Question 1a sort out each of the following as a violation

Assignment Help Computer Networking
Reference no: EM13349372

QUESTION 1

(a) Sort out each of the following as a violation of privacy, integrity, and ease of use, authenticity or some grouping of these:

I. Paul copies Sam's homework

II. Simon crashes Rita's system

III. Wayne changes the amount of Lee's cheque from $100 to $1000

(b) (i) Describe the following:

A. Logic bombs

B. War dialing?

(ii) Express how war dialling is executed.

(c) (i) What are buffer overflows?

(ii) Elucidate how ‘Ping of death' attack is achieved.

(d) (I) Talk about three methods by which passwords based systems can be attacked

(II) Present at least one system of defense against each of the method you have identified at (I) above.

(e) Distinguish between Discretionary and Mandatory Access Control.

(f) Give three causes why Biometrics is not as popular as passwords based system.

(g) What is steganography?

List two drawbacks of steganography.

QUESTION 2

(a) (I) In the RSA scheme of public key cryptography what should conclude the length of key and the maximum length of a message block?

(II) If a key length of 512 bits is chosen and the message is 400 bits long. What will be the length of the resulting cipher text block?

(b)(I)Elucidate why the number 3 is a popular choice of public key exponent in RSA algorithm.

(II) In what circumstances it would be impossible to use 3 as RSA public key exponent?

(III) Elucidate why RSA digital signatures are used to sign a Message Digest instead of the message itself.

(IV) What advantages does a digital signature created by a public cryptographic system have over a MAC created by a secretkey algorithm and a shared key?

(c) In a simple demonstration of the impression of RSA digital signatures, it was decided to use either the pair of small primes 23 and 29 or 19 and 23 as p and q where the public key modulus is n = p x q. Show that if a public key exponent of 3 is to be used in the demonstration, then 23 and 29 must be used for p and q.

(d) In a public key infrastructure explain what is meant by the subsequent:

(I) A chain of certificates.

(II) A certificate revocation list.

(III) A trust anchor.

(e) Two parties wish to converse by email from time to time and intend to keep the content of their communication and the fact that communication are taking place , a total secret. Illustrate how they might achieve their aim.

QUESTION 3:

(a) A firewall is placed at the gateway between a corporate LAN and the internet. Clarify in outline how the firewall could be arranged to provide the following functions.

(I) To bar all communications to or from a particular external address on the internet.

(II) To bar all incoming TELNET sessions

(III) To bar any external machines on the internet from initiating a association to a machine on the corporate LAN.

(b)(I) Assailant is intent on disrupting secure communications by inserting bogus packets (with correct TCP checksum) into the communications. Thrash out how such an attack would impact on systems protected by IPsec and SSL.

(II) What does S/MIME stand for?

(c) Explain with the help of a considered sketch how SSL works.

(d) Give one example of a symmetric and one asymmetric algorithm used by PGP.

(e) In the context of IPSec protocol explicates the terms:

I. Tunnel

II. Transport mode.

(f) Which IPSec mode would be appropriate for the next?

(i) Firewall to firewall communication

(ii) IP virtual Private Networks.

(g)List four services offered by PGP.

Reference no: EM13349372

Questions Cloud

Question 1the best practice approach to the development of : question 1the best practice approach to the development of a human resource strategy has severe limitations. best fit
Question 1successful service managers identify that : question 1successful service managers identify that managing demand and capacity is vital for both productive use of
Question 1a describe what a turtle shell architecture is : question 1a describe what a turtle shell architecture is and give an instance.b briefly clarify the principle of least
Question 1a what are the indispensable ingredients of a : question 1a what are the indispensable ingredients of a symmetric cipher?b what are the two basic meanings used in
Question 1a sort out each of the following as a violation : question 1a sort out each of the following as a violation of privacy integrity and ease of use authenticity or some
Question 1a explain network security what are the types of : question 1a explain network security. what are the types of security features used in client server types of network?b
Question 1aname five significant activities involved in a : question 1aname five significant activities involved in a digital forensic investigation.bwhy is computer forensic
Question 1abriefly explain how the suspect dobson in utah : question 1abriefly explain how the suspect dobson in utah has been intercepting his ex-employer email.baccording to the
Question 1think about a number of wireless devices nodes : question 1think about a number of wireless devices nodes which are connected to the internet via a single access point

Reviews

Write a Review

Computer Networking Questions & Answers

  Build a small network using three switches

Build a small network using three switches and one router and one switch will run as a distribution layer switch, the other two will run as access layer switches

  Describe how sites must be interconnected

Describe how the sites must be interconnected, where main data store will be located, how sites will connect to it, and what security measures will be implemented.

  Determine if an ip packet is carrying an icmp packet

Provide the definition and picture of Intra-domain routing and Inter-domain routing.

  Explore ways to secure a wireless network

Explore ways to secure a wireless network and present your findings in a brief report(1 page is fine, more is ok). Talk about your own experiences with using a wireless network, including the things you do to keep the network secure.

  You were tasked to handle the urgent delivery

You were tasked to handle the urgent delivery of 10TB of data from your company in Washington, D.C to a subsidiary in San Francisco, CA (2,815 miles away).

  Draw potential network architecture of data network

Draw the potential network architecture of the data network for secondary campus to main campus of university (Detail and describe the function of each component in the network.

  Criteria a company chooses for use edi and an extranet

When a company opens a private market space, it may use EDI, an extranet, EDI/Internet, various web services, XML or just the Internet with regular encryption.

  Kinds of business applications in networked business office

Write down types kinds of business applications would you deem significant in networked business office? What kinds of network servers and resources would be essential to run these business applications?

  Defines minimum packet size network technology to allow ip

Although not explicity stated, the Internet Protocol(IP) specification,RFC 791, defines the minimum packet size a network technology must support to allow IP to run over it. Discuss the reasons for adopting that specific value.

  Develop a pair of web services

You are to develop a pair of Web Services, complete with matching WSDLs and client software, which implement the functions of a Local Time Converter (LTC) service.

  Configure computers except sus server to connect to server

You wish to configure all the computers except SUS server to automatically connect to SUS server each morning at 7 A.M. to download and install new updates. Which of the given steps must you take to accomplish this goal?

  How do you patch a linux server

How do you patch a Linux server? Using the Internet, research ways that Linux computers are patched. Explain how these procedures differ from patching Windows.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd