Professional Documents
Culture Documents
B) What is PGP
Ans. Pretty Good Privacy (PGP) is an encryption system used for both sending
encrypted emails and encrypting sensitive files. Since its invention back in 1991, PGP
has become the de facto standard for email security.
The popularity of PGP is based on two factors. The first is that the system was originally
available as freeware, and so spread rapidly among users who wanted an extra level
of security for their email messages. The second is that since PGP uses both symmetric
encryption and public-key encryption, it allows users who have never met to send
encrypted messages to each other without exchanging private encryption keys.
c) What is steganography.
Ans. A steganography technique involves hiding sensitive information within an ordinary,
non-secret file or message, so that it will not be detected. The sensitive information will then
be extracted from the ordinary file or message at its destination, thus avoiding
detection. Steganography is an additional step that can be used in conjunction with
encryption in order to conceal or protect data.
d) What is Kerberos
ans. Kerberos is a computer network security protocol that authenticates service requests
between two or more trusted hosts across an untrusted network, like the internet. Initially
developed by the Massachusetts Institute of Technology (MIT) for Project Athena in the late
'80s, it's now a default authorization technology in Microsoft Windows and is also
implemented in other operating systems like Apple OS, FreeBSD, UNIX, and Linux.
Digram:-
b) Describe IP security.
Ans. IP Sec (Internet Protocol Security) is an Internet Engineering Task Force (IETF) standard
suite of protocols between two communication points across the IP network that provide
data authentication, integrity, and confidentiality. It also defines the encrypted, decrypted,
and authenticated packets. The protocols needed for secure key exchange and key
management are defined in it.
Components of IP Security
It has the following components:
1. Encapsulating Security Payload (ESP)
2. Authentication Header (AH)
3. Internet Key Exchange (IKE)
Features of IPSec
Advantages of IPSec
Working of SMTP:-
1. Submission of Mail: After composing an email, the mail client then submits
the completed e-mail to the SMTP server by using SMTP on TCP port 25.
2. Receipt and Processing of Mail: Once the incoming message is received, the
exchange server delivers it to the incoming server (Mail Delivery Agent) which
stores the e-mail where it waits for the user to retrieve it.
3. Access and Retrieval of Mail: The stored email in MDA can be retrieved by
using MUA (Mail User Agent). MUA can be accessed by using login and
password.