INS Assignment 1 & 2
INS Assignment 1 & 2
What is Information Security and why is it essential in the digital age? Discuss the need for protecting
information.
Explain Information Classification and the criteria for classifying information in a secure environment.
List and define the Basic Principles of Information Security. How do Confidentiality, Integrity, and
Availability contribute to securing information?
Differentiate between Active and Passive Attacks. Briefly explain types like DoS, Phishing, Spoofing,
and Man-in-the-Middle attacks.
What are Malware Types such as Viruses, Trojans, and Ransomware? Discuss their impact on security
and methods of prevention.
Define Threat and Risk Analysis and explain how vulnerabilities, threats, and risks are related in
information security.
Assignment 2
What are the different Identification and Authentication methods? Discuss the role of usernames,
passwords, multi-factor authentication, and biometrics in securing user identity.
Explain common Password Attacks like Piggybacking, Shoulder Surfing, and Dumpster Diving. How
do these attacks compromise security?
Describe the different types of Biometrics used for authentication. How do Fingerprints, Hand Prints,
Retina scans, and Voice patterns help in verifying user identity?
What is Authorization? Discuss its goals and how it ensures the proper use of resources within a system.
What are Access Control Principles? Explain how access rights and permissions contribute to user
access management in a secure system.
Discuss the different Access Control Policies: DAC, MAC, RBAC, and ABAC. Explain the key
differences and their application in user access management.