Dear
students get fully solved assignments
Send
your semester & Specialization name to our mail id :
help.mbaassignments@gmail.com
or
call
us at : 08263069601
ASSIGNMENT
DRIVE
|
SPRING 2017
|
PROGRAM
|
BSc IT
|
SEMESTER
|
FIFTH
|
SUBJECT CODE & NAME
|
BT0088 - Cryptography and Network
Security
|
BK ID
|
B2069
|
CREDITS
|
4
|
MARKS
|
60
|
Note: Answer all questions. Kindly note
that answers for 10 marks questions should be approximately of 400 words. Each
question is followed by evaluation scheme.
Question.
1. What is the need for security?
Answer: Network Security is a branch of computer science that involves in
securing a computer network and network infrastructure devices to prevent
unauthorized access, data theft, network misuse, device and data modification.
Another function of Network Security is in preventing DoS (Denial of Service)
attacks and assuring continuous service for legitimate network users. Network
Security involves proactive defence methods and mechanisms to protect data,
network and network devices from external and internal threats.
Data is the most precious factor of today’s
businesses. Top
Question.
2. What do you understand by cryptography?
Answer: Cryptography is a method of storing and transmitting data in a
particular form so that only those for whom it is intended can read and process
it.
By submitting your personal information, you
agree that
Question.
3. What are intruders? (Explain in details).
Answer: We like to be able to use terms that the average person can relate to,
and therefore understand. And in network security there are a lot of terms that
are ambiguous.
Let’s start with the easy one. If I can gain
physical access to a data center without authorization, calling me an intruder
is correct. Physical security of a data center is a big deal and a lot of
companies hire ex-law enforcement to head that part of their overall
Question.
4. Write short note on Digital signature.
Answer: A digital signature is a mathematical scheme for demonstrating the
authenticity of digital messages or documents. A valid digital signature gives
a recipient reason to believe that the message was created by a known sender
(authentication), that the sender cannot deny having sent the message
(non-repudiation), and that the message was not altered in transit (integrity).
Digital signatures are a standard element of
most cryptographic protocol suites, and are commonly used for software
distribution, financial transactions, contract management software, and in
other cases where it is important to detect forgery or tampering.
Question.
5. Write short notes on DES.
Answer: The Data Encryption Standard
(DES) is a symmetric-key block cipher published by the National Institute of
Standards and Technology (NIST).
DES is an implementation of a
Feistel Cipher. It uses 16 round Feistel structure. The block size is 64-bit.
Though, key length is 64-bit, DES has an effective key
Question.
6. Give an overview of IP security.
Answer: In computing, Internet Protocol Security (IPsec) is a network protocol
suite that authenticates and encrypts the packets of data sent over a network.
IPsec includes protocols for establishing mutual authentication between agents
at the beginning of the session and negotiation of cryptographic keys for use
during the session. IPsec can protect data flows between a pair of hosts
(host-to-host), between a pair of security gateways (network-to-network), or
between a security gateway and a host (network-to-host). Internet Protocol
security (IPsec) uses cryptographic security services to protect communications
over Internet
Dear
students get fully solved assignments
Send
your semester & Specialization name to our mail id :
help.mbaassignments@gmail.com
or
call
us at : 08263069601
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.