Salman bin Abdul-Aziz University College Of Business Administration DEPARTMENT OF MANAGEMENT INFORMATION SYSTEMS MIS 430 – Information Security Assignment 4 Student Name Student Number Due Date 11th May,2013 (Saturday) Signature General Instructions The assignment should clearly mention the student name and student number. Please read all the questions carefully. Answer all the questions. Late submissions will be penalized 10 points per day. 1 DEPARTMENT OF MANAGEMENT INFORMATION SYSTEMS Salman bin Abdul-Aziz University College Of Business Administration DEPARTMENT OF MANAGEMENT INFORMATION SYSTEMS 1. _____________________ is a method of packaging packets so that they can travel a network in a secure and confidential manner. 2. The _____________________ acts like a buffer zone between the Internet (un-trusted zone) and internal network (trusted zone). 3. _____________________ involves using a laptop and software to find wireless networks from outside the premises. 4. The ability to observe the network traffic; username, password and data is called as _____________________. 5. _____________________ is commonly used in remote control devices, wireless devices like printers, keyboards, mice and PDA’s. 6. _____________________ is used to describe a specific portion of the RF spectrum that is used for communication as well as other tasks such as cooking. 7. _____________________ is the most common and widely used method of wireless communication. 8. _____________________ cable uses a beam of laser light to connect devices over a thin glass wire. 9. The biggest advantage of fiber optic cables is the higher bandwidth. a. True b. False 10. The biggest disadvantage of fiber optic cables is the cost. a. True b. False 11. _____________________ cables are very common in connecting TV’s to cable services or satellite. 12. Media operates at the _____________________ layer of the OSI model. 13. _____________________ are set up in a shared arrangement; this allows the neighbor to sniff the network traffic. 14. Installing a firewall is the best security measure to secure a cable/DSL. a. True b. False 2 DEPARTMENT OF MANAGEMENT INFORMATION SYSTEMS Salman bin Abdul-Aziz University College Of Business Administration DEPARTMENT OF MANAGEMENT INFORMATION SYSTEMS 15. A _____________________ modem provides a direct digital connection between a subscribers computer and an Internet connection at the local telephone company’s switching station. 16. A _____________________ is a node on a network that serves as an entrance to another network. 17. Gateway works at all the 7 layers of OSI model. a. True b. False 18. Routers operate at _____________________ layer. 19. A _____________________ is software or a hardware device that connects two LAN’s or two segments of the same LAN. 20. Bridge is a layer _____________________ device. 21. Switch operates at the _____________________ layer (DLL) of OSI model. 22. Switch is an active device a. True b. False 23. Hub is a passive device a. True b. False 24. Hub operates at _____________________ layer of OSI model. 25. A _____________________ is a simple hardware device that receives a weak signal and regenerates it. 26. Repeaters are used at _____________________ layer of the OSI Model. 27. _____________________ is the science of keeping information secure in terms of confidentiality and integrity. 28. The process used to encrypt the plaintext or decrypt the cipher-text is referred to as _____________________. 29. The _____________________ involves shifting each letter of the plaintext message by a certain number of letters. 30. “University” can be transformed to _____________ by forward shifting 3 bits. 3 DEPARTMENT OF MANAGEMENT INFORMATION SYSTEMS Salman bin Abdul-Aziz University College Of Business Administration DEPARTMENT OF MANAGEMENT INFORMATION SYSTEMS 31. Symmetric algorithms use only one key. a. True b. False 32. Asymmetric algorithms use multiple keys. a. True b. False 33. A _____________________ cipher takes a predetermined number of bits, known as block, in the plaintext message and encrypts that block. 34. A _____________________ cipher encrypts each bit in the plaintext message, 1 bit at a time. 35. Hash functions perform one-way encryption. a. True b. False 36. Hashing algorithm is a keyless algorithm. a. True b. False 37. _____________________ allow us to sign a message in order to enable detection of changes to the message contents. 38. A _____________________ is a special mathematical function that performs one-way encryption. 39. The hashing algorithm can be attacked with what is called _____________________. 40. Write short notes on SHA. (10 Points) 41. Write short notes on DES and AES. (10 Points) 42. Write short notes on MD2, MD 4 and MD5. (10 Points) 43. What are the common threats for a workstation? (10 Points) 44. Write short notes on Intrusion Detection Systems. Explain the Host Based IDS and Network based IDS. (10 points) 45. Write the two common ways to prevent the loss of data from removal media. (2 Points) 46. Write the two drawbacks of Infrared (IR). (2 points) 47. Write the advantage of Microwave. (4 points) 48. Explain the two types of bridges. (3 Points) 4 DEPARTMENT OF MANAGEMENT INFORMATION SYSTEMS Salman bin Abdul-Aziz University College Of Business Administration DEPARTMENT OF MANAGEMENT INFORMATION SYSTEMS 5 DEPARTMENT OF MANAGEMENT INFORMATION SYSTEMS