MIT4022- Network Security

Dear students get fully solved assignments

Send your semester & Specialization name to our mail id :

“ help.mbaassignments@gmail.com ”

or

Call us at : 08263069601

 

 

ASSIGNMENT

PROGRAM Master of Science in Information Technology(MSc IT)Revised Fall 2011
SEMESTER 4
SUBJECT CODE & NAME MIT4022- Network Security
CREDIT 4
BK ID BT0088
MAX.MARKS 60

 

Note: Answer all questions. Kindly note that answers for 10 marks questions should be approximately of 400 words. Each question is followed by evaluation scheme.

1 .Explain Caesar’s Cipher encryption technique.

 

Answer:- The Caesar cipher, also known as a shift cipher, is one of the simplest forms of encryption. It is a substitution cipher where each character in the original message (called the plaintext) is replaced with a letter that is some number of positions down in the alphabet. Here’s a quick example using a shift amount of one:

 

 

 

Q.2 Compare DES and AES algorithms.

Answer:- DES (Data Encryption Standard) is a rather old way of encrypting data so that the information could not be read by other people who might be intercepting traffic. DES is rather quite old and has since been replaced by a newer and better AES (Advanced Encryption Standard). The replacement was done due to the inherent weaknesses in DES that allowed the encryption to be broken using certain methods of attack. Common applications of AES, as of the moment, are still impervious to any type of cracking techniques, which makes it a good

 

 

 

  1. Explain Developmental Controls and Administrative Controls for software development.

Answer:- ADMINISTRATIVE CONTROL At the end of the lecture student will be able to:-Understand the concept of Administrative Accountability and Control-Understand the types of internal accountability and external accountability

 

 

 

  1. List all the models of security and explain any two models for operating system security

Answer:- A computer security model is a scheme for specifying and enforcing security policies. A security model may be founded upon a formal model of access rights, a model of computation, a model of distributed computing, or no particular theoretical grounding at all.

A security policy is a document that expresses clearly and

 

Q.5 Define and explain IP security. Explain IP security architecture.

Answer: – IP Security Architecture

The purpose of the IP Security Architecture (IPSEC) is to provide a standard security mechanism and services to the currently used IP version 4 (IPv4) and to the new IP version 6 (IPv6). It does this by specifying two standard headers to be used with both versions of IP datagrams: “IP Authentication Header” (AH) and “IP Encapsulating Security Payload” (ESP) [2]. These two IP-layer mechanisms do not provide security against traffic analysis and other

 

 

  1. Describe guard and personal firewalls

Answer: – Firewalls are an excellent tool for securing a network. A firewall is system designed to prevent unauthorized access to or from a private network and basically limits access to a network from another network. Firewall that can be implemented in hardware or software, or a combination of both either denies or allows outgoing traffic known as egress filtering or incoming traffic known as ingress filtering.

 

 

 

 

 

Dear students get fully solved assignments

Send your semester & Specialization name to our mail id :

“ help.mbaassignments@gmail.com ”

or

Call us at : 08263069601

 

Leave a Reply