BT0088 - Cryptography and Network Security

Dear students get fully solved assignments
Send your semester & Specialization name to our mail id :
help.mbaassignments@gmail.com
or
call us at : 08263069601


ASSIGNMENT

DRIVE
SPRING 2017
PROGRAM
BSc IT
SEMESTER
FIFTH
SUBJECT CODE & NAME
BT0088 - Cryptography and Network Security
BK ID
B2069
CREDITS
4
MARKS
60


Note: Answer all questions. Kindly note that answers for 10 marks questions should be approximately of 400 words. Each question is followed by evaluation scheme.


Question. 1. What is the need for security?

Answer: Network Security is a branch of computer science that involves in securing a computer network and network infrastructure devices to prevent unauthorized access, data theft, network misuse, device and data modification. Another function of Network Security is in preventing DoS (Denial of Service) attacks and assuring continuous service for legitimate network users. Network Security involves proactive defence methods and mechanisms to protect data, network and network devices from external and internal threats.

Data is the most precious factor of today’s businesses. Top




Question. 2. What do you understand by cryptography?

Answer: Cryptography is a method of storing and transmitting data in a particular form so that only those for whom it is intended can read and process it.

By submitting your personal information, you agree that


Question. 3. What are intruders? (Explain in details).

Answer: We like to be able to use terms that the average person can relate to, and therefore understand. And in network security there are a lot of terms that are ambiguous.

Let’s start with the easy one. If I can gain physical access to a data center without authorization, calling me an intruder is correct. Physical security of a data center is a big deal and a lot of companies hire ex-law enforcement to head that part of their overall


Question. 4. Write short note on Digital signature.

Answer: A digital signature is a mathematical scheme for demonstrating the authenticity of digital messages or documents. A valid digital signature gives a recipient reason to believe that the message was created by a known sender (authentication), that the sender cannot deny having sent the message (non-repudiation), and that the message was not altered in transit (integrity).

Digital signatures are a standard element of most cryptographic protocol suites, and are commonly used for software distribution, financial transactions, contract management software, and in other cases where it is important to detect forgery or tampering.


Question. 5. Write short notes on DES.

Answer: The Data Encryption Standard (DES) is a symmetric-key block cipher published by the National Institute of Standards and Technology (NIST).

DES is an implementation of a Feistel Cipher. It uses 16 round Feistel structure. The block size is 64-bit. Though, key length is 64-bit, DES has an effective key


Question. 6. Give an overview of IP security.

Answer: In computing, Internet Protocol Security (IPsec) is a network protocol suite that authenticates and encrypts the packets of data sent over a network. IPsec includes protocols for establishing mutual authentication between agents at the beginning of the session and negotiation of cryptographic keys for use during the session. IPsec can protect data flows between a pair of hosts (host-to-host), between a pair of security gateways (network-to-network), or between a security gateway and a host (network-to-host). Internet Protocol security (IPsec) uses cryptographic security services to protect communications over Internet

Dear students get fully solved assignments
Send your semester & Specialization name to our mail id :
help.mbaassignments@gmail.com
or
call us at : 08263069601


No comments:

Post a Comment

Note: Only a member of this blog may post a comment.