Course Name: Business Data Communication and Security
Name:
Student ID Number:
Title: Assessment Point 2
Tutor’s Name: Dr. Patrick Albert Chikumba
Date: January 16, 2022
1
, Table of Contents
Question 1……………………………………………………………………………………...4
Question 2…….………..…………………………………………………………………..…..6
Question 3……………………………………………………………………………………...8
Question 4…………………………..………………………………………………………....9
Question 5……………………………….…………………………………………………....10
Question 6………………………………….……………………………………….…..…….11
Question 7…………………………………..………………………………………...……...12
Question 8……………………………………..……………………………………...………14
References…………………………………………………………………………...……….16
2
, Table of Figures
Figure1:Security Attack……………….…………………………………………….…….…4
Figure2:Different type of Active Attack ………………………….…………….……….….6
Figure3:Application for Public-key Cryptography….…………………………………..….8
Figure4:Denial of Service Vulnerability to user…………………………………………..10
Figure5:Kerberos Version 4 Vs. Version 5.………………………………………………14
3
Name:
Student ID Number:
Title: Assessment Point 2
Tutor’s Name: Dr. Patrick Albert Chikumba
Date: January 16, 2022
1
, Table of Contents
Question 1……………………………………………………………………………………...4
Question 2…….………..…………………………………………………………………..…..6
Question 3……………………………………………………………………………………...8
Question 4…………………………..………………………………………………………....9
Question 5……………………………….…………………………………………………....10
Question 6………………………………….……………………………………….…..…….11
Question 7…………………………………..………………………………………...……...12
Question 8……………………………………..……………………………………...………14
References…………………………………………………………………………...……….16
2
, Table of Figures
Figure1:Security Attack……………….…………………………………………….…….…4
Figure2:Different type of Active Attack ………………………….…………….……….….6
Figure3:Application for Public-key Cryptography….…………………………………..….8
Figure4:Denial of Service Vulnerability to user…………………………………………..10
Figure5:Kerberos Version 4 Vs. Version 5.………………………………………………14
3