0% found this document useful (0 votes)
374 views

Information Security Assignments

The document contains 4 assignments related to information security. Assignment 1 asks questions about the historical role of information systems and how the industrial revolution impacted them. It also asks about the differences between information-level and network-level threats. Assignment 2 asks questions about networking components like TCP/IP, routers, and switches. It also addresses issues in e-commerce security. Assignment 3 covers physical security controls and biometric systems. Assignment 4 addresses cryptography systems, firewall design, digital signatures, intrusion detection, VPNs, and their security concerns.

Uploaded by

pulkit sharma
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
374 views

Information Security Assignments

The document contains 4 assignments related to information security. Assignment 1 asks questions about the historical role of information systems and how the industrial revolution impacted them. It also asks about the differences between information-level and network-level threats. Assignment 2 asks questions about networking components like TCP/IP, routers, and switches. It also addresses issues in e-commerce security. Assignment 3 covers physical security controls and biometric systems. Assignment 4 addresses cryptography systems, firewall design, digital signatures, intrusion detection, VPNs, and their security concerns.

Uploaded by

pulkit sharma
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 2

Assignment No- 1 (Information Security)

Q1. Explain the historical role of information systems. In what way do you think ,
the industrial revolution impacted information systems?

Q2. How do Distributed information systems help the global enterprises?

Q3. Distinguish between information-level threats and network-level threats.

Q4. What are various security Challenges in Mobile Devices?

Q5. Explain the meaning of terms ‘ Confidentiality’ , ‘integrity’ and ‘ availabity’.

Q6. What is difference between ‘ authentication’ and ‘Authorization’.

Assignment No- 2 (Information Security)

Q1. Differentiate between TCP/IP, IPV4 and IPV6.

Q2. Explain about various networking Components like routers, bridges, switches,
hub and gateway.

Q3. Discuss about various Ethical and Professional Issues in Information Security.

Q4. What are security threats to E-Commerce?

Q5. Write short Notes on:-

(a) Media Forensics


(b) Cyber Forensics
(c) Software Forensics
(d) Mobile Forensics
Assignment No- 3 (Information Security)

Q1. Discuss about the Basic Tenets of Physical Security and Physical Entry
Controls.
Q2. Explain the need of Physical Security.
Q3. Explain various Design Issues in Biometric Systems.
Q4. What are Legal challenges in Framework for Information Security?
Q5. Differentiate between Information security Vs Privacy.
Q6. What are different interoperability issues in Biometric Systems?

Assignment No- 4 (Information Security)

Q1. What is Model for Cryptosystems?


Q2. What are Design and implementation issues of Firewalls?
Q3. What are digital signature and its requirement?
Q4. What is need for Intrusion Monitoring and Detection?
Q5. What is VPN and Tunneling in VPN?
Q6. What are types of VPN and also explain different security Concerns in
VPN.

You might also like