MCA5042- Cryptography and Network Security

Dear students get fully solved  SMU MBA Spring 2014 assignments
Send your semester & Specialization name to our mail id :

“ help.mbaassignments@gmail.com ”
or
Call us at : 08263069601


ASSIGNMENT
PROGRAM
MCA(REVISED FALL 2012)
SEMESTER
V
SUBJECT CODE & NAME
MCA5042- Cryptography and Network Security
CREDIT
4
BK ID

MAX.MARKS
60

Note: Answer all questions. Kindly note that answers for 10 marks questions should be approximately of 400 words. Each question is followed by evaluation scheme.

Q.1 Describes the stream and block encryption with their advantages and disadvantages.
Answer:- A stream cipher is a symmetric key  cipher  where plaintext digits are combined with a pseudorandom  cipher digit stream (key stream ). In a stream cipher each plaintext  digit  is encrypted one at a time with the corresponding digit of the key stream, to give a digit of the ciphertext stream. An alternative name is a state cipher, as the encryption of each digit is dependent on the current state. In practice, a digit is typically a bit and the combining operation an exclusive-or (xor).
The pseudorandom key stream is typically generated serially from a random seed value using digital shift registers. The seed value serves as the

Q.2 Compare DES and AES algorithms.
Answer: - DES (Data Encryption Standard) is a rather old way of encrypting data so that the information could not be read by other people who might be intercepting traffic. DES is rather quite old and has since been replaced by a newer and better AES (Advanced Encryption Standard). The replacement was done due to the inherent weaknesses in DES that allowed the encryption to be broken using certain methods of attack. Common applications of AES, as of the moment, are still impervious to any type of cracking techniques, which makes it a good choice even

Q.3 Explain Developmental Controls and Administrative Controls.
Answer:- Administrative controls are essential to achieve an effective hearing loss prevention program. Engineering and administrative controls represent the first two echelons in the NIOSH Hierarchy of Controls: 1) remove the hazard, 2) remove the worker. The use of these controls should reduce hazardous exposure to the point where the risk to hearing is eliminated or at least more manageable. Engineering controls are technologically feasible for most noise sources but their economic feasibility must be determined on a case-by-case basis. In some instances the application of a relatively simple noise control solution reduces the hazard to the extent that the other elements of the program, such as audiometric testing and the use of hearing

Q.4 List all the models of security and explain any two models.
Answer: - A security policy is a document that expresses clearly and concisely what the protection mechanisms are to achieve. It’s a statement of the security we expect the system to enforce.
A security model is a specification of a security policy:
·         It describes the entities governed by the policy,
·         It states the rules that constitute the policy.

There are various types of security models:
·         Models can capture policies for confidentiality or for integrity.
·         Some models apply to environments with
·          
·          
·          
Q.5 Define and explain IP security. Explain IP security architecture.
Answer: - Internet Protocol Security (IPSec) is a framework of open standards for ensuring private, secure communications over Internet Protocol (IP) networks, through the use of cryptographic security services. IPSec supports network-level peer authentication, data origin authentication, data integrity, data confidentiality (encryption), and replay protection. The Microsoft implementation of IPSec is based on standards developed by the Internet Engineering Task Force (IETF) IPSec working group.



Q.6 Describe guard and personal firewalls
Answer: - Process-oriented BitGuard Personal Firewall is designed to take care of these problems. The firewall is based upon totally new principals but does still work in a way, which is easy to understand. BitGuard Personal Firewall differs from other firewalls by being process-oriented: The firewall monitors all processes being executed on the computer.
Firewalls  guard
Dear students get fully solved  SMU MBA Spring 2014 assignments
Send your semester & Specialization name to our mail id :

“ help.mbaassignments@gmail.com ”
or
Call us at : 08263069601


No comments:

Post a Comment

Note: only a member of this blog may post a comment.