Tuesday 21 February 2017

mit4022 smu msc it winter 2016 (april/may 2017 exam) IVth sem assignment

Get fully solved assignment. Buy online from website
online store
or
plz drop a mail with your sub code
we will revert you within 2-3 hour or immediate
Charges rs 125/subject

 PROGRAM
Master of Science in Information Technology(MSc IT)Revised Fall
2011
SEMESTER
4
SUBJECT
MIT4022- Cryptography and Network SecurityCODE & NAME

Qus:1 Explain the different types of active security attacks.
Answer: Types of Threats (Attacks)
 Interception:
This type of threat occurs when an unauthorized party(outsider) has gained access. The outside party can be a person, a program, or a computing system. Examples of this type of failure are illicit copying of program or data files, or wiretapping to obtain data in a network. Although a loss may be discovered fairly quickly, a silent interceptor may leave no traces by which the interception



Qus:2 Define cryptography. Describe the different dimensions used to characterize the cryptographic systems.
Answer: Cryptography – secret writing – is the strongest tool for controlling against many kinds of security threats. Well-disguised data cannot be read, modified, or fabricated easily. Cryptography is rooted in higher mathematics: group and field theory, computational complexity,



Qus:3 Define the followings:
a) Asymmetric key
b) Public key certificate
c) Public key cryptographic algorithm
d) Public key infrastructure
Write the two main uses for public-key cryptography.
Answer: a) Asymmetric key
asymmetric keys come in pairs, one half of the pair can be exposed without compromising the other half. To see how, suppose S and R (our well-known sender and receiver) want to derive a shared symmetric key. Suppose also that S and R both have public keys for a common encryption algorithm; call these kPRIV-S, kPUB-S, kPRIV-R, and kPUB-R, for the private


Qus:4 Describe the following schemes for the distribution of public key:
a) Public announcement
b) Publicly available directory
Answer: a) Public announcement The cryptanalyst may be lucky enough to have some pairs of plaintext and matching ciphertext. Then, the game is to deduce the key by which those pairs were encrypted so that the same key can be used in cases in which the analyst has only the ciphertext. Although it might seem uncommon to be able to obtain matching plain- and

Qus:5 Define the following malicious software:
a) Backdoor
b) Logic Bomb
c) Trojan Horses
d) Mobile Code
e) Multiple-Threat Malware
Answer: a) Backdoor
A trapdoor or backdoor is a feature in a program by which someone can access the program other than by the obvious, direct call, perhaps with special privileges. For instance, an automated bank teller program might allow anyone entering the number 990099 on the keypad to process the log of everyone's transactions at that machine. In this example, the trapdoor could be intentional, for maintenance purposes, or it could be an illicit way for the implementer




Qus:6 Explain the following firewalls:
(a) Stateful Inspection firewalls
(b) Application level gateway
Answer: (a) Stateful Inspection firewalls
Filtering firewalls work on packets one at a time, accepting or rejecting each packet and moving on to the next. They have no concept of "state" or "context" from one packet to the next. A stateful inspection firewall maintains state information from one packet to another in the input stream.
One classic approach used by attackers is breaking an attack into multiple packets by forcing some

Get fully solved assignment. Buy online from website
online store
or
plz drop a mail with your sub code
we will revert you within 2-3 hour or immediate
Charges rs 125/subject



No comments:

Post a Comment