Vous êtes sur la page 1sur 3

August 2011 Bachelor of Science in Information Technology (BScIT) Semester 5 BT0088 Cryptography and Network Security 4 Credits

(Book ID: B1183)

Assignment Set 1 (60 Marks)

Answer all questions

10 x 6 = 60

1. 2. 3. 4.

Explain the need for network security. What is security attack? Explain with examples. What is the difference between substitution and transposition techniques? Using Caesar Cipher encrypt the plaintext Sikkim Manipal University using

key value

For Complete Solved SMU Assignment @ 1000 Rs Email: mba8182@gmail.com Ph: 09873669404
5. 6.
7. Explain different characteristics that identify a good encryption technique. Compare Symmetric and Asymmetric Encryption Systems. Give the Overview of DES Algorithm. Explain RSA technique with an example. Explain different approaches used in judging the quality of security.

8. 9.

10.

What are the different ways in which an operating system can assist or offer

protection?

August 2011 Bachelor of Science in Information Technology (BScIT) Semester 5 BT0088 Cryptography and Network Security 4 Credits
(Book ID: B1183)

Assignment Set 2 (60 Marks)

Answer all questions

10 x 6 = 60

1. What are Security Policies? Explain military security policy. 2. Explain Chinese wall Security Policy. 3. Write a short note on Impersonation. 4. Explain link and end-to-end encryption.

For Complete Solved SMU Assignment @ 1000 Rs Email: mba8182@gmail.com Ph: 09873669404
5. Explain in detail, the Security Association. 6. Describe the Authentication Header. 7. Explain in detail, the Secure Socket layer. 8. Mention different possible threats to E-mail. 9. What is Firewall? Explain. 10. What do you mean by Planning Security policies? Explain.

Vous aimerez peut-être aussi