Skip to main content

cs610 GDB 2016



For more discuss and ask question join this group
 
Solved  By : Tahir Siddiqui(Mani)


CS610 - Computer Network GDB No. 1 Solution Spring 2016 Due Date August 16, 2016

GDB of CS610 will open on 15th of August 2016 and end up on 16th of August 2016. The topic for GDB is given below:
GDB Topic:
In computer network environment, security issues include network integrity, unauthorized access to steal sensitive information, and different attacks like network denial of service attacks etc. These issues get significant with the increase in a network size. Large networks are more vulnerable to these issues because they have a higher probability of vulnerable points at which intruders can gain access. More users, more passwords, and more hardware mean more places a hacker can try to get in. Organization takes different measures to cope with these issues in wired environment where computational resources and power is not a major hurdle. Smart devices are being adopted by organizations at a rapid growth. Smart devices have the issue of computational resources and power and thus conventional measures cannot be adopted. With the adoption of 3G, 4G and in future 5G (for smart devices), these issues will be more escalated. Keeping in view the above facts, would you like to suggest the organizations to adopt new technology or not? Support your point with a brief logical reasoning in either case.

Idea SOlution :  

  Computer security means to protect information. It deals with the prevention and detection of unauthorized actions by users of a computer. Lately it has been extended to include privacy, confidentiality, and integrity. For example:

 

 

This definition implies that you have to know the information and the value of that information in order to develop protective measures. You also need to know to which individuals need unique identities and how much information may be divulged to the outside world. A rough classification of protective measures in computer security is as follows:
  • Prevention—Take measures that prevent your information from being damaged, altered, or stolen. Preventive measures can range from locking the server room door to setting up high-level security policies.
  • Detection—Take measures that allow you to detect when information has been damaged, altered, or stolen, how it has been damaged, altered, or stolen, and who has caused the damage. Various tools are available to help detect intrusions, damage or alterations, and viruses.
  • Reaction—Take measures that allow recovery of information, even if information is lost or damaged.

 

 


Comments

Popular posts from this blog

cs302 Solved Quiz

estion # 1 of 10 ( Start time: 03:03:55 PM )  Total Marks: 1    Divide-by-32 counter can be acheived by using   Select correct option:   Flip-Flop and DIV 10  Flip-Flop and DIV 16   Flip-Flop and DIV 32  DIV 16 and DIV 32 Question # 2 of 10 ( Start time: 03:05:20 PM )  Total Marks: 1   The counter states or the range of numbers of a counter is determined by the formula. (“n” represents the total number of flip-flops)   Select correct option:   (n raise to power 2)  (n raise to power 2 and then minus 1)  (2 raise to power n) (2 raise to power n and then minus 1) Question # 3 of 10 ( Start time: 03:06:36 PM )  Total Marks: 1   A 4- bit UP/DOWN counter is in DOWN mode and in the 1010 state. on the next clock pulse, to what state does the counter go?   Select correct option:   1001  1011  0011  1100 Question # 4 of 10 ( Start time: 03:07:37 PM )  Tot...

cs403 GDB Solution 2016

cs403 GDB 2016 For more discuss and ask question join this group   https://www.facebook.com/groups/143792885956764/ Posted By : Tahir Siddiqui(Mani)  Total Marks                                   5 Starting Date Wednesday, July 27, 2016 Closing Date Thursday, July 28, 2016 ...

MID TERM 2016 Spring Result Announced

Result has been Announced Check  ur lms Go LMS #MAni