The document outlines a class assessment focused on monitoring system and networking security, covering topics such as computer security, user access management, authentication methods, and potential security threats. It also addresses securing internet connections, data transmission, and organizational network security strategies, along with discussions on cryptography and practical exercises involving encryption and decryption. Additionally, it lists network security devices and poses questions related to securing systems and networks.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0 ratings0% found this document useful (0 votes)
1 views
Assessment
The document outlines a class assessment focused on monitoring system and networking security, covering topics such as computer security, user access management, authentication methods, and potential security threats. It also addresses securing internet connections, data transmission, and organizational network security strategies, along with discussions on cryptography and practical exercises involving encryption and decryption. Additionally, it lists network security devices and poses questions related to securing systems and networks.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3
CLASS ASSESSMENT
Monitor System and Networking Security
•Discus about computer security ?
•User access security management methods ? •What is Authentication ? Methods of Authentications ? •What are the potential computer security threats ? CLASS ASSESSMENT Monitor System and Networking Security
How to secure your internet connection
( home Wi-Fi ) ? Can you have a secure Data transmission ? If Yes , How ? Assume you are all working as IT manager , so , how do you secure the systems and Network of your organizations ? Mention some Network security devices ? Monitor System and Networking Security
What is cryptography ? What are the ingredients cryptography ? Plain text VS Cipher Text Decrypt the message give “GHDU FODVV GLG BRX NQRZ KRZ PXFK L ORYH BRX “ Using Caesar Ciphering .
Encrypt the message “ Study Hard “ Using Affine Ciphering