IT8761 Security Laboratory Manual 

Anna University IT8761 Security Laboratory Manual and Viva Questions with answers Regulation 2017

IT8761 Security Laboratory   

LIST OF EXPERIMENTS
1. Perform encryption, decryption using the following substitution techniques
        (i) Ceaser cipher, (ii) playfair cipher iii) Hill Cipher iv) Vigenere cipher
2. Perform encryption and decryption using following transposition techniques
        i) Rail fence ii) row & Column Transformation
3. Apply DES algorithm for practical applications.
4. Apply AES algorithm for practical applications.
5. Implement RSA Algorithm using HTML and JavaScript
6. Implement the Diffie-Hellman Key Exchange algorithm for a given problem.
7. Calculate the message digest of a text using the SHA-1 algorithm.
8. Implement the SIGNATURE SCHEME - Digital Signature Standard.
9. Demonstrate intrusion detection system (ids) using any tool eg. Snort or any other s/w.
10. Automated Attack and Penetration Tools
        Exploring N-Stalker, a Vulnerability Assessment Tool
11. Defeating Malware
        i) Building Trojans ii) Rootkit Hunter


2017 Regulation 
Manual:
IT8761 Security Laboratory Manual  - Click here 1(with Viva)Click here 2 

Viva:
IT8761 Security Laboratory Viva  Coming Soon



2013 Regulation 
Manual:
CS6711 Security Laboratory Manual  - Click here 

Viva:
CS6711 Security Laboratory Viva  Coming Soon

Connected with us for more updates



Axact

Axact

Vestibulum bibendum felis sit amet dolor auctor molestie. In dignissim eget nibh id dapibus. Fusce et suscipit orci. Aliquam sit amet urna lorem. Duis eu imperdiet nunc, non imperdiet libero.

Post A Comment:

0 comments: