Question: . Describe the various steps involved with encrypting and decrypting a message via an email and a well - labeled diagram. 2 . Hackers do

. Describe the various steps involved with encrypting and decrypting a message via an email
and a well-labeled diagram.
2. Hackers do not need to do much of the work. All they have to do is create an algorithm or
use readily available brute force attack programs to automatically run different
combinations of usernames and passwords until they find the right combination. Explain
the brute force attack scenario with a labeled diagram indicating four types of brute force
attacks.
3. Describe how a man-in-the-middle attack may be performed on a Wi-Fi network and the
consequences of such an attack.
4. Explain the following attacks:
a) Reflection attack
b) Man-in-the-middle attack
5. Explain Replay attack and briefly describe measures to overcome the 3 attacks
6. Block ciphers are usually designed to provide confusion and diffusion. Explain what is
meant by each of these properties, and give examples of the features of block ciphers,
which are used to provide them.
7. Explain any two approaches for intrusion detection.
8. Identify a few malicious programs that need a host program for their existence.
9. Explain the types of Host based intrusion detection. List any two IDS software available.
10. Explain firewalls and how they prevent intrusions.

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!