Question
SN
CLO # CLO Description Question
Total Mark
Student Mark
Question 1 CLO3
Analyze the various forms
of security technologies for
safeguarding Internet related
applications and services.
5
Question 2 CLO5 Apply the basic principles of
cryptography 5
Total Mark 10
*Linkages to Program Outcomes and Concentration Outcomes are provided in the Syllabus.
Student Name: …………………………………………………………………………….
Student ID No: …………………………………………………………………………….
Created in Master PDF Editor
Question1: Firewall Technology [5 Marks] –Group Work
Assume that you work at Emirates Airline. As a network security professional, you
have been asked by your line manager to block all visits to various social media sites
such as Facebook, Instagram and Twitter. In order to achieve your goal, you must
use a Linux-based firewall technology, such as iptables.
Question2: Cryptography [5 Marks] – Individual Work
Briefly discuss about various Cryptography techniques and Find the Cipher text of
your first name using the below mentioned encryption techniques
Case1: Using Transposition Cipher [Key: 246813579]
Case2: Using Vigenere square substitution cipher [Key: DUBAI]
Case3: Using ASCII code XOR Encryption [Key: DUBAI]
Instructions:
- Maximum of 3 students in each group
- Every student should submit Softcopy of Report via Moodle
- Each group should demonstrate the project assignment through a presentation
(10-15 minutes)
Created in Master PDF Editor
ASCII Table:
Vigenere Square Table: