0% found this document useful (0 votes)
1 views

Assessment

The document outlines a class assessment focused on monitoring system and networking security, covering topics such as computer security, user access management, authentication methods, and potential security threats. It also addresses securing internet connections, data transmission, and organizational network security strategies, along with discussions on cryptography and practical exercises involving encryption and decryption. Additionally, it lists network security devices and poses questions related to securing systems and networks.

Uploaded by

cherkos welday
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
1 views

Assessment

The document outlines a class assessment focused on monitoring system and networking security, covering topics such as computer security, user access management, authentication methods, and potential security threats. It also addresses securing internet connections, data transmission, and organizational network security strategies, along with discussions on cryptography and practical exercises involving encryption and decryption. Additionally, it lists network security devices and poses questions related to securing systems and networks.

Uploaded by

cherkos welday
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

CLASS ASSESSMENT

Monitor System and Networking Security

•Discus about computer security ?


•User access security management methods ?
•What is Authentication ? Methods of
Authentications ?
•What are the potential computer security
threats ?
CLASS ASSESSMENT
Monitor System and Networking Security

How to secure your internet connection


( home Wi-Fi ) ?
Can you have a secure Data transmission ?
If Yes , How ?
Assume you are all working as IT manager , so , how do
you secure the systems and Network of your
organizations ?
Mention some Network security devices ?
Monitor System and Networking Security

What is cryptography ?
What are the ingredients cryptography ?
Plain text VS Cipher Text
Decrypt the message give “GHDU FODVV GLG BRX NQRZ KRZ PXFK L
ORYH BRX “ Using Caesar Ciphering .

Encrypt the message “ Study Hard “ Using Affine Ciphering

You might also like