupervised machine learning algorithms
Quality review (1)_presentation of this 21
Microsoft-Fabric-Unifying-Analytics-for-the-Modern-Enterprise Solution.pptx
DISORDERS OF THE LIVER, GALLBLADDER AND PANCREASE (1).pptx
Database Infoormation System (DBIS).pptx
Galatica Smart Energy Infrastructure Startup Pitch Deck
climate analysis of Dhaka ,Banglades.pptx
ISS -ESG Data flows What is ESG and HowHow
Introduction to Firewall Analytics - Interfirewall and Transfirewall.pptx
Introduction to machine learning and Linear Models
SAP 2 completion done . PRESENTATION.pptx
Ad

Cyber security programs

  • 1. CYBER SECURITY LAB PROGRAMS 1. Write a program in python/ Java/ Scala/ C++/ HTML5 to implement password data encryption. Use encryption method overloading (any to methods studied). 2. A message is to be transmitted using network resources from one machine to another calculate and demonstrate the use of a Hash value equivalent to SHA-1. Develop peogram in C+ +/Python/Scala/Java using Eclipse 3. Write a program to generate a pseudorandom number generator for generating the long-term private key and the ephemeral keys used for each signing based on SHA-1 using Python/Java/C+ +. Disregard the use of existing pseudorandom number generators available. 4. Write a program to produce a DSA signature using parameter tuple¡p,q,g¿, long term key pair and a message digest. 5. Write a Python/ Java program to validate the parameter tuple for the security of the DSA. Design necessary classes. Use Miller-Rabin primality testing may be used. 6. Write a program in Python/ Java/ C++ /Scala using Eclipse to Start/Stop the IDS, View current traffic, View blocked list (IP, Domains), view current firewall rules and unblock users. Create Necessary GUI.