CUSTOMER_CODE SMUDE DIVISION_CODE SMUDE EVENT_CODE OCTOBER15 ASSESSMENT_CODE BB0025_OCTOBER15 QUESTION_TYPE DESCRIPTIVE_QUESTION QUESTION_ID 74058 QUESTION_TEXT List and explain types of network policies. SCHEME OF EVALUATION Network service access policy: 5 marks • It is a high level policy defines those services to be allowed or explicitly denied from the restricted network • Includes everything from document shredders to virus scanners, remote access to removable media tracking • Firewall implements one of two network service access policies: • Either allowing access to the internet from the site but allowing no access to the site from the internet • Allowing some access from the internet, but only to selected systems such as information servers and e-mail servers • At the highest level, the overall organizational policy might state the following principles • Information is vital to the economic well being of the organization • Every cost-effective effort will be made to ensure the confidentiality ,integrity,authenticity,availability and utility of the organization’s information • Protecting the confidentiality,integrity and availability of these information resources is a priority and a job responsibility for all employees at all levels of the company • All information-processing facilities belonging to the organization will be used for authorized purposes Firewall design policy: 5 marks • It is lower-level policy that describes how the firewall will actually go about restricting the access and filtering the services as defined in the network service access policy • Firewalls generally implement one of the two basic design policies • Permissive approach: Permit any service unless it is expressly denied • Restrictive approach: Deny any service unless it is expressly permitted QUESTION_TYPE DESCRIPTIVE_QUESTION QUESTION_ID 74059 QUESTION_TEXT Explain Electronic Cheque and its superiority over paper cheque. SCHEME OF EVALUATION Electronic Cheque 2 marks • It has all the features as a paper cheque. • It functions as a message to the sender’s bank to transfer funds, the message is given to the receiver, whoin turn endorses the cheque and presents it to the bank to obtain funds • Following two provides the electronic cheque for online payment Financial Services Technology Corporation(FSTC) 3 marks • Offers users a choice of payment instruments that allow to designate an electronic cheque as a certified cheque. • FSTC plans for electronic cheques including money transfer and transactions involving the national automated clearing house association for transferring funds between banks, business could use the FSTC scheme to pay invoices from other businessers Cyber Cash 3 marks • Cyber cash will not serve as an intermediate party for processing cheques, instead these functions will be handles directly by banks • It does not provide multiple payment options Superiority of electronic cheque over paper cheque2marks • Customer can encrypt his/her account number with banks public key there by not revealing account number to the web merchant • Digital certificates can be used to authenticate the payer, payer’s bank and bank account QUESTION_TYPE DESCRIPTIVE_QUESTION QUESTION_ID 102446 QUESTION_TEXT Write a note on some security threats and solution and also discuss message security. SCHEME OF EVALUATION 1. Threat: Data Intercepted, read or modified illicitly 2. Threat: False identity with an intention of fraud 3. Threat: Unauthorized user on one network gains access to another (4.5 marks) Message Security Encryption is a cryptographic technology to scramble the data with a key so that no one can make sense of it while it’s being transmitted. When data reaches its destination, the information unscrambled using same or different key. There are two types of crypto-systems: secret key and public key. In secret key cryptography also referred to as symmetric cryptography, the same key is used for both encryption and decryption. The most popular secret key crypto-system in use today is known as DES, the Data Encryption Standard. IBM developed DES. In public key cryptography, each user has a public key and a private key. The public key is made public while the private key remains secret. Encryption is performed with the public key while decryption is done with the private key. The RSA public cryptosystem is the most popular form of public key cryptography. RSA stands for Rivest, Shamir, Adleman the inventors of RSA cryptosystem (5.5 marks) (4.5 + 5.5 = 10 marks) QUESTION_TYPE DESCRIPTIVE_QUESTION QUESTION_ID 102447 Discuss Digital signature. QUESTION_TEXT Each message produces a random message digest using the conversion formula. Private Key is used to encrypt that digest to obtain digital signature. Or in other words encrypted message digest (private key is used for encryption) called digital signature (Hash function-> message digest) ---------------------- encrypt ------Digital Signature SCHEME OF EVALUATION (2 marks) Verification of digital signature Say person X is sending the message to person Y Steps: To send the message (X sends to Y) a. Develop message digest for each message b. Encrypt the digest using X private key c. Combine the plain text with signature and send it to person Y throughout internet (1.5 marks) To receive message a. Decry[t digital signature with X’s public key b. Calculate the message digest using hash function c. Compare the each message digest, calculated and decrypted d. If both message digest’s are same – then it Is authentic, if not signature or message has been tampered (2.5 marks) Advantage: Unauthorized persons can access to the public key of the person X but cannot have his (X) hash function, which makes the digital signature authentic (2 marks) Disadvantage: As the body of the message is sent as plain text, privacy is not maintained. To overcome this difficulty when privacy is important, one could use symmetric algorithm for plain text. (2 marks) (2+1.5+2.5+2+2= 10 marks)