• Q : Cryptography-network security....
    Computer Network Security :

    In brief describe the given security goals given by cryptography: confidentiality, integrity, authentication and non-repudiation.

  • Q : Issues in achieving confidentiality-integrity-availability....
    Computer Network Security :

    The basic security goals are confidentiality, Integrity and availability (CIA). Explain the issues and problems in achieving these goals.

  • Q : Data encryption standard-symmetric encryption....
    Computer Network Security :

    Which Data Encryption Standard (DES) operating modes can be employed for large messages without the worry that an error early in the encryption or decryption process will spoil results during the co

  • Q : Security configuration and analysis tool....
    Computer Network Security :

    Briefly describe how the Security Configuration and Analysis Tool (SCAT) snap-in in MMC (Microsoft Management Console) can be employed for securing a computer.

  • Q : Difficulties-risks using public infrastructure in business....
    Computer Network Security :

    Assess probable difficulties and risks associated with using public infrastructure like the Internet as part of a business solution.

  • Q : Concept of single sign on....
    Computer Network Security :

    What are the two most important threat faced by the security industry? Describe the privacy issues related to use of Biometrics. Describe the concept of Single Sign on (SSO). Mention merits and demeri

  • Q : Dual homed bastion host configuration....
    Computer Network Security :

    Sketch a possible dual-homed Bastion Host configuration? How is it dissimilar from a single-homed Bastion Host? Illustrate five different types of computer viruses. Determine the most dangerous type a

  • Q : Drawback of using network techniques in network analysis....
    Computer Network Security :

    Outline two advantages of using PERT and CPM for a Project manager. State one major drawback of using these network techniques in network analysis. Write down three distinguishing features between PER

  • Q : Basic components of queueing system....
    Computer Network Security :

    Discuss three applications of operations research in order to improve decision making process. Discuss briefly any two basic components of a queueing system.

  • Q : Name of network protocols supported by j2me....
    Computer Network Security :

    Which Network protocols does J2ME supports for establishing connection? What do you mean by Cluster and MIDlet. What is gossip protocol?

  • Q : Master secret is created from pre-master secret in ssl....
    Computer Network Security :

    Explain how master secret is created from pre-master secret in SSL. Describe the processes of generating digital signature using RSA.

  • Q : Key generation and management using rsa....
    Computer Network Security :

    Describe key generation and management using RSA. Describe how PGP provides authentication as well as confidentiality?

  • Q : Cryptography and network security....
    Computer Network Security :

    Describe in detail regarding the design principles of International Data Encryption Algorithm.

  • Q : Situation where integrity is important than confidentiality....
    Computer Network Security :

    This question concerns main security goals (confidentiality, integrity, availability). Explain a situation in which the goal of integrity is important, but there is not a need for confidentiality.

  • Q : Security services-passive attack....
    Computer Network Security :

    Illustrate the five main security services. What is passive attack? Give an instance of passive attack? What four types of active attacks and illustrate their respective attacks to which security serv

  • Q : Public key cryptosystem....
    Computer Network Security :

    Explain how a Public Key Cryptosystem with public (K+) and private (K-) keys can be used for confidential communications and for making sure message integrity.

  • Q : Function of protocols in designing network security models....
    Computer Network Security :

    How do you define term Network Security? Describe the function of protocols in designing the Network Security Models. Also, explain the hardware oriented and software oriented approaches to ensure n

  • Q : Software piracy and internet security....
    Computer Network Security :

    What are the various precautions one should take for making the use of Internet safer and secure? Explain on the implications of user habits.

  • Q : Role of antivirus in preventing the virus attack....
    Computer Network Security :

    What do you mean by the term computer virus? List the kinds of viruses. Elaborate on the role of antivirus in preventing the virus attack.

  • Q : Securing internet and server access....
    Computer Network Security :

    Network security is a main concern for every business of all sizes. Propose what you should, or should not, be doing in a networking environment.

  • Q : Information technology and server security....
    Computer Network Security :

    Vulnerabilities are the flaws in computer software which make weaknesses in the overall security of the computer or network and permit an attacker to decrease a system's information assurance. Could

  • Q : Cross site scripting attack....
    Computer Network Security :

    Provide an example of a Cross Site Scripting (XSS) attack. Include an explanation of the differences between stored and reflective XSS attacks.

  • Q : Designing a communication protocol....
    Computer Network Security :

    Design a communication protocol based on identity-based cryptography

  • Q : Diffie-hellan key exchange protocol....
    Computer Network Security :

    They want to find a common secret key using Diffie-Hellan key exchange protocol

  • Q : Characterizing network traffic flow-load-qos requirements....
    Computer Network Security :

    Characterize the network traffic in terms of flow, load, behavior, and QoS requirements. You will not be able to precisely characterize the traffic but provide some theories about it and document th

©TutorsGlobe All rights reserved 2022-2023.