Explain the terms used in network security, Computer Network Security

Assignment Help:

Question 1

(a) Explain briefly the following terms as used in network security:

(i) Denial of service (DoS) attack

(ii) Birthday attack

(iii) DeMilitarized Zone (DMZ)

(iv) Social Engineering

(v) Pretty Good Privacy (PGP) algorithm

(b) (i) List three benefits of using IPSec.

(c) Briefly explain the Cipher Block Chaining (CBC) mode of operation stating its advantages, disadvantages and uses.

(d) Describe five guidelines for a desirable password selection and use policy in a corporate organisation.


Related Discussions:- Explain the terms used in network security

Address resolution with message exchange, ADDRESS RESOLUTION WITH MESSAGE E...

ADDRESS RESOLUTION WITH MESSAGE EXCHANGE An alternative to local calculation is a distributed function. A computer that requires to find an address transmits a message across

Rsa block and vernam stream ciphers, RSA Block and Vernam Stream Ciphers ...

RSA Block and Vernam Stream Ciphers This assignment involves writing two small Python scripts and a report. Before you start you must download the ?le summarysheets.zip from th

What do you understand by the concept web of trust, Question: a) Name ...

Question: a) Name a method to allow a person to send a confidential email to another person, without risks of a third-party reading the email. Describe briefly the operations

Illustrate about tinysec protocol, Illustrate about TinySec Protocol T...

Illustrate about TinySec Protocol TinySec is implemented on the link layer and addresses security requirements of the resource staffed nodes in the WSN based on the link layer

Configuration for 3des, (a) Explain the two possible configuration for 3DE...

(a) Explain the two possible configuration for 3DES. (b) What is the main disadvantage of 3DES? (c) Why are most modern symmetric algorithm block ciphers? (d) Describe

List vulnerabilities of using wep, Question: The Wired Equivalent Priv...

Question: The Wired Equivalent Privacy (WEP) standard was created in order to give wireless networks safety and security features similar to that of wired networks. (a) L

Need for security-information security, NEED FOR SECURITY Primary missio...

NEED FOR SECURITY Primary mission of information security to ensure that the systems and contents stay the same If no threats, could focus on improving the systems, resulting in

Digital signatures, Digital Signatures Digital Signatures are encrypted ...

Digital Signatures Digital Signatures are encrypted messages which can be proven mathematically to be authentic. These are created in response to rising requirement to verify in

Caralouer case study: analysis and design techniques, CarALouer provides re...

CarALouer provides rental of cars to its customer on a regional basis i.e. a car is attached to a regional home-base which also houses a regional office of the company. Each regi

What are the main objectives of a risk analysis, QUESTION 1 Risk ana...

QUESTION 1 Risk analysis helps companies prioritize their risks and shows management the amount of money that should be applied to protecting against those risks in a sensib

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd