Get fully solved assignment. Buy online from website
online store
or
plz drop a mail with your sub code
we will revert you within 2-3 hour or immediate
Charges rs
125/subject and rs 625/semester only.
if urgent then call us on 08791490301, 08273413412
PROGRAM
Master of Science in Information Technology (BSc IT) SEMESTER 4
SUBJECT
CODE &
NAME
BT0088-
Cryptography and Network Security
Qus:1
Explain Caesar’s Cipher encryption technique.
Answer:
Caesar’s
Cipher encryption technique:
The Caesar cipher has
an important place in history. Julius Caesar is said to have been the first to
use this scheme, in which each letter is translated to a letter a fixed number
of places after it in the alphabet. Caesar used a shift of 3, so that plaintext
letter pi was enciphered as ciphertext letter ci by the rule A full
Qus:2
Compare DES and AES algorithms.
Answer:
Compare
DES and AES algorithms:
Qus:3
Explain Developmental Controls and Administrative Controls for software
development.
Answer:
Developmental
Controls and Administrative Controls:
Developmental
Controls:
Software
development is often considered a solitary effort; a programmer sits with a
specification or design and grinds out line after line of code. But in fact,
software development is a collaborative effort,
Qus:4
List all the models of security and explain any two models for operating system
security.
Answer:
The
models of security:
·
Multilevel security
·
Lattice
model of access security:
·
Bell–La
Padula confidentiality model:
·
Biba
integrity model:
Multilevel
security:
Ideally, we want
to build a model to represent a range of sensitivities and to reflect the need
to separate subjects rigorously from objects to which they should not have
access. For instance, consider an election and the sensitivity of data involved
in the voting process. The names of the candidates are probably not sensitive.
If the results have not yet been released, the name of the winner is somewhat
sensitive. If one candidate received an embarrassingly low number of votes, the
vote count may be more
Qus:5
Define and explain IP security. Explain its architecture.
Answer:
IP
security:
IPSec provides
connectionless, best-effort delivery of datagrams through a network by
protecting it from snooping or modification. IPSec protects IP datagrams by
defining a method of specifying the traffic to protect, how that traffic is to
be protected, and to whom the traffic is sent. IPSec can protect
Qus:6
Describe guard and personal firewalls.
Answer:
Guard
and Personal firewalls:
Guard:
A guard is a
sophisticated firewall. Like a proxy firewall, it receives protocol data units,
interprets them, and passes through the same or different protocol data units
that achieve either the same result or a modified result. The guard decides
what services to perform on the user's behalf in accordance with its
Get fully solved assignment. Buy online from website
online store
or
plz drop a mail with your sub code
we will revert you within 2-3 hour or immediate
Charges rs
125/subject and rs 625/semester only.
if urgent then call us on 08791490301, 08273413412
No comments:
Post a Comment