Briefly explain the contents of the needs analysis, Computer Network Security

Assignment Help:

QUESTION

(a) Briefly explain the contents of the Needs Analysis, which is step in the process of network design.

(b) Describe on the three ways of improving the performance of a network, with regards to Network Management.

(c) The ASN.1 specification language is an integral part of the OSI Reference Model architecture, and is used in protocols on the Internet. ASN.1 data objects are encoded for transmission using the Basic Encoding Rules. Provide an example of a transmitted byte-stream in hexadecimal by using the subsequent module of data type declarations and its corresponding instances:

Player ::= OCTET STRING, Age ::= INTEGER, Injured ::= BOOLEAN

{Player, "Paul Smith"}, {Age, 21}, {Injured, 0}

(d) Explain the keys used in the process of preparing a Digital Signature, stating the origin of the keys.

(e) Two important system performance parameters are: Reliability and Availability.

i.Determine the MTTR to the nearest hour of a system with an availability of 99% with an average of 3 failures per year.
ii. Determine the MTBF to the nearest hour if the reliability of a system needs to be 99.98% over 30 days.


Related Discussions:- Briefly explain the contents of the needs analysis

Marketing, what are the participant of marketing channal?

what are the participant of marketing channal?

Mastering the complexity of network system, To master the complexity one mu...

To master the complexity one must apply the given points. CONCENTRATE IN UNDERSTANDING THE CONCEPTS: Instead of details of wires used to connect computers to a specif

Datagram reassembly, DATAGRAM REASSEMBLY Recreation of original datagr...

DATAGRAM REASSEMBLY Recreation of original datagram is known as reassembly. Ultimate receiver acts reassembly as given below.Fragments can reach out of order. Header bit check

Evaluations, Evaluations, Assessment, and Maintenance of Risk Controls W...

Evaluations, Assessment, and Maintenance of Risk Controls When the control strategy has been implemented, it should be monitored and measured on an ongoing basis to determine ef

Determine the functions of security components, You are designing a Demilit...

You are designing a Demilitarized zone for a large corporation. Using design best practice, and the information that you have learned so far, propose a design that will provide the

What is network virtual terminal, Network Virtual Terminal It is a set...

Network Virtual Terminal It is a set of principles describing a very simple virtual terminal interaction. The NVT is needed in the start of a Telnet session. Communication wit

Risk determination, Risk Determination For purpose of relative risk asse...

Risk Determination For purpose of relative risk assessment, risk equals probability of vulnerability occurrence TIMES value MINUS percentage risk already controlled PLUS an elem

Man-in-the-middle attacker, - Alice, Bob and Charlie have a secret key a=3,...

- Alice, Bob and Charlie have a secret key a=3, b=4, c=5, in that order. - They would like to find a common secret key using Diffie-Hellan key exchange protocol (with g=2, p=5).

Risk assessment, RISK ASSESSMENT Risk assessment is a step in a risk man...

RISK ASSESSMENT Risk assessment is a step in a risk management technique. Risk assessment is the determination of quantitative or qualitative value of risk related to a concrete

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd