Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Computer Network & Security Expert

QUESTION 1

(a) Describe the following security services: Confidentiality, Availability

(b) Explain "Known Plaintext" attack?

(c) What do you understand by the terms "Playback", "Spoofing"?

(d) Distinguish between unconditional security and computational security

(e) Discuss two drawbacks of steganography

(f) Describe the operation of a Trojan Horse program. How can we protect our computer from such a program

QUESTION 2

(a) Give 3 examples of physiological or behavioral traits that can be used for biometrics

(b) Give 2 reasons why biometrics is not as popular as password based systems

(c) Assume two entities A and B want to communicate securely using symmetric encryption. Describe how secure key distribution can be achieved by using a trusted key distribution centre (KDC)

(d) What is the major weakness of key distribution using KDC. List 2 ways how this can be overcome

(e) Give 2 examples of modern block cipher other than DES

(f) Digital signature provides non-repudiation. Explain how this is done

(g) Give one example of a MAC algorithm and one example of a hash function

QUESTION 3

(a) Given the following two password policies, which one would you choose for more security. Justify your answer

  • A: only 8 letter passwords using only 26 letters (upper or lower case) or the 10 digits
  • B: only 6 letter passwords but from any of the 127 ASCII characters

(b) What is the advantage of using groups for access control?

(c) Describe the following threats to firewalls-

(I) Denial of service

(II) IP Spoofing and

What countermeasures can be adopted against these threats

(d) IPSec uses two protocols for security: Authentication protocol (AH) and the Encapsulated Security Header Protocol (ESP). Why is AH used with ESP although ESP provides some authentication?

(e) What is a Security Association (SA) and what does it define? Why are there two SAs per one connection? How can two communicating peers agree on what kind of SAs they use?

QUESTION 4

(a) List 3 schemes for email security

(b) Give an example of a symmetric encryption algorithm is used by PGP?

(c) What algorithm is used by PGP for email compatibility and why?

(d) SET allows the merchant to view only the order information and not to have access to the payment information. Similarly, the payment gateway gets access only to the payment information. Explain how this can be achieved using a dual signature and public key cryptography

Computer Network & Security, Computer Science

  • Category:- Computer Network & Security
  • Reference No.:- M9718587

Have any Question?


Related Questions in Computer Network & Security

Sms use short message peer to peer smpp protocolimessage

SMS use Short Message Peer to Peer (SMPP) protocol IMessage based on Apple push notifications (APNS) - binary protocol WhatsApp uses standard Extensible Messaging and Presence Protocol (XMPP) Write a pragraph explaining ...

Assignment1 consider a tcp connection between host a and

Assignment 1, Consider a TCP connection between Host A and Host B. Suppose that the TCP segments traveling from Host A to Host B have source port number 10526 and destination port number 80. What are the source and desti ...

A wall street journal article noted that a study by us

A Wall Street Journal article noted that a study by U.S. Congressional Budget Office "estimated raising the minimum wage to $10.10 per hour reduced U.S employment by 500,000 but lift 900,000 Americans out of poverty". Wh ...

Question suppose you wish encrypt the message beyonce using

Question : Suppose you wish encrypt the message BEYONCE using the one-time pad with the key RIHANNA (a) Encode to this message and the key as bits. (b) Encrypt with the one-time pad using XOR. What is the resulting ciphe ...

1 these assignments need to be properly supported with

1. These assignments need to be properly supported with references to the scientific literature. 2. Use a 12pt font for the body of your assignment. 3. The assignment many be up to four (4) pages long, including any appe ...

Shadow register setsa describe the use of shadow register

Shadow Register Sets a. Describe the use of shadow register sets. b. How many shadow register sets are supported? c. What instructions are used to move data between them? Floating Point Numbers. We have heretofore focuse ...

Per capita income of winterfell is 15000 with a growth rate

Per capita income of Winterfell is $15,000 with a growth rate of 4%. Per capita income of King's Landing is $25,000 with a growth rate of 0%. How long until per capita income is the same in both locations?

This is from a practical exercise the answers are below but

This is from a practical exercise. The answers are below BUT, I do not know how they came up with them. I'd like a step-by-step explanation of how they got the answers. Practical Exercise 1: Assume the demand for teacher ...

Assignment descriptionproject scope a typical

Assignment Description Project Scope: A typical network layout diagram of a firm is given below for illustrative purposes only. The service requirements are enclosed. Figure. Network layout of a firm Service requirements ...

Data communications and networks assignment -aim a library

Data Communications and Networks Assignment - Aim: A library research and industry related project is to be carried out on a topic of your choice. The project topic must be related to Data Communications and Networking. ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As