Get
fully solved assignment. Buy online from website
online
store
or
plz
drop a mail with your sub code
we
will revert you within 2-3 hour or immediate
Charges
rs 125/subject
PROGRAM
Master of Science in Information
Technology(MSc IT)Revised Fall
2011
SEMESTER
4
SUBJECT
MIT4022- Cryptography and Network
SecurityCODE & NAME
Qus:1 Explain the different types of
active security attacks.
Answer: Types of Threats (Attacks)
Interception:
This type of threat occurs when an unauthorized
party(outsider) has gained access. The outside party can be a person, a
program, or a computing system. Examples of this type of failure are illicit
copying of program or data files, or wiretapping to obtain data in a network.
Although a loss may be discovered fairly quickly, a silent interceptor may
leave no traces by which the interception
Qus:2 Define
cryptography. Describe the different dimensions used to characterize the
cryptographic systems.
Answer: Cryptography – secret writing – is
the strongest tool for controlling against many kinds of security threats.
Well-disguised data cannot be read, modified, or fabricated easily.
Cryptography is rooted in higher mathematics: group and field theory, computational
complexity,
Qus:3 Define the followings:
a) Asymmetric key
b) Public key certificate
c) Public key cryptographic
algorithm
d) Public key infrastructure
Write the two main uses for
public-key cryptography.
Answer: a)
Asymmetric key
asymmetric keys come in pairs, one half of the pair can be
exposed without compromising the other half. To see how, suppose S and R (our
well-known sender and receiver) want to derive a shared symmetric key. Suppose
also that S and R both have public keys for a common encryption algorithm; call
these kPRIV-S, kPUB-S, kPRIV-R, and kPUB-R, for the private
Qus:4 Describe the following schemes
for the distribution of public key:
a) Public announcement
b) Publicly available directory
Answer: a)
Public announcement The
cryptanalyst may be lucky enough to have some pairs of plaintext and matching
ciphertext. Then, the game is to deduce the key by which those pairs were
encrypted so that the same key can be used in cases in which the analyst has
only the ciphertext. Although it might seem uncommon to be able to obtain
matching plain- and
Qus:5 Define the following malicious
software:
a) Backdoor
b) Logic Bomb
c) Trojan Horses
d) Mobile Code
e) Multiple-Threat Malware
Answer: a)
Backdoor
A trapdoor or backdoor is a feature in a program by which
someone can access the program other than by the obvious, direct call, perhaps
with special privileges. For instance, an automated bank teller program might
allow anyone entering the number 990099 on the keypad to process the log of
everyone's transactions at that machine. In this example, the trapdoor could be
intentional, for maintenance purposes, or it could be an illicit way for the
implementer
Qus:6 Explain the following
firewalls:
(a) Stateful Inspection firewalls
(b) Application level gateway
Answer: (a)
Stateful Inspection firewalls
Filtering firewalls work on packets one at a time, accepting
or rejecting each packet and moving on to the next. They have no concept of
"state" or "context" from one packet to the next. A
stateful inspection firewall maintains state information from one packet to
another in the input stream.
Get
fully solved assignment. Buy online from website
online
store
or
plz
drop a mail with your sub code
we
will revert you within 2-3 hour or immediate
Charges
rs 125/subject
No comments:
Post a Comment