Briefly explain the contents of the needs analysis, Computer Network Security

Assignment Help:

QUESTION

(a) Briefly explain the contents of the Needs Analysis, which is step in the process of network design.

(b) Describe on the three ways of improving the performance of a network, with regards to Network Management.

(c) The ASN.1 specification language is an integral part of the OSI Reference Model architecture, and is used in protocols on the Internet. ASN.1 data objects are encoded for transmission using the Basic Encoding Rules. Provide an example of a transmitted byte-stream in hexadecimal by using the subsequent module of data type declarations and its corresponding instances:

Player ::= OCTET STRING, Age ::= INTEGER, Injured ::= BOOLEAN

{Player, "Paul Smith"}, {Age, 21}, {Injured, 0}

(d) Explain the keys used in the process of preparing a Digital Signature, stating the origin of the keys.

(e) Two important system performance parameters are: Reliability and Availability.

i.Determine the MTTR to the nearest hour of a system with an availability of 99% with an average of 3 failures per year.
ii. Determine the MTBF to the nearest hour if the reliability of a system needs to be 99.98% over 30 days.


Related Discussions:- Briefly explain the contents of the needs analysis

Describe the function of a tap in wmns, Question: (a) A Wireless Mesh N...

Question: (a) A Wireless Mesh Network (WMN) is a communications network made up of radio nodes organized in a mesh topology. i. Describe the function of a TAP in WMNs. ii.

Websphere administrator, Websphere Administrator: Working as Webspher...

Websphere Administrator: Working as Websphere Administrator in the department called DART (Database Architecture Re-Engineering and Tuning). The major responsibilities are t

Softbank theft of consumer data -information security, Example : Softbank –...

Example : Softbank – theft of consumer data for extortion Softbank of Japan offers broadband Internet services across Japan through 2 subsidiaries – Yahoo! BB and Softbank BB. I

Corresponding access control matrix, Consider a computer system with three ...

Consider a computer system with three users: Alice, Bob and Cindy. Alice owns the file alicerc, and Bob and Cindy can read it. Cindy can read and write the file bobrc, which Bob ow

Military and space technology, crack the secret message and explain how the...

crack the secret message and explain how the code works. The clue is that it has something to do with the computer keyboard. J-Q-H-6 Q-E-F-Q-H-D-3-W 8-H 5-Y-3 7-W-3 9-R--D-9-J

Address resolution with table lookup, ADDRESS RESOLUTION WITH TABLE LOOKUP ...

ADDRESS RESOLUTION WITH TABLE LOOKUP : Resolution needs data structure that has information about address binding. A distinct address-binding table is used for every physical n

Processing an incoming arp message, PROCESSING AN INCOMING ARP MESSAGE ...

PROCESSING AN INCOMING ARP MESSAGE When an ARP message reaches, the protocol specifies that the receiver must operate two basic steps. First the receiver finds the sender's add

Implement security measures, Problem (a) Give two reasons for companie...

Problem (a) Give two reasons for companies to implement security measures. (b) What is the regulatory expectation regarding i. healthcare information, ii. financial

Risk assessment, RISK ASSESSMENT Risk assessment is a step in a risk man...

RISK ASSESSMENT Risk assessment is a step in a risk management technique. Risk assessment is the determination of quantitative or qualitative value of risk related to a concrete

Briefly list functions of a public key infrastructure, Question: (a) Wh...

Question: (a) What is the major problem with public key encryption when compared to symmetric key encryption? (b) Consider the following protocol for communication between t

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd