1. Cryptography is a science which is used in encryption and decryption of data. Describe how the following cryptographic algorithm
Secret Key Cryptography (SKC): - DES and AES
Public Key Cryptography (PKC): - RSA and Deffie Hellman
2. Describe S/Mime Concept
3. With one diagram show the Message Authentication Code for authentication and Confidentiality
1. Describe Whirlpool Logic
2. Describe the penetration testing as applied in system security
3. List the main components of SAN Architecture
4. Explain SIP session setup as applied in VOIP Security
5. Describe Network Forensic and biometrics technology
6. Radio Frequency Identification Systems (RFID) use tags to annotate and identify object. Describe the entire RFID Security Architecture stating the functions of each component
7. With one diagram show the Message Authentication Code for authentication and Confidentiality
8. Select a company of your choice and analyze security standards and describe various Network Security threats that they face and how they can be resolved using various Architecture.