A program that performs a legitimate function that is known to an operating system or its user and also has a hidden component that can be used for nefarious purposes like attacks on message security or impersonation.
A piece of code that can attach itself to other programs in the system and spread to other systems when programs are copied or transferred.
A program that spreads to other computer systems by exploiting security holes like weaknesses in facilities for creation of remote processes
In cryptography, the following uses transposition ciphers and the keyword is LAYER. Encrypt the following message. (Spaces are omitted during encryption)
WELCOME TO NETWORK SECURITY !
Using public key cryptography, X adds a digital signature σ to a message M, encrypts (M,σ) and sends it to Y, where it is decrypted. Which one of the following sequence of keys is used for operations?
Encryption : X’s private key followed by Y’s private key. Decryption : X’s public key followed by Y’s public key.
Encryption : X’s private key followed by Y’s public key; Decryption : X’s public key followed by Y’s private key
Encryption : X’s private key followed by Y’s public key; Decryption : Y’s private key followed by X’s public key.
Encryption : X’s public key followed by Y’s private key; Decryption : Y’s public key followed by X’s private key.
Suppose that everyone in a group of N people wants to communicate secretly with the N–1 others using symmetric key cryptographic system. The communication between any two persons should not be decodable by the others in the group. The number of keys required in the system as a whole to satisfy the confidentiality requirement is
A firewall is to be configured to allow hosts in a private network to freely open TCP connections and send packets on open connections. However, it will only allow external hosts to send packets on existing open TCP connections or connections that are being opened (by internal hosts) but not allow them to open TCP connections to hosts in the private network. To achieve this the minimum capability of the firewall should be that of