Dear
students get fully solved assignments
Send
your semester & Specialization name to our mail id :
“
help.mbaassignments@gmail.com ”
or
Call
us at : 08263069601
(Prefer
mailing. Call in emergency )
ASSIGNMENT
PROGRAM
|
BSc
|
SEMESTER
|
V
|
SUBJECT
CODE & NAME
|
Cryptography and Network Security
|
CREDIT
|
4
|
BK
ID
|
BT0088
|
MAX.MARKS
|
60
|
Note: Answer all questions. Kindly
note that answers for 10 marks questions should be approximately of 400 words.
Each question is followed by evaluation scheme.
Q.1 Describe the stream
and block encryption with their advantages and disadvantages.
Answer:- While both are symmetric ciphers, stream ciphers are based on
generating an "infinite" cryptograpic keystream, and using that to
encrypt one bit or byte at a time (similar to the one-time pad), whereas block
ciphers work on larger chunks of data (i.e. blocks) at a time, often combining
blocks for additional security (e.g. AES in CBC mode).
Q.2 Compare DES and AES
algorithms.
Answer:- DES (Data Encryption Standard) is a rather old way of encrypting
data so that the information could not be read by other people who might be
intercepting traffic. DES is rather quite old and has since been replaced by a
newer and better AES (Advanced Encryption Standard). The replacement was done
due to the inherent weaknesses in DES that allowed the encryption to be broken
using certain methods of attack. Common applications of AES, as of
Q.3 Explain Developmental
Controls and Administrative Controls.
Answer:- ADMINISTRATIVE CONTROL At the end of the lecture student will be
able to:-Understand the concept of Administrative Accountability and
Control-Understand the types of internal accountability and external accountability
Administrative AccountabilityAccording to Leonard D. White accountability is
`the sum total of constitutional, statutory
Q.4 List all the models of
security and explain any two models.
Answer:- A computer security model is a scheme for specifying and enforcing
security policies. A security model may be founded upon a formal model of
access rights, a model of computation, a model of distributed computing, or no
particular theoretical grounding at all.
A security policy is a document that expresses clearly and concisely
what the protection mechanisms are to achieve. Its a statement of the security
we expect the
Q.5 Define and explain IP
security. Explain IP security architecture.
Answer: - IP Security Architecture
The purpose of the IP Security Architecture (IPSEC) is to provide a
standard security mechanism and services to the currently used IP version 4
(IPv4) and to the new IP version 6 (IPv6). It does this by specifying two
standard headers to be used with both versions of IP datagrams: "IP
Authentication Header" (AH) and "IP Encapsulating Security Payload"
(ESP
6 Describe guard and
personal firewalls
Answer: - Firewalls are an excellent tool for securing a network. A firewall
is system designed to prevent unauthorized access to or from a private network
and basically limits access to a network from another network. Firewall that
can be implemented in hardware or software, or a combination of both either
denies or allows outgoing traffic known as egress filtering or incoming traffic
known as ingress filtering.
Dear
students get fully solved assignments
Send
your semester & Specialization name to our mail id :
“
help.mbaassignments@gmail.com ”
or
Call
us at : 08263069601
(Prefer
mailing. Call in emergency )
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.