Write any one major difference between the following: 1. DES and AES 2. SSL and TLS 3. Symmetric and Asymmetric Encryption 4. Public and Private key 5. Virus and Worm 6. Enveloped and clear signed data 7. Attack and threat
[7 marks]Explain fiestal structure. What is the role of fiestal structure in implementation of DES algorithm? Explain in detail.
[7 marks]Write any one difference between block and stream cipher. Explain CBC and counter cipher block modes of operations with advantages and Limitations.
[7 marks]1. Explain the working of MAC with suitable diagram. 2. Explain the role of public and private key in RSA algorithm to achieve confidentially and authentication using suitable diagram.
[4 marks]1. Write any four differences between Kerberos V4 and V5. 2. Explain any three important fields of X.509 V3 certificate.
[3 marks]Explain the need and working of SSL Handshake protocol in detail with suitable diagram.
[7 marks]Briefly explain the structure/format indicating the different fields of Public Key Ring in PGP.
[7 marks]Explain SSL record protocol and SSL alert protocol with suitable diagram.
[7 marks]Explain PGP services Authentication, Confidentiality, Authentication & Confidentiality using suitable diagram.
[7 marks]1. Write the two differences between transport and tunnel mode. 2. Write any four applications of IPSec. 3. Write full form of ESP 01
[4 marks]1. Explain classes of Intruders. 2. Define the terms false positive and False Negative. 3. Write the importance of Honey pots in Intrusion Detection.
[2 marks]Explain Profile and Rule based Intrusion detection system in detail.
[7 marks]1. Why web security is more important issue today? List at least four reasons for the same. 2. Explain any three fields related with SAD in IPSec.1
[3 marks]What is proactive password checking? Explain with example. Explain how it is different and better than reactive checking.
[7 marks]1. Write any three advantages of Firewall. 2. Explain the attacks performed on firewalls.
[4 marks]Explain the need of Firewall. Explain different types of Firewalls in detail.
[7 marks]1. What is an Audit record in IDS. 2. Explain the types of active attacks using suitable diagram.
[4 marks]