Thursday 15 December 2016

mit4022 smu msc it fall 2016 (jan/feb 2017 exam) IVth sem assignment

Get fully solved assignment. Buy online from website
online store
or
plz drop a mail with your sub code
we will revert you within 2-3 hour or immediate
Charges rs 125/subject
if urgent then call us on 08791490301, 08273413412

DRIVE
FALL 2016
PROGRAM
Master of Science in Information Technology(MSc IT)
SEMESTER
FOURTH
SUBJECT CODE & NAME
MIT4022- Network Security
Qus:1 (a)Explain the requirement for network security.
(b)Differentiate among vulnerability, threat, and control.
Answer:Explain the requirement for network security
Computer security is required because many organizations will be damaged by hostile software or intruders. There may be several forms of damage, which are obviously interrelated. These include:

Qus:2 Explain the following terms:
i) encryption ii) cryptanalysis iii) Breakable Encryption.
Answer: i) encryption
There are many kinds of encryption, including many techniques beyond those we discuss in this book. Suppose you have text to encrypt, how do you choose an encryption algorithm for a particular application? To answer this question, reconsider what we have learned so far about


Qus:3 What are the different ways in which an operating system can assist or offer protection?
Answer: Separating one user’s object from the other is the basic way of protection. Separation in an operating system can occur in several ways.
 Logical separation:
In which users operate under the illusion that no other processes exist, as when an operating system


Qus:4 Explain the followings:
(a) Security Association.
(b) Internet Key Exchange.
Answer: Security Association (SA)
In order to communicate each pair of hosts using IPSec, it must establish security association with one another. The security association connects the security services and a key, with the traffic to be protected, and the remote peer with whom IPSec traffic is being exchanged. The security association that applies to a given IPSec header is determined by the packets


Qus:5 Explain the followings:
(a) Processing of Encrypted E-Mail
(b) Various forms of integrity for secure e-mail
Answer: (a) Processing of Encrypted E-Mail
Let us now look at how to provide confidentiality enhancements. The sender chooses a (random) symmetric algorithm encryption key. Then, the sender encrypts a copy of the entire message to be transmitted, including FROM: TO: SUBJECT: and DATE: headers. Next, the

Qus:6 (a) Explain planning security policies.
(b)Write the characteristics of a good security policy.
Answer:
Planning Security Policies
In a computing system, the security plan identifies and organizes the security activities. The plan is both a description of the current situation and a plan for improvement. Every security plan must

Get fully solved assignment. Buy online from website
online store
or
plz drop a mail with your sub code
we will revert you within 2-3 hour or immediate
Charges rs 125/subject
if urgent then call us on 08791490301, 08273413412



No comments:

Post a Comment