Start Discovering Solved Questions and Your Course Assignments
TextBooks Included
Active Tutors
Asked Questions
Answered Questions
what is internetinternet is a collection of networks or network of networks various networks like lan and wan connected by suitable hardware and
what are the two types of transmission technologies basis on which computer networks can be categorized broadly there are two types of transmission
mention different categories of computer networks on the basis of scale and distinguish one from the otherlocal area network lanmetropolitan area
what are the two broad class classifications under which networks can be dividedall computer networks fit in one of the two dimensions
q factors effects the quality of image of monitorfour factors effects the quality of image of monitor 1 phosphor coating this affects the
q what is peripheral connect interfacepci signify peripheral connect interface its the revolutionary high speed expansion bus presented by intel
q security and reciprocity of rsasecurity and reciprocity of rsa - kp and n are issued publicly- ks is kept secret- since the snooper does not know p
q illustrate about rsa encryptionrsa encryption - public key encryption technique- encryption steps- encode data to be encrypted as a number to
q show the data encryption standarddata encryption standard - bit-level encryption method designed by ibm- adopted as standard for nonmilitary and
q show the character-level encryption- substitutional- monoalphabetic - simplest form also called caesar cipher- every character is replaced with
q categories of encryption - decryption categories of encryptiondecryption - symmetric-key - encryption key ke and the decryption key kd are the same
q describe about cryptography- some media cannot be protected from unauthorized reception or interception- encryption involves transforming the
q show vpns security and the internet model- vpns security and the internet model- application layer - provide for each application protocol other
q what are the trends in network security trends in network security improved vigilance for virus infections continual maturation of firewall
q building a defense in networkingwhen building a defense you must use a layered approach that includes securing- the network infrastructure the
q what are the tools sued for cryptography and web securitytools - cryptography vpn- remote accesspgp- emaildedicated circuits-tunnels- ipsectools -
q explain the types of security servicesecurity services fall into one of the subsequent categories- confidentiality confirms that the info in a
q what is aspects of security- security attack any action whichcompromises the security of information owned by an organization- security mechanism a
q what are the local network security issueslocal network security issues password protection- encrypted username amp passwordgroupowner ids- file
q describe network security and internetworking securitynetwork security - layers 5-7- securing the localized private domainnetwork administration
q show the security policy as well integrated security security policy is on paper statement describing what assets are to be protected and why who
q explain the communication channel threats secrecy threat - secrecy is the avoidance of unauthorized information disclosure- privacy is the guard of
q show the vulnerability of the internetmore vulnerable than private networkwide inter-network connectioneasy access by mass public world-widelack of
q show the importance of securitythe internet presents enormous business opportunitiesthe internet is open to public vulnerable to various attacksone
q define the network securitythe internet and web technology presents enormous promise for e-commerceweb now is used to handle important business