Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Group presentation ii
1. Use illustrations and diagrams : 23rd
-03-2016 Network security & cryptography presentation II
Group presentation II (illustrations, pictures and diagrams are encouraged)
Group 1: VPN
1. explain seven legal issues in computer and Network/ data security
2. Explain a Virtual Private Network (VPN), and show how it is implemented.
3. Explain the following types of VPNs
i. Access VPNs
ii. Intranet VPNs
iii. Extranet VPNs
Group 2: Routers and access lists
1. Explain the steps of configuring a router
2. Discuss a routing table
3. Write notes about access lists and how these can be implemented
4. Define risk management and explain the strategies and approaches for controlling risks
Group 3: security
1. Which security protocols are best used in web based electronic e commerce
2. List the various components of an information system
3. There are four basic forms of a cryptographic attacks explain them
4. Write short notes on the following types of firewall architectures
i. Application level filter/ Stateful Packet Filters
ii. Packet filter
iii. Circuit filter
Group 4: security
1. Explain the security risks and threats on a Wireless Access Points (WAPs) and these
can be prevented i.e. (Wireless Network Security Controls)
2. Briefly explain the types of Access Control
3. Write note about the following wireless Encryption methods
i. WEP
ii. WPA
iii. WPA2
2. Use illustrations and diagrams : 23rd
-03-2016 Network security & cryptography presentation II
Group 5 LAN Security
1. In just a paragraph, explain
i. Policy-Based Network Management
ii. Segmenting LAN Traffic
iii. Honeypot Systems
iv. Twisted Pair
v. Microwave communications
vi. Infrared
vii. Dedicated Lease Lines
viii. Packet-Switched Networks
ix. Frame Relay
x. Digital Subscriber Line (xDSL)
xi.
2. Discuss the legal issues in data/communication/Net work security giving their
jurisdictions (this is a big question take time to research)
Group 6: Routers and SNMP (we shall look at the practical part of this in class)
Routers are network devices that operate at the network layer (layer 3) of the OSI model that are
employed to connect two or more networks. They serve three primary purposes. First, they route
network traffic based on predetermined rules or routing tables. Second, they segment frames for
transmission between LANs. For example, they can frame 10-Mbps Ethernet LAN frames for
transmission on a 16-Mbps token ring LAN or a frame relay connection WAN.
Third, routers provide the ability to deny or block unauthorized traffic. This can be accomplished
through filtering commands that limit certain protocols (i.e., http, ftp, snmp) or by employing
access lists that control the IP addresses that are allowed through.
basic concept behind a router.
3. Use illustrations and diagrams : 23rd
-03-2016 Network security & cryptography presentation II
1. Explain risk associated with routers in a net work
2. Explain the following
i. Cisco IOS
ii. Simple Network Management Protocol (SNMP)
iii. Node-to-Node Encryption
iv. IPSec
v. IPSec Tunnel Mode
vi.
i.
Group 7: Fire walls
1. Explain a fire wall giving their Pros and cons
2. Explain the following most widely implemented fire wall architectures.
i. Screening routers;
ii. Bastion hosts;
iii. Dual-homed hosts;
iv. Screened hosts;
v. Screened subnets.
Group 8: Crisis Management
1. Write notes about
i. Computer Security Incident Response Plan
ii. Outsourcing Plan Development and Maintenance
iii. Disaster Recovery Planning Case Study
iv. Statistical-Based Intrusion Detection Systems
4. Use illustrations and diagrams : 23rd
-03-2016 Network security & cryptography presentation II
v. Knowledge-Based Intrusion Detection Systems
vi. Network-Based Intrusion Detection Systems
vii. Host-Based Intrusion Detection Systems
2. Using the Kerberos key exchange, explain with a diagram how Alice and Bob may have a
secure communication