Flat 50% off on all training & certification courses. Limited time offer Explore courses

Use these filters to find papers

  Question
0

Define the following term with respect to cryptography:

i) Cipher

This question has 0 answers so far.
0

Discuss the need and construction of a Dual-signature in a SET protocol.

This question has 0 answers so far.
0

Define the key features of SET protocol.

This question has 0 answers so far.
0

Explain different phases in a SSL Handshake protocol.

This question has 0 answers so far.
0

Mention the applications of IPSec.

This question has 0 answers so far.
0

Draw and explain the header format of ESP protocol.

This question has 0 answers so far.
0

Describe the SA parameters and SA selectors of a IPSec.

This question has 0 answers so far.
0

What is S/MIME? What are the functions of S/SMIME?

This question has 0 answers so far.
0

Briefly explain the header fields of MIME protocol.

This question has 0 answers so far.
0

Explain the PGP message generation and message reception technique.

This question has 0 answers so far.
0

Explain anye Three Active security attacks.

This question has 0 answers so far.
0

List the difference between Kerberos version 4 and version 5.

This question has 0 answers so far.
0

Write and explain the general format of a X.509 public key certificate.

This question has 0 answers so far.
0

Define the following term with respect to cryptography:

iv) Strganography.

This question has 0 answers so far.
0

Define the following term with respect to cryptography:

iii) Keyspace

This question has 0 answers so far.
0

Briefly explain the components of issue specific security policy.

This question has 0 answers so far.
0

Define the following term with respect to cryptography:

i) Encryption 

This question has 0 answers so far.
0

Explain substitution cipher technique. Discuss its weakness.

This question has 0 answers so far.
0

Describe any four attacks on a cryptosystem.

This question has 0 answers so far.
0

Define the following term with respect to intrusion detection system:

iv) Confidence value.

This question has 0 answers so far.
0

Define the following term with respect to intrusion detection system:

ii) False' negative

This question has 0 answers so far.
0

Define the following term with respect to intrusion detection system:

ii) False positive

This question has 0 answers so far.
0

Define the following term with respect to intrusion detection system:

i) Alert

This question has 0 answers so far.
0

Discuss port scanning and Vulnerability scanning tools.

This question has 0 answers so far.
0

Explain Host based intrusion detection system. Write its advantages and disadvantages.

This question has 0 answers so far.
0

Discuss content filter technology in a security.

This question has 0 answers so far.
0

Define any six design rules of Firewall.

This question has 0 answers so far.
0

Explain different categories of Firewalls according to their processing mode.

This question has 0 answers so far.
0

Write and define different levels of controls in a security Architecture.

This question has 0 answers so far.
0

Discuss various stages in a Incident response planning strategy.

This question has 0 answers so far.