Get fully
solved assignment. Buy online from website
online store
or
plz drop a mail
with your sub code
we will revert
you within 2-3 hour or immediate
Charges rs 125/subject
if urgent then call us on 08791490301, 08273413412
ASSIGNMENT
DRIVE
|
Summer 2017
|
PROGRAM
|
BSc IT
|
SEMESTER
|
FIFTH
|
SUBJECT CODE & NAME
|
BT0088, Cryptography and Network Security
|
BK ID
|
B2069
|
CREDITS
|
4
|
MARKS
|
60
|
Q.1.
What is the need for security? 10
Answer:-
Need
for security:-
Any part of a computing system can be the
target of a crime. When you refer to a computing system, it means a collection
of hardware, software, storage media, data, and people that an organization
uses to perform computing tasks. Sometimes, you can see that parts of a
computing system are not valuable to an outsider, but often it is mistaken. For
instance, we tend to think that the most valuable property in a bank is the
cash, gold, or silver in the vault. But in fact the customer information in the
bank's computer may be far more valuable. Stored on paper, recorded on a
storage medium, resident in
Q.2.What
do you understand by cryptography? 10
Answer:-
The word
cryptography comes from the Greek words kryptos meaning hidden and graphein
meaning writing. So cryptography is the study of hidden writing, or is the
science of encrypting and decrypting text. A fundamental rule in cryptography
is that one must assume that the cryptanalyst knows the methods used for
Q.3.What
are intruders? (Explain in details). 10
Answer:-
Computer security means keeping your
computer safe from virus and hacking of information from your computer while
you are online. For effective computer security, one should take care of
physical security measures to ensure that hardware and media are not stolen or
damaged, to minimise the risk and
Q.4.
Write short note on Digital signature. 4+6
Answer:-
Digital
signature:-
A digital signature is a protocol that
produces the same effect as a real signature: It is a mark that only the sender
can make, but other people can easily recognize as belonging to the sender.
Just like a real
Q.5.
Write short notes on DES. 10
Answer:-
Data
Encryption Standard (DES):-
The most widely used encryption scheme is
based on Data Encryption standard. Data Encryption Standard (DES), a system
developed for the U.S. government, was intended for use by the general public.
It has
Q.6.
Give an overview of IP security. 10
Answer:-
Overview
of IP security:-
IPSec provides connectionless, best-effort
delivery of datagrams through a network by protecting it from snooping or
modification. IPSec protects IP datagrams by defining a method of specifying
the traffic to protect, how that traffic is to be protected, and to whom the
traffic is sent. IPSec can protect packets between hosts, between network
security gateways, or between hosts and security gateways. Since an
Get fully
solved assignment. Buy online from website
online store
or
plz drop a mail
with your sub code
we will revert
you within 2-3 hour or immediate
Charges rs 125/subject
if urgent then call us on 08791490301, 08273413412
No comments:
Post a Comment