Talk:CSC650 Osboring

Final Spring 2005
1) Describe at least five significant attributes of Rivest-Shamir-Adelman (RSA) Encryption. Include an example that shows how this form of encryption can be used to create a digital signature.     Answer here...

2) Describe "Overlap" and provide two examples of how this technique can be used to create useful defense techniques.

Answer here....

3) Describe Virtual Private Networks (VPN), include some details on how they can be used to improve the security of highly distributed systems.

Answer here ...

4) Describe the multilevel security model used by the USA government and military.    Answer here ...

5) Describe the concept of a 'Firewall'. List and describe the different firewall design components used with the       firewall design patterns presented in class.     Answer here ...

6) Compare and contrast the software vulnerabilities, 'trapdoor' and 'trojan horse'.    Answer here ...

7) What steps can be taken to make Local Area Networking (LAN) secure?    Answer here ...