Cryptography and Network Security Two Marks Unit-1 Network Security 1. Specify The Four Categories of Security Threads?
Cryptography and Network Security Two Marks Unit-1 Network Security 1. Specify The Four Categories of Security Threads?
Cryptography and Network Security Two Marks Unit-1 Network Security 1. Specify The Four Categories of Security Threads?
TWO MARKS
1. Distinguish between passive attack and active attack with reference to X.800.
Passive attacks: Passive attacks are in the nature of eavesdropping on, or monitoring of,
transmissions. It includes release of message contents and Traffic analysis. Passive attacks are
very difficult to detect because they do not involve any alteration of data. However, it is feasible
to prevent the success of these attacks, usually by means of encryption.
Active attacks: Active attack involves some modification of the data stream or the creation of a
false data stream and can be subdivided into four categories namely as a masquerade, replay,
modification of messages and the denial of service attack.
6. What is encipherment?
The use of mathematical algorithms to transform data into a form that is not readily
intelligible. The transformation and subsequent recovery of the data depend on an algorithm and
zero or more encryption keys.
8. What is a passive attack?
Passive attacks are in the nature of eavesdropping on, or monitoring of, transmissions.
The goal of the opponent is to obtain information that is being transmitted. Two types of passive
attacks are the release of message contents and traffic analysis.
7. What is DES?
Data Encryption Standard (DES) is a widely-used method of data encryption using a
private (secret) key. DES applies a 56-bit key to each 64-bit block of data. The process can run
in several modes and involves 16 rounds or operations.
to S/MIME has since been vested in the IETF and the specification is now layered
on cryptographic message syntax.
1. Define –Virus
Computer Viruses is defined as the malicious software programs that damage computer
program entering into the computer without the permission of the users, and also run against the
wishes of the users. They are replicated by themselves. Viruses are so dangerous and malicious
that they can be automatically copied and pasted from memory to memory over and over.
Types of virus:
Boot sector Virus
Macro virus
Multipartite Virus
Stealth virus
organization. Within the broad scope of auditing information security there are multiple types of
audits, multiple objectives for different audits, etc. Most commonly the controls being audited
can be categorized to technical, physical and administrative. Auditing information security
covers topics from auditing the physical security of data centers to auditing the logical security
of databases and highlights key components to look for and different methods for auditing these
areas.