0% found this document useful (0 votes)
46 views

Week 1 Assignment 1

Cyber Security Assignment

Uploaded by

khang867860
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
46 views

Week 1 Assignment 1

Cyber Security Assignment

Uploaded by

khang867860
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 1

Information Security

Week no 1
Assignment No 1
Chapter no 1
Topic names: Information security environment, Information security foundations
Note: Each Answer should not exceed 50 words, otherwise it will not be checked. Your own wording
will be preferred.
Questions Submit Given Submission Total & Obtained
Medium Date Date Marks
1. Define Information Security. Hand Start Last class of
2. What is Security? Written of the the week
3. What are the multiple layers of Security? week
4.What are the characteristics of CIA triangle?
5.What are the characteristics of Information
Security?
6.What is E-mail Spoofing?
7. What is UDP Packet Spoofing?
8.What are the measures to protect the
confidentiality of information?
9. What is Utility of information?
10. What are the components of information
system?
11. What are the functions of Locks & Keys?
12. What is Network Security?
13. Differentiate Direct and Indirect attacks.
Direct Attack
14.What is Secure SDLC?
15. What is a methodology?
16.What are the phases of SDLC Waterfall
method?
17.What is enterprise Information Security
Policy? Student Name:
18. What is Risk Management?
Roll No:
19.What are the functions of Information
Security? Section:
20.What is PKI? Uni Name:
21. What is the use of Digital Certificates?
22. What is Firewall? Remarks:
23. What are caching network appliances? Copied: Yes No
24. What are appliances? Satisfactory:
25. What is Security? What are the security Not Satisfactory:
layers, a successful organization should have?

Any Query Contact


[email protected]

You might also like