Security Requirements and Attacks
Explain the term Security Requirements and Attacks in network security.
Expert
Security Requirements: There are five principle requirements that are addressed by network security:
Security Attacks: Two major categories of security attacks are: 1) passive and 2) active attacks.
Passive attacks involve exposure of a message to a non-authorized party, such as in eavesdropping, but do not involve any alteration of the message content. These attacks are very difficult to detect, and they are best prevented by using various types of message encryption.
Active attacks involve some data modification and can be grouped in four categories:
Explain the primitive operations which are used in the RC5?
State the difference between end-to-end encryption and link?
Explain the need of E-mail compatibility function in PGP?
Specify the services which are offered by the PGP services?
Explain difference between the Rot Word and Shift Rows?
Specify the steps used for preparing the envelope data MIME?
Explain the term Caesar cipher.
Specify various function areas of the IP security?
Explain the term Shift Rows.
Suppose you worked for a US- based company that wanted to develop its own MIB for managing a product line. Where in the object identifier tree would it be registered? ( Hint: You’ll have to do some digging through RFCs or other documents to answer this question.)
18,76,764
1952694 Asked
3,689
Active Tutors
1457596
Questions Answered
Start Excelling in your courses, Ask an Expert and get answers for your homework and assignments!!