0% found this document useful (0 votes)
7 views2 pages

Network Security E 2023

The document outlines various topics related to network and system security, including email security using PGP, wireless networking security, and the workings of IDS and IPS. It covers key concepts such as malware types, network security models, and public key infrastructure (PKI), along with practical applications like RSA algorithm and Diffie-Hellman key exchange. Additionally, it discusses security protocols like IPSec, SSL/TLS, and SSH, emphasizing their roles in ensuring confidentiality, integrity, and non-repudiation.

Uploaded by

Harshit Joshi
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
0% found this document useful (0 votes)
7 views2 pages

Network Security E 2023

The document outlines various topics related to network and system security, including email security using PGP, wireless networking security, and the workings of IDS and IPS. It covers key concepts such as malware types, network security models, and public key infrastructure (PKI), along with practical applications like RSA algorithm and Diffie-Hellman key exchange. Additionally, it discusses security protocols like IPSec, SSL/TLS, and SSH, emphasizing their roles in ensuring confidentiality, integrity, and non-repudiation.

Uploaded by

Harshit Joshi
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
You are on page 1/ 2
wos Tes-619 (©) Explain the working of email security H using PGP. Explain how confidentiality, : integrity and non-tepudiation is {implemented using PGP, (cos) TCS-H19 (©) Explain how security is implemented in Wireless networking, Write about WAP ‘end to end security (Cos) _S.Roll No. 8. TECH. (CSE) (SIXTH SEMESTER) END SEMESTER EXAMINATION, June, 2023 NETWORK AND SYSTEM SECURITY , Time : Three Hours Maximum Marks : 100 Note : (i) All questions are compulsory. Gi) Answer any two sub-questions among (2), (b) and (c) in each main question. 5. (a) What do you mean by IDS and IPS ? Explain how it works, also state its advantages. (Cos) (b) Explain the following terms: (COS) (SPAN (Switehed Port Analyser), i) Packet Filter Firewall 4 (Gy Total marks in each main question are Gi Distited Denil of SerfesAiek arene iv) Rootkit (iy) Each sub-question carries 10 marks. (©) What do you mean (by) Malware ? Write (@) Explain the following terms: (COI) about five types of Malwares attacks. Also @ Access Control state how toNGgolve the problem of malware, (Cos) TCS-19 1,640 ‘Masquerade attack (ii) Routing Control (iv) Traffic Padding @ Tes-619 (b) What do you mean by Network Security ‘Model ? Explain it with a neat diagram, (cor) (©) Differentiate between the following : con (Authentication and Access Control (Gi) Block Cipher and Stream Cipher Security Mechanism and Security Services (iv) Snooping and Spoofing 2. (@) Explain with the help of suitable. block, diagram how Confidentiality and ‘Authentication is achieved_ in Messige ‘Authentication using Message/Eneryption ‘Technique. (co2) (b) Calculate the valug“oPPriate and public key pair usin RSA lalgorithm, given that po 19;q=1Teflso show the Encryption and decryption Steps using the plain text value of M = 4, Write all the steps involved. (co2) ® Tes-619 (©) Explain ‘about Digital Signature Standard ‘witk'the helfpof a neat diagram. (C02) 3. (@AWhal\do” you mean by Public Key Yafrastructure (PKI) ? Explain how PKI plays @ role in reliable distribution and Serification of Digital Signature and Public key. (C03) (b) Users A and B want to establish a secret key using Diflie-Helimen key exchange protocol using a common prime q = 353, a primitive root a= 3, A’s secret key Xp = 97 and B's secret key Xp =233. Compute (i) A's public key, Yq (ii) B's public key, Yo (iii) A's and B's common secret key, K. (C03) (©) What are the various technologies to implement web security ? Explain about SSLITLS and SSH, (Coa 4. (@) Explain the working of "ipsec” in detail. Write about the two major phases and their importance. Write About the protocols which are used in "ipses". Write about the two modes in which “ipsec” is. implemented, (coay RTO.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy