NS_Ec4 Answersadfdf Key- Offshore %28 R%29%29

4

Click here to load reader

description

fsdfsdfsdfsdf

Transcript of NS_Ec4 Answersadfdf Key- Offshore %28 R%29%29

Part-A1. Notarization

2. RBAC

3. Padding

4. set of rules

5. Interruption

6. Integrity

7. Time Stamping

8. One

9. Confidentiality

10. 4

Part-B

Advantages

Cost savingsVPNs can eliminate the need for an expensive long-distance leased connection.

ScalabilityWith VPNs additional users can be easily added to a hardware-based VPN simply by connecting that device to the existing network.

Full protectionVPN encrypts all transmissions from the client and not just certain applications.

SpeedCompared to dial-up connections VPN can provide dramatically increased bandwidth. VPN can also compress data and increase the speed of the transmission.

TransparencyOnce a VPN is set up, it is basically invisible to the user.

AuthenticationVPN can ensure that only authorized users have access to information.

Industry standardsVPNs can take advantage of industry-wide protocol standards.

Disadvantages

ManagementVPNs require an in-depth understanding of public network security issues and taking proper precautions in their deployment.

Availability and performanceThe availability and performance of a VPN over the public networks like the Internet depends on factors largely outside of the control of the organization.

InteroperabilityVPN technologies from different vendors may not work well together.

Additional protocolsVPNs need to accommodate protocols other than IP.

Performance impactAlthough small, there is a negative performance impact when using software-based VPNs.

ExpenseHardware-based VPNs for multiple users can be expensiveAuthentication credentials can be combined to provide extended security. These combinations create different authentication models. They are single factor authentication, multifactor authentication and single sign-on.

Single factor Authentication

Using only one authentication credential, such as requiring a user to enter a password (what a person knows), is known as one-factor authentication or Single factor authentication. However, using only one credential can compromise security if that single credential is lost or stolen. Adding additional security credentials increases the strength of authentication.

Multi-factor Authentication1. Two-factor authentication, such as using an OTP (what a person has) and a password (what a person knows), enhances security, particularly if different types of authentication methods are used.

2. Three-factor authentication requires that a user present three different types of authentication credentials.

Single Sign-on Identity management is using a single authenticated ID to be shared across multiple networks. When those networks are owned by different organizations, it is called federated identity management (FIM). One application of FIM is called single sign-on (SSO),or using one authentication to access multiple accounts or applications. SSO holds the promise of reducing the number of usernames and passwords that users must memorize (potentially it could be reduced to just one)Typically data security is concerned with three broad categories: Confidentiality, Integrity, and Availability. We may also include Non-repudiation.

1. Confidentiality encompasses making sure that data that is supposed to be restricted to the company only or to only a few people within the company or to the company and business partners isn't divulged to anyone else. Companies worry about someone hacking into their networks, about industrial espionage, about insiders deliberately disclosing confidential information, about employees being careless with information, about mobile devices like laptops and smart phones containing sensitive data being lost or stolen, and about how to protect the data without making it too difficult for authorized persons to get access to the data.

2. Integrity involves making sure that there are no changes to data except those you want to happen - like when an executive updates a policy document or when the amount of money in an account is changed as accounts receivable are paid. Companies worry about corruption of transmitted data, deliberate and accidental changes by hackers, malicious changes by insiders, etc.

3. Availability is being able to get the data when you need it. Companies worry about losing data from hard disk crashes, accidental file deletions, getting locked out of accounts, denial of service accounts on the company computers and web site(s), authorized persons being denied access, lost encryption keys that would thus render encrypted files unreadable, etc.

4. Non-repudiation is being able to prove what was sent, when it was sent, and who sent it as well as what was delivered, when it was delivered and who received it. This is especially important in financial transactions and contracts

Five Attributes

On-demand self-service

The cloud offers on-demand self-service; this means that the cloud can be used as and when required without prior subscription. It does not require prebooking or phased-delivery for the consumer; hence, there is no need for under or over subscription in the cloud.

Ubiquitous network access

The cloud offers almost infinite network access to vast infrastructure and computing resources, such as storage facility, memory, processor, hosting and myriad applications.

Location independence and homogeneity

The cloud uses a shared pool of resources, platforms and infrastructure residing on the Internet, which is located at various parts of the world, making the cloud location-independent. The services offered in the cloud are homogenous. The same service is provided exactly in the same way to all users. This is because of its multi-tenancy delivery model.

Elastically scalable

Cloud computing capabilities, such as storage, computing power, processing and hosting are elastic; resources are pooled together to provide vast amount of computing power.

Measured service

Cloud computing services are measured; each service purchased or utilized by a consumer is measured and billed accordingly.

A open source software (oss) has a anarchistic way or organizing projects (i.e., it does not have a hierarchical structure, and, hence, seemingly headless) and has many distributed, loosely collaborating developers. However, a oss, unlike a closed source software (css) has no/minimal cost associated with it for acquiring and using. This absence of cost also makes the oss suspect of quality for any serious use. Hence, it is imperative that OSS projects produce software of high quality so that they are accepted and widely used. One important way, quality can be ensured in oss development is through configuration management.

Configuration management (CM) involves tools and procedures that control changes, such as version changes, updates or bug fixes, to a software application. Because most software systems are not the result of a single programmer, but are composites created by bringing together individual program modules, any change to an existing software program must accomplish the change objective without affecting other modules in the program

Without proper control mechanisms, projects, especially those of the oss, can easily get out of hand and result in program changes that do not meet user or delivery requirements, are of poor quality, and cost more to produce. The purpose for employing configuration management is to avoid software configuration problems and maximize productivity. This is more so for an environment like oss development. It focuses on establishing and maintaining consistent program performance by managing and controlling changes made throughout the product lifecycle. This includes product documentation, as well as internal program changes.

Let the BITS ID of the associate be 2011HZ28579. Subject code is SECTZG513.

The super-increasing knapsack of four weights from the above is 1,2,5,9

Take a number m greater than the sum of all the numbers in the sequence.

Let m=19

Take a number n such that n and m do not have any common factors

Let n=15

Creating normal knapsack from the super increasing knapsack

super increasing knapsack = 1,2,5,9

Step-1 = 1*15, 2*15, 5*15 ,9*15 = 15,30,75,135

Step-2 = 15mod19, 30mod19, 75mod19, 135mod19 = 15,11,18,2

Normal knapsack = 15,11,18,2

Encryption - use normal knapsack 15,11,18,2

Clear Text - MILK

M=1101=1*15+1*11+0*18+1*2=15+11+0+2=28

I=1001=1*15+0*11+0*18+1*2=15+0+0+2=17

L=1100=1*15+1*11+0*18+0*2=15+11+0+0=26

K=1011=1*15+0*11+1*18+1*2=15+0+18+2=35

CIPER TEXT=28,17,26,35

Decryption = use super increasing knapsack 1,2,5,9

CIPER TEXT=28,17,26,35

Let d=14 so that (14*15)mod19=1

(28*14)mod19,(17*14)mod19,(26*14)mod19,(35*14)mod19=12,10,3,15

From the super increasing knapsack

12 corresponds to 1101 (i.e. 1*1+1*2+0*5+1*9=12)

10 corresponds to 1001

3 corresponds to 1100

15 corresponds to 1011

Binary 1101 corresponds to number 1*8+1*4+0*2+1*1=13 which in turn corresponds to alphabet M

Binary 1001 corresponds to number 1*8+0*4+0*2+1*1=9 which in turn corresponds to alphabet I

Binary 1100 corresponds to number 1*8+1*4+0*2+0*1=12 which in turn corresponds to alphabet L

Binary 1011 corresponds to number 1*8+0*4+1*2+1*1=11 which in turn corresponds to alphabet K

Recovered Plain Text = MILK

2014-June-EC-4-QP AK Set-1