Monday 15 June 2015

mit4022 smu msc it Spring 2015 IVth sem assignment

Get fully solved assignment. Buy online from website
online store
or
plz drop a mail with your sub code
we will revert you within 2-3 hour or immediate
Charges rs 125/subject only.

PROGRAM Master of Science in Information Technology (MSc IT)Revised Fall 2011
SEMESTER 4
SUBJECT CODE &
NAME
MIT4022- Network Security

Qus:1 Explain Caesar’s Cipher encryption technique.
Answer:
Caesar’s Cipher encryption technique:
The Caesar cipher has an important place in history. Julius Caesar is said to have been the first to use this scheme, in which each letter is translated to a letter a fixed number of places after it in the alphabet. Caesar used a shift of 3, so that

Qus:2 Compare DES and AES algorithms.
Answer:
Compare DES and AES algorithms:

Qus:3 Explain Developmental Controls and Administrative Controls.
Answer:
Developmental Controls and Administrative Controls:
Developmental Controls:

Software development is often considered a solitary effort; a programmer sits with a specification or design and grinds out line after line of code. But in fact, software development is a collaborative


Qus:4 List all the models of security and explain any two models.
Answer:
The models of security:
·         Multilevel security
·         Lattice model of access security:
·         Bell–La Padula confidentiality model:
·         Biba integrity model:
Multilevel security:

Ideally, we want to build a model to represent a range of sensitivities and to reflect the need to separate subjects rigorously from objects to which they should not have access. For instance, consider an election and the sensitivity of data involved in the voting process. The names of the candidates are


Qus:5 Define and explain IP security. Explain its architecture.
Answer:
IP security:
IPSec provides connectionless, best-effort delivery of datagrams through a network by protecting it from snooping or modification. IPSec protects IP datagrams by defining a method of specifying the traffic to


Qus:6 Describe guard and personal firewalls.
Answer:
Guard and Personal firewalls:
Guard:
A guard is a sophisticated firewall. Like a proxy firewall, it receives protocol data units, interprets them, and passes through the same or different protocol data units that achieve either the same result or a modified result. The guard decides what services to perform on the user's behalf in accordance with

Get fully solved assignment. Buy online from website
online store
or
plz drop a mail with your sub code
we will revert you within 2-3 hour or immediate
Charges rs 125/subject only.



No comments:

Post a Comment