EE4215_t3 - Approaches 6 What is encryption technique 7...

Info iconThis preview shows page 1. Sign up to view the full content.

View Full Document Right Arrow Icon
EE4215 Tutorial 3 1. What are the common security mechanisms for safeguard an attack? 2. State the concept and basic implementation of an Intrusion Detection architecture. Give an example. 3. What is the concept of Profile, record and Abnormality in Auditing approach? 4. What are the major differences between Auditing and Intrusion Detection Approaches? 5. What are the major differences between Identification and Authentication
Background image of page 1
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: Approaches? 6. What is encryption technique? 7. State the basic functions of DES for achieving encryption/scrambling function. 8. What is Public Key Encryption? State the major differences of RSA and ECC. 9. Why formal method becomes an important mechanism in providing safeguard function?...
View Full Document

This note was uploaded on 01/11/2012 for the course EE EE4215 taught by Professor Drcheng during the Winter '11 term at City University of Hong Kong.

Ask a homework question - tutors are online