0% found this document useful (0 votes)
30 views1 page

Assignment No 1 NIS

The document outlines an assignment consisting of various questions related to computer security, including comparisons of viruses and logic bombs, user responsibilities, types of attacks, and definitions of key terms. It also includes explanations of concepts like information security principles, DOS, and specific types of cyber attacks. The assignment requires detailed responses, examples, and diagrams for certain questions.

Uploaded by

Diksha Lokhande
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
30 views1 page

Assignment No 1 NIS

The document outlines an assignment consisting of various questions related to computer security, including comparisons of viruses and logic bombs, user responsibilities, types of attacks, and definitions of key terms. It also includes explanations of concepts like information security principles, DOS, and specific types of cyber attacks. The assignment requires detailed responses, examples, and diagrams for certain questions.

Uploaded by

Diksha Lokhande
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 1

Assignment No.

Q.1 Compare Virus and logic bomb(2m)

Q.2 Identify any four individual user responsibilities in computer security. (2m)

Q.3 List any 2 types of active and passive attacks. (2m)

Q.4 Describe following terms: 1. Assets 2. Vulnerability 3. Risks (6m)

Q.5 Describe any three phases of virus with suitable example. (6m)

Q.6 Define following terms: 1. Confidentiality 2. Accountability (2m)

Q.7 Define following terms: 1. Operating System Security 2. Hot fix 3. Patch 4. Service Pack(4m)

Q.8 Define Information. Explain basic principle of Information Security. (4m)

Q.9 Explain DOS with neat diagram. (4m)

Q.10 Compare between Virus and Worm (2m)

Q. 11 Define terms Authentication and Authorization ( 4m)

Q.12 Explain active attack and passive attack with suitable example. (6m)

Q.13 Explain any three criteria for classification of information. (6m)

Q.14 State the criteria for information classification. Explain information classification.

Q.15 Explain the following attacks using an example: 1. Sniffing 2. Spoofing 3. Phishing (6m)

Q.16 Define term 1. threat of an attack and 2. Man in middle attack..(4m)

Q.17 Define Trojan Horse , Intruders and Insiders(6m)

You might also like