Written by students who passed Immediately available after payment Read online or as PDF Wrong document? Swap it for free 4.6 TrustPilot
logo-home
Class notes

Class notes Computer science : Information,Network and Security

Rating
-
Sold
-
Pages
6
Uploaded on
10-12-2022
Written in
2022/2023

Information,Network and Security notes. this document is all you need to nail any exam or test related to this subject.

Institution
Course

Content preview

INFORMATION NETWORK AND SECURITY – PART 3


Q. Explain man in middle attack

A. Man-in-the-middle (MitM) attacks, also known as eavesdropping attacks, occur
when attackers insert themselves into a two-party transaction. Once the attackers
interrupt the traffic, they can filter and steal data. The goal of an attack is to steal
personal information, such as login credentials, account details and credit card
numbers. Targets are typically the users of financial applications, SaaS businesses,
e-commerce sites and other websites where logging in is required.




Q. Explain lifecycle of virus.

A The typical life-cycle of a computer virus takes place in four stages; the dormant
phase, the propagation phase, the triggering phase, and the execution phase.

During the dormant phase, the virus has accessed its victim's computer or
software, but it does not do anything yet.

, In the propagation phase, the virus is fruitful and multiplies. The virus will start to
insert copies of itself into other programs or areas on the disk.

The triggering phase is designated when the virus changes from being dormant to
being activated.

Finally, during the execution phase, the virus gets to work. The virus's payload is
released, and the end user will begin to notice problems with their computer such
as deleted files, the systemcrashing, or endless popups on the screen.




Q. AES

A. Advanced Encryption Standard (AES) is used for encryption of electronic data
established by the U.S National Institute of Standards and Technology (NIST) in
2001. AES is widely used today as it is a much stronger than DES and triple DES
despite being harder to implement.

Points to remember :

AES is a block cipher.

The key size can be 128/192/256 bits.

Encrypts data in blocks of 128 bits each.

Advantages of AES :

‌ s it is implemented in both hardware and software, it is most robust security
A
protocol.

I‌t uses higher length key sizes such as 128, 192 and 256 bits for encryption. Hence
it makes AES algorithm more robust against hacking.

‌No one can hack your personal information

Disadvantages of AES:

Written for

Institution
Course

Document information

Uploaded on
December 10, 2022
Number of pages
6
Written in
2022/2023
Type
Class notes
Professor(s)
Haider zaidi
Contains
All classes

Subjects

$10.99
Get access to the full document:

Wrong document? Swap it for free Within 14 days of purchase and before downloading, you can choose a different document. You can simply spend the amount again.
Written by students who passed
Immediately available after payment
Read online or as PDF

Get to know the seller
Seller avatar
danishsherkhan

Get to know the seller

Seller avatar
danishsherkhan Rizvi college of arts ,science and commerce
Follow You need to be logged in order to follow users or courses
Sold
-
Member since
3 year
Number of followers
0
Documents
3
Last sold
-

0.0

0 reviews

5
0
4
0
3
0
2
0
1
0

Trending documents

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions