Dear
students get fully solved SMU MBA Spring
2014 assignments
Send
your semester & Specialization name to our mail id :
“
help.mbaassignments@gmail.com ”
or
Call
us at : 08263069601
ASSIGNMENT
PROGRAM
|
MCA(REVISED FALL 2012)
|
SEMESTER
|
V
|
SUBJECT CODE & NAME
|
MCA5042- Cryptography and Network Security
|
CREDIT
|
4
|
BK ID
|
|
MAX.MARKS
|
60
|
Note:
Answer all questions. Kindly note that answers for 10 marks questions should be
approximately of 400 words. Each question is followed by evaluation scheme.
Q.1
Describes the stream and block encryption with their advantages and
disadvantages.
Answer:-
A stream cipher is a symmetric key cipher
where plaintext digits are combined with a pseudorandom cipher digit stream (key stream ). In a
stream cipher each plaintext digit is encrypted one at a time with the
corresponding digit of the key stream, to give a digit of the ciphertext
stream. An alternative name is a state cipher, as the encryption of each digit
is dependent on the current state. In practice, a digit is typically a bit and
the combining operation an exclusive-or (xor).
The pseudorandom key stream is typically
generated serially from a random seed value using digital shift registers. The
seed value serves as the
Q.2
Compare DES and AES algorithms.
Answer:
- DES (Data Encryption Standard) is a rather old
way of encrypting data so that the information could not be read by other
people who might be intercepting traffic. DES is rather quite old and has since
been replaced by a newer and better AES (Advanced Encryption Standard). The
replacement was done due to the inherent weaknesses in DES that allowed the
encryption to be broken using certain methods of attack. Common applications of
AES, as of the moment, are still impervious to any type of cracking techniques,
which makes it a good choice even
Q.3
Explain Developmental Controls and Administrative Controls.
Answer:-
Administrative controls are essential to achieve an
effective hearing loss prevention program. Engineering and administrative
controls represent the first two echelons in the NIOSH Hierarchy of Controls:
1) remove the hazard, 2) remove the worker. The use of these controls should
reduce hazardous exposure to the point where the risk to hearing is eliminated
or at least more manageable. Engineering controls are technologically feasible
for most noise sources but their economic feasibility must be determined on a
case-by-case basis. In some instances the application of a relatively simple
noise control solution reduces the hazard to the extent that the other elements
of the program, such as audiometric testing and the use of hearing
Q.4
List all the models of security and explain any two models.
Answer:
- A security policy is a document that expresses
clearly and concisely what the protection mechanisms are to achieve. It’s a
statement of the security we expect the system to enforce.
A
security model is a specification of a security policy:
·
It describes the entities
governed by the policy,
·
It states the rules that
constitute the policy.
There are various types of security models:
·
Models can capture policies for
confidentiality or for integrity.
·
Some models apply to
environments with
·
·
·
Q.5
Define and explain IP security. Explain IP security architecture.
Answer:
- Internet Protocol Security (IPSec) is a framework
of open standards for ensuring private, secure communications over Internet
Protocol (IP) networks, through the use of cryptographic security services.
IPSec supports network-level peer authentication, data origin authentication,
data integrity, data confidentiality (encryption), and replay protection. The
Microsoft implementation of IPSec is based on standards developed by the
Internet Engineering Task Force (IETF) IPSec working group.
Q.6
Describe guard and personal firewalls
Answer:
- Process-oriented BitGuard Personal Firewall is
designed to take care of these problems. The firewall is based upon totally new
principals but does still work in a way, which is easy to understand. BitGuard
Personal Firewall differs from other firewalls by being process-oriented: The
firewall monitors all processes being executed on the computer.
Firewalls guard
Dear
students get fully solved SMU MBA Spring
2014 assignments
Send
your semester & Specialization name to our mail id :
“
help.mbaassignments@gmail.com ”
or
Call
us at : 08263069601
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.