Get fully
solved assignment. Buy online from website
online store
or
plz drop a mail
with your sub code
we will revert
you within 2-3 hour or immediate
Charges rs 125/subject
if urgent then call us on 08791490301, 08273413412
DRIVE
FALL 2016
PROGRAM
Master of Science in Information Technology(MSc IT)
SEMESTER
FOURTH
SUBJECT CODE & NAME
MIT4022- Network Security
Qus:1 (a)Explain the requirement for network
security.
(b)Differentiate among vulnerability, threat, and
control.
Answer:Explain the requirement for
network security
Computer
security is required because many organizations will be damaged by hostile
software or intruders. There may be several forms of damage, which are
obviously interrelated. These include:
Qus:2 Explain the following terms:
i) encryption ii) cryptanalysis iii) Breakable
Encryption.
Answer: i) encryption
There
are many kinds of encryption, including many techniques beyond those we discuss
in this book. Suppose you have text to encrypt, how do you choose an encryption
algorithm for a particular application? To answer this question, reconsider
what we have learned so far about
Qus:3 What are the different ways in which an
operating system can assist or offer protection?
Answer: Separating
one user’s object from the other is the basic way of protection. Separation in
an operating system can occur in several ways.
Logical separation:
In
which users operate under the illusion that no other processes exist, as when
an operating system
Qus:4 Explain the followings:
(a) Security Association.
(b) Internet Key Exchange.
Answer: Security Association (SA)
In
order to communicate each pair of hosts using IPSec, it must establish security
association with one another. The security association connects the security
services and a key, with the traffic to be protected, and the remote peer with
whom IPSec traffic is being exchanged. The security association that applies to
a given IPSec header is determined by the packets
Qus:5 Explain the followings:
(a) Processing of Encrypted E-Mail
(b) Various forms of integrity for secure e-mail
Answer: (a) Processing of
Encrypted E-Mail
Let
us now look at how to provide confidentiality enhancements. The sender chooses
a (random) symmetric algorithm encryption key. Then, the sender encrypts a copy
of the entire message to be transmitted, including FROM: TO: SUBJECT: and DATE:
headers. Next, the
Qus:6 (a) Explain planning security policies.
(b)Write the characteristics of a good security
policy.
Answer:
Planning Security Policies
In a
computing system, the security plan identifies and organizes the security
activities. The plan is both a description of the current situation and a plan
for improvement. Every security plan must
Get fully
solved assignment. Buy online from website
online store
or
plz drop a mail
with your sub code
we will revert
you within 2-3 hour or immediate
Charges rs 125/subject
if urgent then call us on 08791490301, 08273413412
No comments:
Post a Comment