Tuesday 12 September 2017

bt0088 smu bca summer 2017 (oct/nov 2017 exam) Vth sem assignment

Get fully solved assignment. Buy online from website
online store
or
plz drop a mail with your sub code
we will revert you within 2-3 hour or immediate
Charges rs 125/subject
if urgent then call us on 08791490301, 08273413412

ASSIGNMENT
DRIVE
Summer 2017
PROGRAM
BSc IT
SEMESTER
FIFTH
SUBJECT CODE & NAME
BT0088, Cryptography and Network Security
BK ID
B2069
CREDITS
4
MARKS
60

Q.1. What is the need for security? 10
Answer:-
Need for security:-
Any part of a computing system can be the target of a crime. When you refer to a computing system, it means a collection of hardware, software, storage media, data, and people that an organization uses to perform computing tasks. Sometimes, you can see that parts of a computing system are not valuable to an outsider, but often it is mistaken. For instance, we tend to think that the most valuable property in a bank is the cash, gold, or silver in the vault. But in fact the customer information in the bank's computer may be far more valuable. Stored on paper, recorded on a storage medium, resident in

Q.2.What do you understand by cryptography?                                                                               10
Answer:-
The word cryptography comes from the Greek words kryptos meaning hidden and graphein meaning writing. So cryptography is the study of hidden writing, or is the science of encrypting and decrypting text. A fundamental rule in cryptography is that one must assume that the cryptanalyst knows the methods used for


Q.3.What are intruders? (Explain in details). 10
Answer:-
Computer security means keeping your computer safe from virus and hacking of information from your computer while you are online. For effective computer security, one should take care of physical security measures to ensure that hardware and media are not stolen or damaged, to minimise the risk and


Q.4. Write short note on Digital signature. 4+6
Answer:-
Digital signature:-
A digital signature is a protocol that produces the same effect as a real signature: It is a mark that only the sender can make, but other people can easily recognize as belonging to the sender. Just like a real

Q.5. Write short notes on DES. 10
Answer:-
Data Encryption Standard (DES):-
The most widely used encryption scheme is based on Data Encryption standard. Data Encryption Standard (DES), a system developed for the U.S. government, was intended for use by the general public. It has

Q.6. Give an overview of IP security. 10
Answer:-
Overview of IP security:-
IPSec provides connectionless, best-effort delivery of datagrams through a network by protecting it from snooping or modification. IPSec protects IP datagrams by defining a method of specifying the traffic to protect, how that traffic is to be protected, and to whom the traffic is sent. IPSec can protect packets between hosts, between network security gateways, or between hosts and security gateways. Since an

Get fully solved assignment. Buy online from website
online store
or
plz drop a mail with your sub code
we will revert you within 2-3 hour or immediate
Charges rs 125/subject
if urgent then call us on 08791490301, 08273413412



No comments:

Post a Comment