Question 1a describe the following security services

Assignment Help Computer Networking
Reference no: EM13348970

QUESTION 1

(a) Describe the following security services: Confidentiality, Availability

(b) Explain "Known Plaintext" attack?

(c) What do you understand by the terms "Playback", "Spoofing"?

(d) Distinguish between unconditional security and computational security

(e) Discuss two drawbacks of steganography

(f) Describe the operation of a Trojan Horse program. How can we protect our computer from such a program

QUESTION 2

(a) Give 3 examples of physiological or behavioral traits that can be used for biometrics

(b) Give 2 reasons why biometrics is not as popular as password based systems

(c) Assume two entities A and B want to communicate securely using symmetric encryption. Describe how secure key distribution can be achieved by using a trusted key distribution centre (KDC)

(d) What is the major weakness of key distribution using KDC. List 2 ways how this can be overcome

(e) Give 2 examples of modern block cipher other than DES

(f) Digital signature provides non-repudiation. Explain how this is done

(g) Give one example of a MAC algorithm and one example of a hash function

QUESTION 3

(a) Given the following two password policies, which one would you choose for more security. Justify your answer

  • A: only 8 letter passwords using only 26 letters (upper or lower case) or the 10 digits
  • B: only 6 letter passwords but from any of the 127 ASCII characters

(b) What is the advantage of using groups for access control?

(c) Describe the following threats to firewalls-

(I) Denial of service

(II) IP Spoofing and

What countermeasures can be adopted against these threats

(d) IPSec uses two protocols for security: Authentication protocol (AH) and the Encapsulated Security Header Protocol (ESP). Why is AH used with ESP although ESP provides some authentication?

(e) What is a Security Association (SA) and what does it define? Why are there two SAs per one connection? How can two communicating peers agree on what kind of SAs they use?

QUESTION 4

(a) List 3 schemes for email security

(b) Give an example of a symmetric encryption algorithm is used by PGP?

(c) What algorithm is used by PGP for email compatibility and why?

(d) SET allows the merchant to view only the order information and not to have access to the payment information. Similarly, the payment gateway gets access only to the payment information. Explain how this can be achieved using a dual signature and public key cryptography

Reference no: EM13348970

Questions Cloud

Question this data relates to the cash account in the : question this data relates to the cash account in the ledger of hawkins company.balance september 1-16400 cash
Question 1answer both partsa briefly describe the various : question 1answer both partsa briefly describe the various sources of law in mauritiusb do you agree that mauritius has
Question 1one touch camera phonesthe popularity of the : question 1one touch camera phonesthe popularity of the camera phone has been boosted by more people owning mobile
Question 1 a elaborate on the communication process model : question 1 a elaborate on the communication process model and explain sequentially through the use of this model the
Question 1a describe the following security services : question 1a describe the following security services confidentiality availabilityb explain known plaintext attack?c
Question 1in recent decades tourism has emerged as one of a : question 1in recent decades tourism has emerged as one of a small group of service industries that increasingly
Question 1a describe the term human resource planningb what : question 1a describe the term human resource planningb what are the aims amp objectives of human resource planningc is
Question1 a microprocessor is clocked at a rate of 5 ghza : question1. a microprocessor is clocked at a rate of 5 ghz.a. how long is a clock cycle?b. what is duration of a
Questionyou are asked to make an employee class with enough : questionyou are asked to make an employee class with enough numbers of data members to store employee data of following

Reviews

Write a Review

Computer Networking Questions & Answers

  Explaining the approaches to acknowledge packets

In second strategy, packets are not acknowledged individually, but the whole file is acknowledged when it arrives. Explain the two approaches.

  What is occurring and why bob now gets a reply

On June 10, 2013, Bob has no problem connecting to devices on Steve's network (everything appears to be working perfectly). When Bob tries to ping any device on Steve's network he gets "Request timed out". Explain what is going on.

  Explain ping sweeps and port scans

Your boss has just heard about some nefarious computer activities known as ping sweeps and port scans. He wishesto know more about them and what the impact of these activities might be on company.

  Explain graphic files were transmitted by a e-mail

Several graphic files were transmitted by a e-mail from the unknown source to suspect in the ongoing investigation. Lead investigator provides you these graphics files and tells you that at least four messages must  be embedded in them.

  Query and response for a complete dns query

Compare the time for a query and response for a complete DNS query and response (to all required nameservers) if M=1, M=2, and M=3.

  Problem in using database dictionary managed tablespaces

Write the explanation for why your tablespace might have problem, and write at least two actions you can take to decrease problem.

  What is the formula to calculate c/i

How is the interference problem identified in problem 1 usually solved? Explain how you know if the solution is adequate to fix the problem caused by the interference.

  What new technology benefits lan users the most

In your opinion, what new technology benefits LAN users the most? Why?

  Find the rfc which defines ftp protocol

Find the RFC that defines the FTP protocol. Take any non text file (e.g. word document, mpg, excel or any application centric file) Segmentation of a file and forming FTP datagrams: Read first 'x' number of bytes and use them as part of payload sect..

  Has this network been sub-netted

Assume a host computer has the following configuration: IP Address: 145.20.110.176 Subnet Mask: 255.255.0.0 Default Gateway: 145.20.1.1 a. What is the Class of this network?

  A sub-network design that needs of acme corporation

Acme Computing Corp. has remote sites in Port Clinton and Napoleon in addition to their main site in Toledo. There are currently 29 devices connected to the network in Toledo.

  Determine the throughput for file transfer

Assume Host A wishes to send large file to Host B. Path from Host A to Host B has three links, of rates R1=500kbps, R2=2Mbps, and R3=1Mbps. Suppose no other traffic in network, Determine the throughput for file transfer.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd