Documente Academic
Documente Profesional
Documente Cultură
Department(s)
: ECE
Semester
: 08
Subject Title
: NETWORK SECURITY
Course Instructor
: HARSHA B. K.
Course duration
Section(s)
:A&B
Subject Code:10EC832
Lectures/week: 05
QUESTION BANK
Unit- I INTRODUCTION
1. Draw the model of network security. Explain it briefly
2. Distinguish between passive and active attacks. Discuss the functioning of following
attacks with diagrams
a) Masquerade b) Replay C) modification of messages d) Denial of service
3. Give the table showing relationship between security services and mechanisms
4. Explain Gatekeeper function and security recovery
5. Classify the various security attacks and define them
6. Explain the types of attacks on encrypted messages.
7. List the different security mechanisms defined in X.800
16. Encrypt the plaintext= SECURITY using Hill Cipher technique. Key =
17. In S-DES, 10 bit key is 1010000010. Find the subkeys and, if = 3 5 2 7 4 10 1
9 8 6 and = 6 3 7 4 8 5 10 9
18. Discuss the evaluation criteria of AES
19. With a schematic diagram, explain the S- DES encryption and decryption process,
highlighting the key generation phase.
20. Explain the counter mode of block ciphers. What are its advantages?
1.
2.
3.
4.
5.
6.
7.
UNIT-6- INTRUDERS
Explain the architecture of a distributed intrusion detection system. Give the major
issues in the design
Briefly explain the UNIX password scheme. What are the threats to this scheme? How
are they overcome?
Give examples of metrics that are useful for profile based intrusion detection.
Briefly describe the three classes of intruder.
Explain the password selection strategies in detail? Compare their relative merits.
With a schematic, explain the typical steps in digital immune system.
Write short notes on (i) Rule based intrusion detection (ii) Statistical anomaly detection
8. What are the two common techniques used to protect a password file?
9. List and briefly define four techniques used to avoid guessable passwords
10. What is a salt in the context of UNIX password management?
11. Briefly explain honey pots.
12. With a schematic explain the loading of a new password.
13. Explain Audit Records
14. Write a note on the vulnerability of passwords.
UNIT 8- FIREWALLS
1.
2.
3.
4.
Literature:
Book Type
Code
Text Book
TB
Cryptography and
William Stalling,
References
RB1
References
RB2
Network
Security,
Publication info
Edition
&
Publisher
Pearson
Education, 2003.
Security,
ISBN #
81-203-2385-8
TMH, 2007.
978-0-07-0660465
TMH, 2003.
81-203-1278-3