NETWORK ADMINISTRATION AND SECURITY



Similar documents
Chapter 8. Network Security

Chapter 10. Network Security

ICTTEN8195B Evaluate and apply network security

CRYPTOG NETWORK SECURITY

Network Security [2] Plain text Encryption algorithm Public and private key pair Cipher text Decryption algorithm. See next slide

Lecture 9 - Network Security TDTS (ht1)

Chapter 32 Internet Security

Security. Contents. S Wireless Personal, Local, Metropolitan, and Wide Area Networks 1

Chapter 8. Cryptography Symmetric-Key Algorithms. Digital Signatures Management of Public Keys Communication Security Authentication Protocols

CS 356 Lecture 27 Internet Security Protocols. Spring 2013

: Network Security. Name of Staff: Anusha Linda Kostka Department : MSc SE/CT/IT

CS 393 Network Security. Nasir Memon Polytechnic University Module 11 Secure

Standards and Products. Computer Security. Kerberos. Kerberos

Cryptography and network security CNET4523

CSCI 454/554 Computer and Network Security. Final Exam Review

Soran University Faculty of Science and Engineering Computer Science Department Information Security Module Specification

VALLIAMMAI ENGINEERING COLLEGE

EXAM questions for the course TTM Information Security May Part 1

Network Security Essentials:

CRYPTOGRAPHY AND NETWORK SECURITY

CS 758: Cryptography / Network Security

Content Teaching Academy at James Madison University

Part III-b. Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai Siemens AG 2001, ICN M NT

IT Networks & Security CERT Luncheon Series: Cryptography

Security in IPv6. Basic Security Requirements and Techniques. Confidentiality. Integrity

What is network security?

ELECTRONIC COMMERCE OBJECTIVE QUESTIONS

Module 8. Network Security. Version 2 CSE IIT, Kharagpur

7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?

CSE/EE 461 Lecture 23

Security. Friends and Enemies. Overview Plaintext Cryptography functions. Secret Key (DES) Symmetric Key

Application Layer (1)

Chapter 7: Network security

Properties of Secure Network Communication

Network Security Part II: Standards

3.2: Transport Layer: SSL/TLS Secure Socket Layer (SSL) Transport Layer Security (TLS) Protocol

Chapter 7 Transport-Level Security

EUCIP - IT Administrator. Module 5 IT Security. Version 2.0

Authentication applications Kerberos X.509 Authentication services E mail security IP security Web security

Network Security. Computer Networking Lecture 08. March 19, HKU SPACE Community College. HKU SPACE CC CN Lecture 08 1/23

Introduction to Network Security. 1. Introduction. And People Eager to Take Advantage of the Vulnerabilities

Network Security. Outline of the Tutorial

Department of Computer & Information Sciences. CSCI-445: Computer and Network Security Syllabus

Communication Security for Applications

CPS Computer Security Lecture 9: Introduction to Network Security. Xiaowei Yang

AC76/AT76 CRYPTOGRAPHY & NETWORK SECURITY DEC 2014

2. From a control perspective, the PRIMARY objective of classifying information assets is to:

Chapter 4. Authentication Applications. COSC 490 Network Security Annie Lu 1

CISCO IOS NETWORK SECURITY (IINS)

CMSC 421, Operating Systems. Fall Security. URL: Dr. Kalpakis

Key Management (Distribution and Certification) (1)

Network Security Technology Network Management

Chapter 11 Security Protocols. Network Security Threats Security and Cryptography Network Security Protocols Cryptographic Algorithms

Firewalls, Tunnels, and Network Intrusion Detection. Firewalls

Network Security Fundamentals

Firewalls, Tunnels, and Network Intrusion Detection

Lectures for the course: Electronic Commerce Technology (IT 60104)

Cipher Techniques on Networks. Amit Konar Math and CS, UMSL

Comparison of SNMP. Versions 1, 2 and 3

Textbooks: Matt Bishop, Introduction to Computer Security, Addison-Wesley, November 5, 2004, ISBN

How To Understand And Understand The Ssl Protocol ( And Its Security Features (Protocol)

Computer Security. Principles and Practice. Second Edition. Amp Kumar Bhattacharjee. Lawrie Brown. Mick Bauer. William Stailings

Weighted Total Mark. Weighted Exam Mark

Proposed Syllabus by C.S.J.M.University,Kanpur. Bachelors of Computer Application

Institute of Computer Technology - Vienna University of Technology. L96 - SSL, PGP, Kerberos

Introduction to Cyber Security / Information Security

BSc (Hons) Sofware Engineering. Examinations for / Semester 2

INTERNET SECURITY: FIREWALLS AND BEYOND. Mehernosh H. Amroli

APNIC elearning: Network Security Fundamentals. 20 March :30 pm Brisbane Time (GMT+10)

First Semester Examinations 2011/12 INTERNET PRINCIPLES

ECE 428 Network Security

APNIC elearning: IPSec Basics. Contact: esec03_v1.0

SSL Firewalls

How To Protect Your Data From Attack

E-commerce. Security. Learning objectives. Internet Security Issues: Overview. Managing Risk-1. Managing Risk-2. Computer Security Classifications

Cryptography and Security

Table of Contents. Bibliografische Informationen digitalisiert durch

Authentication Application

CS 356 Lecture 28 Internet Authentication. Spring 2013

CRYPTOGRAPHY IN NETWORK SECURITY

Cryptography and Network Security

Chapter 12. Security Policy Life Cycle. Network Security 8/19/2010. Network Security

Web Security Considerations

DKIM Enabled Two Factor Authenticated Secure Mail Client

Security: Focus of Control. Authentication

Govt. of Karnataka, Department of Technical Education Diploma in Computer Science & Engineering. Sixth Semester

CS Final Exam

Overview. SSL Cryptography Overview CHAPTER 1

Security. Learning Objectives. This module will help you...

CS Computer Security Third topic: Crypto Support Sys

PA160: Net-Centric Computing II. Network Security

Network Security Protocols

Chapter 17. Transport-Level Security

CS 5490/6490: Network Security Fall 2015

Netzwerksicherheit: Anwendungen

Transcription:

NETWORK ADMINISTRATION AND SECURITY Unit I (NAS) (W- 10) Q. 1) What is Security Attack? Explain general categories of attack with examples. 7 Q. 2) List and define the five security services. 5 Q. 3) Define and explain the types of security attack in each of the following cases. 6 i) A student breaks into a professor s office to obtain a copy of the next day s test, ii) A student gives a check for $10 to buy a used book. Later she finds that the check was cashed for $100. Q. 4) Define and explain eight security Mechanism. 8 Q. 5) List and define five security services. 5 Q. 6) Discuss the following: 8 i) Cryptography ii) Cryptoanalysis. Q. 7) What is RFC? Describe the RFC publication process. 7 Q. 8) What is cipher block chaining mode and cipher feedback mode. 6 Q. 9) Explain the Model for Network Security. 7 Unit II (NAS) (S - 06) Q. 1) What is cryptanalysis? Explain the DES algorithm in detail. 9 Q. 2) What do the following terms mean in key distribution : 4 i) Session key ii) Permanent key iii) Key Distribution centre iv) Front-end processor

Q. 3) Explain the RSA public key encryption algorithm. 6 Q. 4) What is message authentication? Explain the digital signature. 7 (W - 06) Q. 5) What are various requirements for public key cryptography? 7 (W - 09) Q. 6) Explain any two block cipher conventional encryption algorithms. 8 Q. 7) With neat diagrams explain how the I-way hash function is used for message authentication. 6 Q. 8) Explain: i) ECB ii) CFB 5 Q. 9) Compare Link encryption & end-to-end encryption. 4 Q. 10) Explain Public Key Cryptography with respect to Private Key Cryptography. Write RSA algorithm. 7 Q. 11) Define a Session Key. How a KDC can create a session key between Alice and Bob. Explain. 7 Q. 12) What is SHA-SIZ? Explain compression function is used in SHA-SIZ. 6 Q. 13) Explain DES and Triple DES algorithms on the following issues- 10 i) No of rounds ii) Key size iii) Mathematical operation iv) Applications Q. 14) What is the need of public key cryptography? Explain RSA algorithm. 8 Q. 15) Discuss public-key encryption structure. Give diagrammatic representation of encryption and authentication. 7 Q. 16) In a public-key using RSA, you intercept that ciphertext C = 10 sent to a user whose public key is e = 5, n = 35. What is the plaintext M? 7 Q. 17) Compare and control DES, 3DES and AES. 6 Q.18) Explain the secure hash function requirements. 6

Q. 19) Explain the DES algorithm in detail with its strength and drawbacks. 8 Q. 20) Distinguish between a substitution cipher and a transposition cipher. 5 Q. 21) Explain the DES algorithm. How is the Triple DES algorithm different from DES. 8 Q. 22) Explain the concept of Digital Signature. 5 Q. 23) Explain RSA algorithm giving a suitable example. 8 Unit III (NAS) (W - 09) Q. 1) List the limitations of SMTP 822 scheme which are addressed by MIMME. What are the elements of MIME specification. 6 Q. 2) What is Kerberos? Give the difference between Kerberos version 4 and version 5. 5 Q. 3) Compare MIME and SMTP. 4 Q. 4) What is MINE? Explain the need and functionality. 6 Q. 5) Explain PCP services. 6 Q. 6) What is Kerberos? Explain it s requirements. 6 Q. 7) State the problem that Kerberos address. Explain simple authentication dialogues with AS & TGS for Kerberos version 4. 7 Q. 8) Define Kerberos and name its server. Explain in detail the duties of each server. 8 Q. 9) What is pretty Good Privacy? Explain PGP services. 6 Q. 10) What are the different types of function provided by the S/MIME. 6 Q. 11) Discuss PGP message transmission and reception using key rings. 7 Q. 12) Describe the authentication procedure for X.509. 7

Q. 13) What is multiple Kerberi? Compare Kerberos version 4 and 5. 7 Q. 14) Explain the key management functions performed by S/MIME user. 7 Unit - IV (S - 09) Q. 1) What is IPSec ESP packet format? Explain scope of ESP encryption and authentication. 7 Q. 2) What are set components? give the sequence of events that are required for a transaction. 4+3=7 (W 09) Q. 3) Discuss SSL record protocol operation & SSL record format. 7 Q. 4) Explain SSL handshake protocol. 5 Q. 5) Explain SSL architecture in detail. 10 Q. 6) Explain the secured Electronic Transaction (SET), giving its key features. 3 Q. 7) What are various Secure Electronic Commerce Components? 5 Q. 8) Explain security provided at transport layer in detail. 8 Q. 9) What is Web security? Explain its need and requirements. 5 Q. 10) What is secured Electronic Transaction. i) Explain key features and participants of SET. ii) Briefly describe the sequence of events, that are required for transaction. Q. 11) What is an IPsec? List and explain its Application and benefits. 9 Q. 12) List the different types of threats faced in using a web. 5 Q. 13) Explain : i) SSL session ii) SSL connection 8

Q. 14) Explain Anti-Replay Services. 6 (W 12) Q. 15) What is IP sec? Explain the authentication header with its scope. 8 Unit - V (S - 09) Q. 1) Explain : i) Management Station ii) Management agent iii) MIB 6. (W - 09) Q. 2) Describe SNMPV3 message format with USM. 6 Q. 3) What is SNMP community? Explain with authentication, access control & proxy service. 8 Q. 4) Explain the VSM message processing mechanism. 6 Q. 5) What is SNMP? Explain with authentication, access control & proxy service. 8 Q. 6) Explain the Network Management Protocol Architecture. 8 Q. 7) Explain SNMP Architecture. 6 Q. 8) What are the Elements of VACM? Explain view-based access control logic for access policy. 7 Q. 9) Compare SNMPV1, SNMPV2 and SNMPV3. 6 Q. 10) Explain the User Security Model Message Processing. 6 Q. 11) What is proxy? Why it is developed? Explain the protocol architecture involving proxy. 7 Q. 12) What are the different strengths and deficiencies of SNMPV2. 6 Q. 13) Explain SNMP protocol architecture. 7

Q. 14) Explain in brief view based access control. 6 Q. 15) What is proxy? Explain the protocol architecture involving proxy. 6 Q. 16) Discuss authentication service and access policies of SNMPV1. 7 Q. 17) Explain the role of SNMP for network management protocol architecture. 7 Q. 18) Why do we need proxy? Explain its protocol architecture. 6 Q. 19) Discuss the USM message processing mechanism. 7 Unit VI (W - 08) Q. 1) What is Virus? Give its different types. 4 Q. 2) Explain Firewall : i) Characteristics ii) Techniques used to control access iii) Limitations. 9 (S - 09) Q. 3) What are the common types of firewalls? Explain. 6 Q. 4) List and explain the different Antivirus approaches. 7 Q. 5) Explain in detail taxonomy of malicious programs. 7 Q. 6) What is a Firewall? Explain its characteristics and limitations. 7 Q. 7) What are various types of firewalls? discuss any two types of firewalls. 7 Q. 8) What is the nature of viruses? Give lifetime four typical stages of virus. 7 Q. 9) Explain the distributed intrusion detection architecture. 7 Q. 10) What are Trusted systems? Explain the concepts. 7

Q. 11) Explain the following malicious programs :- 8 i) Worms ii) Trap doors iii) Trojan Horses iv) Bacteria Q. 12) Explain in brief :- 6 i) Rule based intrusion detection system. ii) Distributed Intrusion detection system (W 11) Q. 13) How many generations of Antivirus software? Explain in detail. 6 Q. 14) Explain in detail the UNIX password scheme. 6 Q. 15) What is Intrusion Detection System? Explain the rule based Intrusion Detection and Distributed Intrusion Detection in brief. 7 Q. 16) Explain the types, characteristics and Limitations of Firewall. 7