I am posting a few qstn which are part of my project, could anyone provide the outline/basic details......?
q1 - A Bank maintains the records of its customer using the database technology. The bank has many braches all over the country, but has just one central website. The customers of the bank can access the information of their accounts through the website and can also perform secure transactions through the website.
•What are the requirements of hardware/software/application development for the Bank at the central site and as well as branch offices? Indicate security requirements, if any
•Suggest suitable database model for the Bank for the above requirements, make and state suitable assumptions, if any, giving reason of your selection.
•Suggest a suitable Web based Information schema for the Bank. Give reasons for your selection.
q2 - A business house wants to connect all its LANs at its Regional offices across the country and at the Headquarters in New Delhi to the Internet. The top management understands the need for physical security and Electronics Access Security, but does not understand the significance of Intrinsic Security, i.e., of Cryptographic Security.
You are required to explain the significant aspects of Intrinsic Security. Further, you are required to explain various cryptographic methods based on Public Key, Secret Key and Hashing Algorithm. The discussion should include details of the various methods alongwith their advantages and limitations.
****************
If anyone could even provide the basic points that I should elaborate on....that would be great!
q1 - A Bank maintains the records of its customer using the database technology. The bank has many braches all over the country, but has just one central website. The customers of the bank can access the information of their accounts through the website and can also perform secure transactions through the website.
•What are the requirements of hardware/software/application development for the Bank at the central site and as well as branch offices? Indicate security requirements, if any
•Suggest suitable database model for the Bank for the above requirements, make and state suitable assumptions, if any, giving reason of your selection.
•Suggest a suitable Web based Information schema for the Bank. Give reasons for your selection.
q2 - A business house wants to connect all its LANs at its Regional offices across the country and at the Headquarters in New Delhi to the Internet. The top management understands the need for physical security and Electronics Access Security, but does not understand the significance of Intrinsic Security, i.e., of Cryptographic Security.
You are required to explain the significant aspects of Intrinsic Security. Further, you are required to explain various cryptographic methods based on Public Key, Secret Key and Hashing Algorithm. The discussion should include details of the various methods alongwith their advantages and limitations.
****************
If anyone could even provide the basic points that I should elaborate on....that would be great!