Assignment # 2 IS
Assignment # 2 IS
Assignment # 2
Q1. Define the CIA Triad in information security. Explain each component with one real-life
example.
(3 Marks)
Q2. What are the common types of cyberattacks (at least five)? Explain each with a brief
example or case.
(4 Marks)
Q3. Differentiate between symmetric and asymmetric encryption. Give one use-case where
each is preferable.
(3 Marks)
(5 Marks)
Q5. List and explain any three tools or technologies used in modern cybersecurity (e.g.,
firewalls, IDS, antivirus, MFA, etc.). Mention how they help mitigate specific types of threats.
(3 Marks)
Q6. Explain the importance of security policies in organizations. Provide two examples of
policies commonly implemented.
(2 Marks)