Dear
students get fully solved assignments
Send
your semester & Specialization name to our mail id :
“
help.mbaassignments@gmail.com ”
or
Call
us at : 08263069601
ASSIGNMENT
PROGRAM
|
Master
of Science in Information Technology(MSc IT)Revised Fall 2011
|
SEMESTER
|
4
|
SUBJECT
CODE & NAME
|
MIT4022- Network Security
|
CREDIT
|
4
|
BK
ID
|
BT0088
|
MAX.MARKS
|
60
|
Note: Answer all questions. Kindly
note that answers for 10 marks questions should be approximately of 400 words.
Each question is followed by evaluation scheme.
1 .Explain
Caesar’s Cipher encryption technique.
Answer:-
The Caesar cipher, also known as a shift cipher, is one of the simplest forms
of encryption. It is a substitution cipher where each character in the original
message (called the plaintext) is replaced with a letter that is some number of
positions down in the alphabet. Here’s a quick example using a shift amount of
one:
Q.2 Compare DES and AES
algorithms.
Answer:- DES (Data Encryption Standard) is a rather old way of encrypting
data so that the information could not be read by other people who might be
intercepting traffic. DES is rather quite old and has since been replaced by a
newer and better AES (Advanced Encryption Standard). The replacement was done
due to the inherent weaknesses in DES that allowed the encryption to be broken
using certain methods of attack. Common applications of AES, as of the moment,
are still impervious to any type of cracking techniques, which makes it a good
3. Explain Developmental
Controls and Administrative Controls for software development.
Answer:- ADMINISTRATIVE CONTROL At the end of the lecture student will be
able to:-Understand the concept of Administrative Accountability and
Control-Understand the types of internal accountability and external accountability
4. List all the models of
security and explain any two models for operating system security
Answer:- A computer security model is a scheme for specifying and enforcing
security policies. A security model may be founded upon a formal model of
access rights, a model of computation, a model of distributed computing, or no
particular theoretical grounding at all.
A security policy is a document that expresses clearly and
Q.5 Define and explain IP
security. Explain IP security architecture.
Answer: - IP Security Architecture
The purpose of the IP Security Architecture (IPSEC) is to provide a
standard security mechanism and services to the currently used IP version 4
(IPv4) and to the new IP version 6 (IPv6). It does this by specifying two
standard headers to be used with both versions of IP datagrams: "IP
Authentication Header" (AH) and "IP Encapsulating Security
Payload" (ESP) [2]. These two IP-layer mechanisms do not provide security
against traffic analysis and other
6. Describe guard and
personal firewalls
Answer: - Firewalls are an excellent tool for securing a network. A firewall
is system designed to prevent unauthorized access to or from a private network
and basically limits access to a network from another network. Firewall that
can be implemented in hardware or software, or a combination of both either
denies or allows outgoing traffic known as egress filtering or incoming traffic
known as ingress filtering.
Dear
students get fully solved assignments
Send
your semester & Specialization name to our mail id :
“
help.mbaassignments@gmail.com ”
or
Call
us at : 08263069601
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.