SlideShare a Scribd company logo
1 of 4
Download to read offline
Use illustrations and diagrams : 23rd
-03-2016 Network security & cryptography presentation II
Group presentation II (illustrations, pictures and diagrams are encouraged)
Group 1: VPN
1. explain seven legal issues in computer and Network/ data security
2. Explain a Virtual Private Network (VPN), and show how it is implemented.
3. Explain the following types of VPNs
i. Access VPNs
ii. Intranet VPNs
iii. Extranet VPNs
Group 2: Routers and access lists
1. Explain the steps of configuring a router
2. Discuss a routing table
3. Write notes about access lists and how these can be implemented
4. Define risk management and explain the strategies and approaches for controlling risks
Group 3: security
1. Which security protocols are best used in web based electronic e commerce
2. List the various components of an information system
3. There are four basic forms of a cryptographic attacks explain them
4. Write short notes on the following types of firewall architectures
i. Application level filter/ Stateful Packet Filters
ii. Packet filter
iii. Circuit filter
Group 4: security
1. Explain the security risks and threats on a Wireless Access Points (WAPs) and these
can be prevented i.e. (Wireless Network Security Controls)
2. Briefly explain the types of Access Control
3. Write note about the following wireless Encryption methods
i. WEP
ii. WPA
iii. WPA2
Use illustrations and diagrams : 23rd
-03-2016 Network security & cryptography presentation II
Group 5 LAN Security
1. In just a paragraph, explain
i. Policy-Based Network Management
ii. Segmenting LAN Traffic
iii. Honeypot Systems
iv. Twisted Pair
v. Microwave communications
vi. Infrared
vii. Dedicated Lease Lines
viii. Packet-Switched Networks
ix. Frame Relay
x. Digital Subscriber Line (xDSL)
xi.
2. Discuss the legal issues in data/communication/Net work security giving their
jurisdictions (this is a big question take time to research)
Group 6: Routers and SNMP (we shall look at the practical part of this in class)
Routers are network devices that operate at the network layer (layer 3) of the OSI model that are
employed to connect two or more networks. They serve three primary purposes. First, they route
network traffic based on predetermined rules or routing tables. Second, they segment frames for
transmission between LANs. For example, they can frame 10-Mbps Ethernet LAN frames for
transmission on a 16-Mbps token ring LAN or a frame relay connection WAN.
Third, routers provide the ability to deny or block unauthorized traffic. This can be accomplished
through filtering commands that limit certain protocols (i.e., http, ftp, snmp) or by employing
access lists that control the IP addresses that are allowed through.
basic concept behind a router.
Use illustrations and diagrams : 23rd
-03-2016 Network security & cryptography presentation II
1. Explain risk associated with routers in a net work
2. Explain the following
i. Cisco IOS
ii. Simple Network Management Protocol (SNMP)
iii. Node-to-Node Encryption
iv. IPSec
v. IPSec Tunnel Mode
vi.
i.
Group 7: Fire walls
1. Explain a fire wall giving their Pros and cons
2. Explain the following most widely implemented fire wall architectures.
i. Screening routers;
ii. Bastion hosts;
iii. Dual-homed hosts;
iv. Screened hosts;
v. Screened subnets.
Group 8: Crisis Management
1. Write notes about
i. Computer Security Incident Response Plan
ii. Outsourcing Plan Development and Maintenance
iii. Disaster Recovery Planning Case Study
iv. Statistical-Based Intrusion Detection Systems
Use illustrations and diagrams : 23rd
-03-2016 Network security & cryptography presentation II
v. Knowledge-Based Intrusion Detection Systems
vi. Network-Based Intrusion Detection Systems
vii. Host-Based Intrusion Detection Systems
2. Using the Kerberos key exchange, explain with a diagram how Alice and Bob may have a
secure communication

More Related Content

Viewers also liked

Cisneros: A Change of Guard
Cisneros: A Change of GuardCisneros: A Change of Guard
Cisneros: A Change of GuardAdriana Cisneros
 
Puñalica
PuñalicaPuñalica
PuñalicaKevZco
 
Primero a Focalizar
Primero a FocalizarPrimero a Focalizar
Primero a FocalizarPerú 2021
 
The foundation of world politics
The foundation of world politicsThe foundation of world politics
The foundation of world politicslarrypeter369
 
Stormy Bradley's Resume 2015
Stormy Bradley's Resume 2015Stormy Bradley's Resume 2015
Stormy Bradley's Resume 2015Stormy Bradley
 
Simon Lambart CV - April 2016
Simon Lambart CV - April 2016Simon Lambart CV - April 2016
Simon Lambart CV - April 2016Simon Lambart
 
Object Oriented Programming
Object Oriented ProgrammingObject Oriented Programming
Object Oriented ProgrammingSerdar Cavdar
 
Domestic Violence agaisnt Women Short Film ideas
Domestic Violence agaisnt Women Short Film ideasDomestic Violence agaisnt Women Short Film ideas
Domestic Violence agaisnt Women Short Film ideasVarshini1999
 

Viewers also liked (10)

Cisneros: A Change of Guard
Cisneros: A Change of GuardCisneros: A Change of Guard
Cisneros: A Change of Guard
 
Puñalica
PuñalicaPuñalica
Puñalica
 
Primero a Focalizar
Primero a FocalizarPrimero a Focalizar
Primero a Focalizar
 
VRTBIteamapproach
VRTBIteamapproachVRTBIteamapproach
VRTBIteamapproach
 
The foundation of world politics
The foundation of world politicsThe foundation of world politics
The foundation of world politics
 
Stormy Bradley's Resume 2015
Stormy Bradley's Resume 2015Stormy Bradley's Resume 2015
Stormy Bradley's Resume 2015
 
Simon Lambart CV - April 2016
Simon Lambart CV - April 2016Simon Lambart CV - April 2016
Simon Lambart CV - April 2016
 
Object Oriented Programming
Object Oriented ProgrammingObject Oriented Programming
Object Oriented Programming
 
Domestic Violence agaisnt Women Short Film ideas
Domestic Violence agaisnt Women Short Film ideasDomestic Violence agaisnt Women Short Film ideas
Domestic Violence agaisnt Women Short Film ideas
 
Riesgos laborales
Riesgos laboralesRiesgos laborales
Riesgos laborales
 

Similar to Group presentation ii

Domain 4 - Communications and Network Security
Domain 4  - Communications and Network SecurityDomain 4  - Communications and Network Security
Domain 4 - Communications and Network SecurityMaganathin Veeraragaloo
 
Important 16 marks questions
Important 16 marks questionsImportant 16 marks questions
Important 16 marks questionsvaidheeswari
 
Chapter 2. vantage understanding sensor placement in networks
Chapter 2. vantage  understanding sensor placement in networksChapter 2. vantage  understanding sensor placement in networks
Chapter 2. vantage understanding sensor placement in networksPhu Nguyen
 
Centralized monitoring station for it computing and network infrastructure1
Centralized monitoring station for it computing and network infrastructure1Centralized monitoring station for it computing and network infrastructure1
Centralized monitoring station for it computing and network infrastructure1MOHD ARISH
 
Analysis Of Internet Protocol ( IP ) Datagrams
Analysis Of Internet Protocol ( IP ) DatagramsAnalysis Of Internet Protocol ( IP ) Datagrams
Analysis Of Internet Protocol ( IP ) DatagramsEmily Jones
 
I030102056063
I030102056063I030102056063
I030102056063theijes
 
Multimedia network services and protocols for multimedia communications
Multimedia network services and protocols for multimedia communicationsMultimedia network services and protocols for multimedia communications
Multimedia network services and protocols for multimedia communicationsMazin Alwaaly
 
Computer networks lan
Computer networks lanComputer networks lan
Computer networks lanDeepak John
 
Analysis of network traffic by using packet sniffing tool wireshark
Analysis of network traffic by using packet sniffing tool wiresharkAnalysis of network traffic by using packet sniffing tool wireshark
Analysis of network traffic by using packet sniffing tool wiresharkIJARIIT
 
Snmp chapter7
Snmp chapter7Snmp chapter7
Snmp chapter7jignash
 
Bt 72 computer networks
Bt 72 computer networksBt 72 computer networks
Bt 72 computer networksPadam Thapa
 
DCN-chapter1.pdf
DCN-chapter1.pdfDCN-chapter1.pdf
DCN-chapter1.pdfMakuBandar
 
Unit 3 Assignment 1 Osi Model
Unit 3 Assignment 1 Osi ModelUnit 3 Assignment 1 Osi Model
Unit 3 Assignment 1 Osi ModelJacqueline Thomas
 
Nagios Conference 2013 - William Leibzon - SNMP Protocol and Nagios Plugins
Nagios Conference 2013 - William Leibzon - SNMP Protocol and Nagios PluginsNagios Conference 2013 - William Leibzon - SNMP Protocol and Nagios Plugins
Nagios Conference 2013 - William Leibzon - SNMP Protocol and Nagios PluginsNagios
 

Similar to Group presentation ii (20)

Domain 4 - Communications and Network Security
Domain 4  - Communications and Network SecurityDomain 4  - Communications and Network Security
Domain 4 - Communications and Network Security
 
Important 16 marks questions
Important 16 marks questionsImportant 16 marks questions
Important 16 marks questions
 
Basics of Computer Networks
Basics of Computer NetworksBasics of Computer Networks
Basics of Computer Networks
 
Chapter 2. vantage understanding sensor placement in networks
Chapter 2. vantage  understanding sensor placement in networksChapter 2. vantage  understanding sensor placement in networks
Chapter 2. vantage understanding sensor placement in networks
 
Bt0072
Bt0072Bt0072
Bt0072
 
Centralized monitoring station for it computing and network infrastructure1
Centralized monitoring station for it computing and network infrastructure1Centralized monitoring station for it computing and network infrastructure1
Centralized monitoring station for it computing and network infrastructure1
 
Safe Trust Alert Routing in MANET
Safe Trust Alert Routing in MANETSafe Trust Alert Routing in MANET
Safe Trust Alert Routing in MANET
 
Net Man
Net ManNet Man
Net Man
 
Analysis Of Internet Protocol ( IP ) Datagrams
Analysis Of Internet Protocol ( IP ) DatagramsAnalysis Of Internet Protocol ( IP ) Datagrams
Analysis Of Internet Protocol ( IP ) Datagrams
 
I030102056063
I030102056063I030102056063
I030102056063
 
Multimedia network services and protocols for multimedia communications
Multimedia network services and protocols for multimedia communicationsMultimedia network services and protocols for multimedia communications
Multimedia network services and protocols for multimedia communications
 
Computer networks lan
Computer networks lanComputer networks lan
Computer networks lan
 
Firewall
FirewallFirewall
Firewall
 
Analysis of network traffic by using packet sniffing tool wireshark
Analysis of network traffic by using packet sniffing tool wiresharkAnalysis of network traffic by using packet sniffing tool wireshark
Analysis of network traffic by using packet sniffing tool wireshark
 
Snmp chapter7
Snmp chapter7Snmp chapter7
Snmp chapter7
 
Bt 72 computer networks
Bt 72 computer networksBt 72 computer networks
Bt 72 computer networks
 
Unit 1 qb
Unit 1 qbUnit 1 qb
Unit 1 qb
 
DCN-chapter1.pdf
DCN-chapter1.pdfDCN-chapter1.pdf
DCN-chapter1.pdf
 
Unit 3 Assignment 1 Osi Model
Unit 3 Assignment 1 Osi ModelUnit 3 Assignment 1 Osi Model
Unit 3 Assignment 1 Osi Model
 
Nagios Conference 2013 - William Leibzon - SNMP Protocol and Nagios Plugins
Nagios Conference 2013 - William Leibzon - SNMP Protocol and Nagios PluginsNagios Conference 2013 - William Leibzon - SNMP Protocol and Nagios Plugins
Nagios Conference 2013 - William Leibzon - SNMP Protocol and Nagios Plugins
 

Recently uploaded

SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college projectTonystark477637
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...ranjana rawat
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Call Girls in Nagpur High Profile
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)Suman Mia
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performancesivaprakash250
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).pptssuser5c9d4b1
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Christo Ananth
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...Call Girls in Nagpur High Profile
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...roncy bisnoi
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduitsrknatarajan
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdfankushspencer015
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations120cr0395
 
Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)simmis5
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 

Recently uploaded (20)

SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college project
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduits
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
 
Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
 

Group presentation ii

  • 1. Use illustrations and diagrams : 23rd -03-2016 Network security & cryptography presentation II Group presentation II (illustrations, pictures and diagrams are encouraged) Group 1: VPN 1. explain seven legal issues in computer and Network/ data security 2. Explain a Virtual Private Network (VPN), and show how it is implemented. 3. Explain the following types of VPNs i. Access VPNs ii. Intranet VPNs iii. Extranet VPNs Group 2: Routers and access lists 1. Explain the steps of configuring a router 2. Discuss a routing table 3. Write notes about access lists and how these can be implemented 4. Define risk management and explain the strategies and approaches for controlling risks Group 3: security 1. Which security protocols are best used in web based electronic e commerce 2. List the various components of an information system 3. There are four basic forms of a cryptographic attacks explain them 4. Write short notes on the following types of firewall architectures i. Application level filter/ Stateful Packet Filters ii. Packet filter iii. Circuit filter Group 4: security 1. Explain the security risks and threats on a Wireless Access Points (WAPs) and these can be prevented i.e. (Wireless Network Security Controls) 2. Briefly explain the types of Access Control 3. Write note about the following wireless Encryption methods i. WEP ii. WPA iii. WPA2
  • 2. Use illustrations and diagrams : 23rd -03-2016 Network security & cryptography presentation II Group 5 LAN Security 1. In just a paragraph, explain i. Policy-Based Network Management ii. Segmenting LAN Traffic iii. Honeypot Systems iv. Twisted Pair v. Microwave communications vi. Infrared vii. Dedicated Lease Lines viii. Packet-Switched Networks ix. Frame Relay x. Digital Subscriber Line (xDSL) xi. 2. Discuss the legal issues in data/communication/Net work security giving their jurisdictions (this is a big question take time to research) Group 6: Routers and SNMP (we shall look at the practical part of this in class) Routers are network devices that operate at the network layer (layer 3) of the OSI model that are employed to connect two or more networks. They serve three primary purposes. First, they route network traffic based on predetermined rules or routing tables. Second, they segment frames for transmission between LANs. For example, they can frame 10-Mbps Ethernet LAN frames for transmission on a 16-Mbps token ring LAN or a frame relay connection WAN. Third, routers provide the ability to deny or block unauthorized traffic. This can be accomplished through filtering commands that limit certain protocols (i.e., http, ftp, snmp) or by employing access lists that control the IP addresses that are allowed through. basic concept behind a router.
  • 3. Use illustrations and diagrams : 23rd -03-2016 Network security & cryptography presentation II 1. Explain risk associated with routers in a net work 2. Explain the following i. Cisco IOS ii. Simple Network Management Protocol (SNMP) iii. Node-to-Node Encryption iv. IPSec v. IPSec Tunnel Mode vi. i. Group 7: Fire walls 1. Explain a fire wall giving their Pros and cons 2. Explain the following most widely implemented fire wall architectures. i. Screening routers; ii. Bastion hosts; iii. Dual-homed hosts; iv. Screened hosts; v. Screened subnets. Group 8: Crisis Management 1. Write notes about i. Computer Security Incident Response Plan ii. Outsourcing Plan Development and Maintenance iii. Disaster Recovery Planning Case Study iv. Statistical-Based Intrusion Detection Systems
  • 4. Use illustrations and diagrams : 23rd -03-2016 Network security & cryptography presentation II v. Knowledge-Based Intrusion Detection Systems vi. Network-Based Intrusion Detection Systems vii. Host-Based Intrusion Detection Systems 2. Using the Kerberos key exchange, explain with a diagram how Alice and Bob may have a secure communication