SlideShare a Scribd company logo
Information and Network Security 10IS835
ASSIGNMENT QUESTIONS
UNIT-I
PLANNING FOR SECURITY
Assingment-1
1. Who is responsible for policy management? How a policy is managed. Explain?
Responsible individual.
2. Explain issue-specific Security policy?
3. Draw a systematic diagram showing the major steps in contingency Planning. Explain in
Detail. Business impact analysis.
4. Explain the ISO/IEC 270 01 : 2005 plan-DO-Check-Act cycle.
Assingment-2
1. Define policy and explain issue specific security policy.
2. What are the policies that must be defined by the management (of organizat ions) as per
NIST SP 800-14 ? Describe briefly the specific areas covered by any two of these
policies.
3. What are the components of contingency planning? Describe briefly the important steps
involved in the recovery process after the extent of damage caused by an incident has
been assessed.
Dept of ISE,SJBIT Page 1
Information and Network Security 10IS835
UNIT 2
SECURITY TECHNOLOGY: FIREWALLS AND VPNS
Assingment-1
1 What is firewall? Show the working of screened host and dual homed firewall?
2 Explain the FIREWALL RULES.
3 What is VPN and explain the different techniques used to implement the VPN
Virtual Private Network
4 Explain the screened subnet firewall.
UNIT 3
SECURITY TECHNOLOGY – 2
Assingment-1
1. Differentiate between network based IDS and Host Based IDS emphasizing on their
advantages and disadvantages .
2. Enumerates the advantages and disadvantages of using honey pots.
3. Explain the venerability scanners.
4. Define the following terms related to IDS :
i. Alert
ii. False attack stimulus
iii. False negative
iv. False positive
v. True attack stimulus
Dept of ISE,SJBIT Page 2
Information and Network Security 10IS835
UNIT 4
CRYPTOGRAPHY
Assingment-1
1. what is an encryption? Discuss the asymmetric and symmetric methods.
2. Explain the different categories of attacks on cryptosystem.
3. What are the difference between digital signature and digital certificate ?
4. Explain the two methods of encrypting plaintext.
Assingment-2
1. List out the elements of cryptosystems and explain transposition cipher technique
2. Who can attack cryptosystems? Discuss different categories of attacks on
cryptosystems
3. List out the elements of cryptosystem?
UNIT 5
INTRODUCTION TO NETWORK SECURITY, AUTHENTICATION APPLICATIONS
Assingment-1
1. what is meant by information secutiry? Discuss the three aspects of information security.
2. Briefly explain the types of security attacks? That are normally encountered. also
distinguish between them.
3. with the help of neat diagram explain the general format of a X.509 public key
certificate.
4. Explain the different authentication procedures in X.509 certificate.
Assingment-2
1. Write the summary of Kerberos version five message exchange.
2. With a neat diagram, explain network security model
3. List out the difference between Kerberos version 4 and version 5.
4. Describe the various security attacks and specific mechanisms covered by X.800
Dept of ISE,SJBIT Page 3
Information and Network Security 10IS835
UNIT 6
ELECTRONIC MAIL SECURITY
Assingment-1
1. With a flowchart explain the process of transmission and reception of PGP message.
2. Explain the PGP message generation and reception process.
3. Explain the different MIME content types.
4. With a neat diagram, explain the digital signature service provided by PGP
Assingment-2
1. Explain S/MIME certificate processing method.
2. Describe the steps involved in providing authentication and confidentiality by PGP,
with suitable illusions.
3 Discuss the limitations of SMTP and how MIME overcomes these Limitation
UNIT 7
IP SECURITY
Assingment-1
1. Explain the security association selector that determine the security policy
database entry.
2. Mention the important features of OAKLEY algorithm.
3. Explain the format of an ESP packet in IP security.
4. Describe SA parameters and SA selectors in detail.
UNIT 8
WEB SECURITY
Assingment-1
1. write short notes on SSL handshake protocol.
2. Explain the dual signature in SET protocol. What is its purpose?
3. Explain the different alert codes of TLS protocols.
4. List out the key features of secure transaction and explain in detail.
Dept of ISE,SJBIT Page 4

More Related Content

PPTX
ISO 270001 : Management Clause -10
PDF
1142996034 597183
PPTX
PhD-Guidance-in-Information-Security
PPTX
Lecture 07 networking
PDF
Gets cisco security training
PDF
ITrust Cybersecurity Services - Datasheet EN
PDF
Friday Forum ISO 27001: 2013
PPT
Secure Multicast Conferencing
ISO 270001 : Management Clause -10
1142996034 597183
PhD-Guidance-in-Information-Security
Lecture 07 networking
Gets cisco security training
ITrust Cybersecurity Services - Datasheet EN
Friday Forum ISO 27001: 2013
Secure Multicast Conferencing

What's hot (8)

PDF
ccna1_v5_capitulo1
PPTX
Activity1 c1
PDF
TI Safe ICS Cybersecurity Training
PDF
Cloud computing security infrastructure
PPTX
ISO/IEC 27032 – Guidelines For Cyber Security
PPTX
JDMDE Specialisation KaHo Sint-Lieven
ccna1_v5_capitulo1
Activity1 c1
TI Safe ICS Cybersecurity Training
Cloud computing security infrastructure
ISO/IEC 27032 – Guidelines For Cyber Security
JDMDE Specialisation KaHo Sint-Lieven
Ad

Similar to Ise viii-information and network security [10 is835]-assignment (20)

PDF
Network Security Certification
PDF
IRJET- Coordinates based Keying Scheme for WSN Security
PDF
cns ASSIGNMENT 2.pdf qwertyuiodfghjklghj
DOCX
1.4 NEED FOR SECURITY AT MULTIPLE LEVELS,SECURITY POLICIES.docx
DOCX
1.2 Security Trends in cryptography in network security
PDF
Overview of SMB, NetBIOS and other network attacks
PPT
Intro-2013.pptIntro-2013.pptIntro-2013.ppt
PDF
International Refereed Journal of Engineering and Science (IRJES)
PDF
Curriculum Vitae Summary
PDF
Securing the Future Safeguarding 5G Networks with Advanced Security Solutions...
PDF
Cisco cybersecurity essentials chapter - 2
PDF
Protecting Your Text Messages: SecurityGen's SMS Fraud Detection Solutions
PDF
Elevate Safety with Security Gen: Unraveling the Power of Signaling Security
PDF
SecurityGen's Pioneering Approach to 5G Security Services
PDF
Analysis of network_security_threats_and_vulnerabilities_by_development__impl...
PPT
Chapter 01
PDF
Internet of Things IoT Security Perspective
PDF
Session initiation protocol security considerations
Network Security Certification
IRJET- Coordinates based Keying Scheme for WSN Security
cns ASSIGNMENT 2.pdf qwertyuiodfghjklghj
1.4 NEED FOR SECURITY AT MULTIPLE LEVELS,SECURITY POLICIES.docx
1.2 Security Trends in cryptography in network security
Overview of SMB, NetBIOS and other network attacks
Intro-2013.pptIntro-2013.pptIntro-2013.ppt
International Refereed Journal of Engineering and Science (IRJES)
Curriculum Vitae Summary
Securing the Future Safeguarding 5G Networks with Advanced Security Solutions...
Cisco cybersecurity essentials chapter - 2
Protecting Your Text Messages: SecurityGen's SMS Fraud Detection Solutions
Elevate Safety with Security Gen: Unraveling the Power of Signaling Security
SecurityGen's Pioneering Approach to 5G Security Services
Analysis of network_security_threats_and_vulnerabilities_by_development__impl...
Chapter 01
Internet of Things IoT Security Perspective
Session initiation protocol security considerations
Ad

More from Vivek Maurya (19)

PDF
Unit8 tgb
PDF
System%20 modelling%20and%20simulation
PDF
Adhoc networks notes by divya (rnsit)
PDF
System modeling and simulation full notes by sushma shetty (www.vtulife.com)
PDF
Ise viii-system modeling and simulation [10 cs82]-solution
PDF
Ise viii-system modeling and simulation [10 cs82]-question paper
PDF
Ise viii-system modeling and simulation [10 cs82]-notes
PDF
Ise viii-system modeling and simulation [10 cs82]-assignment
PDF
Ise viii-software architectures [10 is81]-solution
PDF
Ise viii-software architectures [10 is81]-notes
PDF
Ise viii-information and network security [10 is835]-solution
PDF
Ise viii-software architectures [10 is81]-assignment
PDF
Ise viii-information and network security [10 is835]-question paper
PDF
Ise viii-ad-hoc networks [10 is841]-notes
PDF
Ise viii-ad-hoc networks [10 is841]-assignment
PDF
Adhoc notes by ashok kumar.pdf
PDF
VTU 8th Sem Notes Simulation
DOCX
Cloud Computing Security Issues in Infrastructure as a Service” report
PPT
Cloud Computing Security Issues in Infrastructure as a Service”
Unit8 tgb
System%20 modelling%20and%20simulation
Adhoc networks notes by divya (rnsit)
System modeling and simulation full notes by sushma shetty (www.vtulife.com)
Ise viii-system modeling and simulation [10 cs82]-solution
Ise viii-system modeling and simulation [10 cs82]-question paper
Ise viii-system modeling and simulation [10 cs82]-notes
Ise viii-system modeling and simulation [10 cs82]-assignment
Ise viii-software architectures [10 is81]-solution
Ise viii-software architectures [10 is81]-notes
Ise viii-information and network security [10 is835]-solution
Ise viii-software architectures [10 is81]-assignment
Ise viii-information and network security [10 is835]-question paper
Ise viii-ad-hoc networks [10 is841]-notes
Ise viii-ad-hoc networks [10 is841]-assignment
Adhoc notes by ashok kumar.pdf
VTU 8th Sem Notes Simulation
Cloud Computing Security Issues in Infrastructure as a Service” report
Cloud Computing Security Issues in Infrastructure as a Service”

Recently uploaded (20)

PDF
Exploratory_Data_Analysis_Fundamentals.pdf
PDF
737-MAX_SRG.pdf student reference guides
PDF
R24 SURVEYING LAB MANUAL for civil enggi
PPTX
CURRICULAM DESIGN engineering FOR CSE 2025.pptx
PPT
Total quality management ppt for engineering students
PDF
Integrating Fractal Dimension and Time Series Analysis for Optimized Hyperspe...
PPT
INTRODUCTION -Data Warehousing and Mining-M.Tech- VTU.ppt
PDF
keyrequirementskkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk
PPTX
Current and future trends in Computer Vision.pptx
PPTX
introduction to high performance computing
PDF
Categorization of Factors Affecting Classification Algorithms Selection
PPTX
Fundamentals of safety and accident prevention -final (1).pptx
PDF
III.4.1.2_The_Space_Environment.p pdffdf
PDF
EXPLORING LEARNING ENGAGEMENT FACTORS INFLUENCING BEHAVIORAL, COGNITIVE, AND ...
PPTX
Artificial Intelligence
PDF
86236642-Electric-Loco-Shed.pdf jfkduklg
PDF
Automation-in-Manufacturing-Chapter-Introduction.pdf
PPT
Introduction, IoT Design Methodology, Case Study on IoT System for Weather Mo...
PDF
BIO-INSPIRED ARCHITECTURE FOR PARSIMONIOUS CONVERSATIONAL INTELLIGENCE : THE ...
PDF
Soil Improvement Techniques Note - Rabbi
Exploratory_Data_Analysis_Fundamentals.pdf
737-MAX_SRG.pdf student reference guides
R24 SURVEYING LAB MANUAL for civil enggi
CURRICULAM DESIGN engineering FOR CSE 2025.pptx
Total quality management ppt for engineering students
Integrating Fractal Dimension and Time Series Analysis for Optimized Hyperspe...
INTRODUCTION -Data Warehousing and Mining-M.Tech- VTU.ppt
keyrequirementskkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk
Current and future trends in Computer Vision.pptx
introduction to high performance computing
Categorization of Factors Affecting Classification Algorithms Selection
Fundamentals of safety and accident prevention -final (1).pptx
III.4.1.2_The_Space_Environment.p pdffdf
EXPLORING LEARNING ENGAGEMENT FACTORS INFLUENCING BEHAVIORAL, COGNITIVE, AND ...
Artificial Intelligence
86236642-Electric-Loco-Shed.pdf jfkduklg
Automation-in-Manufacturing-Chapter-Introduction.pdf
Introduction, IoT Design Methodology, Case Study on IoT System for Weather Mo...
BIO-INSPIRED ARCHITECTURE FOR PARSIMONIOUS CONVERSATIONAL INTELLIGENCE : THE ...
Soil Improvement Techniques Note - Rabbi

Ise viii-information and network security [10 is835]-assignment

  • 1. Information and Network Security 10IS835 ASSIGNMENT QUESTIONS UNIT-I PLANNING FOR SECURITY Assingment-1 1. Who is responsible for policy management? How a policy is managed. Explain? Responsible individual. 2. Explain issue-specific Security policy? 3. Draw a systematic diagram showing the major steps in contingency Planning. Explain in Detail. Business impact analysis. 4. Explain the ISO/IEC 270 01 : 2005 plan-DO-Check-Act cycle. Assingment-2 1. Define policy and explain issue specific security policy. 2. What are the policies that must be defined by the management (of organizat ions) as per NIST SP 800-14 ? Describe briefly the specific areas covered by any two of these policies. 3. What are the components of contingency planning? Describe briefly the important steps involved in the recovery process after the extent of damage caused by an incident has been assessed. Dept of ISE,SJBIT Page 1
  • 2. Information and Network Security 10IS835 UNIT 2 SECURITY TECHNOLOGY: FIREWALLS AND VPNS Assingment-1 1 What is firewall? Show the working of screened host and dual homed firewall? 2 Explain the FIREWALL RULES. 3 What is VPN and explain the different techniques used to implement the VPN Virtual Private Network 4 Explain the screened subnet firewall. UNIT 3 SECURITY TECHNOLOGY – 2 Assingment-1 1. Differentiate between network based IDS and Host Based IDS emphasizing on their advantages and disadvantages . 2. Enumerates the advantages and disadvantages of using honey pots. 3. Explain the venerability scanners. 4. Define the following terms related to IDS : i. Alert ii. False attack stimulus iii. False negative iv. False positive v. True attack stimulus Dept of ISE,SJBIT Page 2
  • 3. Information and Network Security 10IS835 UNIT 4 CRYPTOGRAPHY Assingment-1 1. what is an encryption? Discuss the asymmetric and symmetric methods. 2. Explain the different categories of attacks on cryptosystem. 3. What are the difference between digital signature and digital certificate ? 4. Explain the two methods of encrypting plaintext. Assingment-2 1. List out the elements of cryptosystems and explain transposition cipher technique 2. Who can attack cryptosystems? Discuss different categories of attacks on cryptosystems 3. List out the elements of cryptosystem? UNIT 5 INTRODUCTION TO NETWORK SECURITY, AUTHENTICATION APPLICATIONS Assingment-1 1. what is meant by information secutiry? Discuss the three aspects of information security. 2. Briefly explain the types of security attacks? That are normally encountered. also distinguish between them. 3. with the help of neat diagram explain the general format of a X.509 public key certificate. 4. Explain the different authentication procedures in X.509 certificate. Assingment-2 1. Write the summary of Kerberos version five message exchange. 2. With a neat diagram, explain network security model 3. List out the difference between Kerberos version 4 and version 5. 4. Describe the various security attacks and specific mechanisms covered by X.800 Dept of ISE,SJBIT Page 3
  • 4. Information and Network Security 10IS835 UNIT 6 ELECTRONIC MAIL SECURITY Assingment-1 1. With a flowchart explain the process of transmission and reception of PGP message. 2. Explain the PGP message generation and reception process. 3. Explain the different MIME content types. 4. With a neat diagram, explain the digital signature service provided by PGP Assingment-2 1. Explain S/MIME certificate processing method. 2. Describe the steps involved in providing authentication and confidentiality by PGP, with suitable illusions. 3 Discuss the limitations of SMTP and how MIME overcomes these Limitation UNIT 7 IP SECURITY Assingment-1 1. Explain the security association selector that determine the security policy database entry. 2. Mention the important features of OAKLEY algorithm. 3. Explain the format of an ESP packet in IP security. 4. Describe SA parameters and SA selectors in detail. UNIT 8 WEB SECURITY Assingment-1 1. write short notes on SSL handshake protocol. 2. Explain the dual signature in SET protocol. What is its purpose? 3. Explain the different alert codes of TLS protocols. 4. List out the key features of secure transaction and explain in detail. Dept of ISE,SJBIT Page 4