Archives Answers

Answer

Describe the waterfall model and evolutionary process model.

The Waterfall model is one of the earliest and most traditional software development life cycle (SDLC) models. It is a linear and sequential approach to software development, where each phase must be completed before the next phase begins. Key Characteristics:…

d. List and explain security requirements of database.

Database Security means keeping sensitive information safe and prevent the loss of data. Security of data base is controlled by Database Administrator (DBA). The following are the main control measures are used to provide security of data in databases: 1. Authentication2.…

CSS – Cryptography & System Security IMP Questions for IA 2

Module 1 Services , Mechanism and Attack Network Security model Keyed and keyless transposition technique Numericals: Playfair (But practice all) Module 2 Block cipher modes DES and Triple DES RSA Diffie Hellman (Knapsack and El-Gamal) Module 3 MAC, HMAC, CMAC…

Explain digital  signature scheme RSA. 

Digital Signature : As the name sounds are the new alternative to sign a document digitally. It ensures that the message is sent by the intended user without any tampering by any third party (attacker). In simple words, digital signatures are…

write short note on X.509  in CSS

X.509 is a digital certificate that is built on top of a widely trusted standard known as ITU or International Telecommunication Union X.509 standard, in which the format of PKI certificates is defined. X.509 digital certificate is a certificate-based authentication…

short note on DNS attack

Domain Name Server is a prominent building block of the Internet. It’s developed as a system to convert alphabetical names into IP addresses, allowing users to access websites and exchange e-mails. DNS is organized into a tree-like infrastructure where the first…

Enable Notifications OK NO