History of Information Security


Choose an answer and hit 'next'. You will receive your score and answers at the end.

question 1 of 3

Encrypt the following message using a Caesar cipher with a shift of 7: ET TU BRUTE

Create Your Account To Take This Quiz

As a member, you'll also get unlimited access to over 79,000 lessons in math, English, science, history, and more. Plus, get practice tests, quizzes, and personalized coaching to help you succeed.

Try it risk-free
Try it risk-free for 30 days. Cancel anytime
Already registered? Log in here for access

1. You have just intercepted the following message from Caesar: L ORYH FOHRSDWUD. Can you guess what shift was used to encode the message?

2. What was the name of the cryptographic rotor machine used by the Germans in World War II?

Create your account to access this entire worksheet
A Premium account gives you access to all lesson, practice exams, quizzes & worksheets
Access to all video lessons
Quizzes, practice exams & worksheets
Certificate of Completion
Access to instructors
Create an account to get started Create Account

About This Quiz & Worksheet

You can use the worksheet and quiz to effectively assess your knowledge of the history of information security. For the quiz, key exchange and one-way function in cryptography are some terms you need to be familiar with.

Quiz & Worksheet Goals

Take the quiz to check your comprehension of:

  • Using a Caesar cipher with a shift of 7
  • Encoding messages
  • Meaning of key exchange
  • The cryptographic rotor machine used by the Germans in WWII
  • A one-way function in cryptography

Skills Practiced

  • Defining key concepts - ensure that you can accurately define main phrases, such as key exchange and one-way function
  • Information recall - access the knowledge you have gained about how to use a Caesar cipher with a shift of 7
  • Reading comprehension - ensure that you draw the most important information from the lesson on the history of information security

Additional Learning

If you are interested in learning more, have a look at the lesson called History of Information Security. Use this lesson to cover more about the following topics:

  • The meaning of information security
  • Importance of cryptography
  • Computer age
  • Current state of information security