Chapter 4:
- Needham-Schroeder Protocol
- Define Digital Signature and Explain Any Digital Signature Algorithm in Detail
- Explain RSA Digital Signature
- Digital Signature & Digital Certificate
Chapter 5:
- Explain Memory and Address Protection in Detail
- Write a Note on File Protection
- Explain Database Security; What Do You Understand by Multilevel Database Security?
- Explain Multilevel Database Security
Chapter 6:
- Secure Socket Layer Protocol: Short Note
- Explain Handshake Protocol
- Short Note on Web Browser
- Explain Clickjacking and Session Hijacking
- Short Note: Email & DNS Attacks
- Explain Different Types of Firewalls and the Layers in Which They Operate
- Explain the Handshake
Team Answered question May 16, 2024
Module 1
Services , Mechanism and Attack
Network Security model
Keyed and keyless transposition technique
Numericals: Playfair (But practice all)
Module 2
Block cipher modes
DES and Triple DES
RSA
Diffie Hellman
(Knapsack and El-Gamal)
Module 3
MAC, HMAC, CMAC
Hash function
MD5 & SHA-1
X.509
PKI
Module 4
Digital signature and certificate
Digital signature algorithm
Needham Schroeder
Module 5
Memory and Address protection
File protection
Vulnerabilities of Linux and windows
Database security
Database security requirements
Multivel database security
Module 6
SSL
Web browser attacks
Click jacking
Cross site request forgery
Session hijacking and management
Phishing technique
DNS attack
Email attack
Firewall
Team Answered question May 16, 2024