0% found this document useful (0 votes)
16 views5 pages

Nis Assignments 6th Sem

The document outlines the vision and mission of the Department of Information Technology, focusing on the development of skilled IT professionals. It includes assignments for a Diploma in Information Technology program, specifically in Network and Information Security, covering topics such as computer security, user authentication, cryptography, firewalls, and cyber laws. Each assignment consists of multiple questions aimed at assessing students' understanding of the respective chapters.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
16 views5 pages

Nis Assignments 6th Sem

The document outlines the vision and mission of the Department of Information Technology, focusing on the development of skilled IT professionals. It includes assignments for a Diploma in Information Technology program, specifically in Network and Information Security, covering topics such as computer security, user authentication, cryptography, firewalls, and cyber laws. Each assignment consists of multiple questions aimed at assessing students' understanding of the respective chapters.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 5

DEPARTMENT OF INFORMATION TECHNOLOGY(IF)

Vision:

 To Visualize the creation of skilled, proficient IT Professionals to meet current challenges.

Mission:

 To encourage young minds for training & entrepreneurship.


 To convey standard education with rapidly changing environment with ethical values. ∙ To
provide an environment where students can continuously learn, apply &
communicate knowledge.

Name Of Program :- Diploma in Information Technology


Date :-
Course Title :- Network and Information Security(22620) Sem-VI (2023 -24)
Course Outcome :- CO
Chapter Name :- Introduction to Computer and Information Security

Assignment No:-01
Q.1 Define Computer Security and Need of Computer Security.

Q.2 Explain Security Basics.

Q.3 Define Virus and Explain Phases of Virus.

Q.4 Explain Types of Viruses.

Q.5 Differentiate between Insiders and Intruders.

Assigned by: Miss. Neha Salunkhe


DEPARTMENT OF INFORMATION TECHNOLOGY(IF)

Vision:

 To Visualize the creation of skilled, proficient IT Professionals to meet current challenges.

Mission:

 To encourage young minds for training & entrepreneurship.


 To convey standard education with rapidly changing environment with ethical values. ∙ To
provide an environment where students can continuously learn, apply &
communicate knowledge.

Name Of Program :- Diploma in Information Technology


Date :-
Course Title :- Network and Information Security(22620) Sem-VI (2023 -24)
Course Outcome :- CO
Chapter Name :- User Authentication and Access Control.

Assignment No:-02
Q.1 Define Access Control and Explain Policies of Access Control.

Q.2 Explain different Password Attacks.

Q.3 Explain the term:- a) Identification

b) Authentication

Q.4 Explain in brief Shoulder Surfing.

Q.5 Short Note on Password Selection Criteria.

Assigned by: Miss. Neha Salunkhe


DEPARTMENT OF INFORMATION TECHNOLOGY(IF)
Vision:

 To Visualize the creation of skilled, proficient IT Professionals to meet current challenges.

Mission:

 To encourage young minds for training & entrepreneurship.


 To convey standard education with rapidly changing environment with ethical values. ∙ To
provide an environment where students can continuously learn, apply &
communicate knowledge.

Name Of Program :- Diploma in Information Technology


Date :-
Course Title :- Network and Information Security(22620) Sem-VI (2023 -24)
Course Outcome :- CO
Chapter Name :- Crptography

Assignment No:-03
Q.1 Explain the term Cryptography.

Q.2 Consider Plain text “INFORMATION” and Convert given Plain text into Cipher text
using ‘Caesar Cipher’ with shift of position three write down steps in encyption.

Q.3 Convert the given plain text into cipher text using Single Columnar Technique using following
data:

Plain text: INFORMATION SECURITY

No. Of Coulumns: 06

Encyption Key: 326154

Q.4 Explain Data Encyption Standards(DES).

Q.5 Short Note on Digital Signature.


Assigned by: Miss. Neha Salunkhe
DEPARTMENT OF INFORMATION TECHNOLOGY(IF)

Vision:

 To Visualize the creation of skilled, proficient IT Professionals to meet current challenges.

Mission:

 To encourage young minds for training & entrepreneurship.


 To convey standard education with rapidly changing environment with ethical values.
 To provide an environment where students can continuously learn, apply &
communicate knowledge.

Name Of Program :- Diploma in Information Technology


Date :-
Course Title :- Network and Information Security(22620) Sem-VI (2023 -24)
Course Outcome :- CO
Chapter Name :- Firewall and Intrusion Detection System.

Assignment No:-04
Q.1 Differentiate between Firewall and IDS.

Q.2 Explain the term Honeypots.

Q.3 Explain Intrusion Detection System and its types.

Q.4 Define Firewall and list its Needs.

Q.5 List the Limitations of Firewall.

Assigned by: Miss. Neha Salunkhe


DEPARTMENT OF INFORMATION TECHNOLOGY(IF)

Vision:

 To Visualize the creation of skilled, proficient IT Professionals to meet current challenges.

Mission:

 To encourage young minds for training & entrepreneurship.


 To convey standard education with rapidly changing environment with ethical values. ∙ To
provide an environment where students can continuously learn, apply &
communicate knowledge.

Name Of Program :- Diploma in Information Technology


Date :-
Course Title :- Network and Information Security(22620) Sem-VI (2023 -24)
Course Outcome :- CO
Chapter Name :- Network Security, Cyber Laws and Compliance Standards.

Assignment No:-05
Q.1 Define Kerberos and Explain its Working.

Q.2 Explain Public Key Infrastructure.

Q.3 Explain PGP and its Working.

Q.4 Short note on SMTP.

Q.5 Explain Hacking in detail.

Assigned by: Miss. Neha Salunkhe

You might also like