model papers

model papers - Model papers Cryptography and network...

Info iconThis preview shows pages 1–2. Sign up to view the full content.

View Full Document Right Arrow Icon
Model papers Cryptography and network security Answer any 6 of the following 10 questions. Each question carries 5 marks. 1. Write the differences between public and private key. (pg 262) 2. Differentiate between stream and block cipher. 3. What is access control? Define 3 types of access control. 4. What is a virus? Explain the stages of a virus. 5. Explain BLP model of trusted computing. 6. What is fire wall? Explain packet firewall. 7. Explain Injection attack. 8. What are the four main human factors of computer security? Define each of them briefly. 9. What is IDS. What are the requirements of IDS. 10. Explain database encryption and define the 4 types of entities involved. Case study (10 marks each) 1. Security aspects come into play when it is necessary to protect the information transmission from an opponent who may present a threat to confidentiality, authenticity, and so on. Illustrate and explain the model for network security and explain the two components for providing security. (page 22)
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Image of page 2
This is the end of the preview. Sign up to access the rest of the document.

Page1 / 4

model papers - Model papers Cryptography and network...

This preview shows document pages 1 - 2. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online