Download as pdf or txt
Download as pdf or txt
You are on page 1of 1

School of Engineering and Technology

Department of Computer Science and Engineering


Academic Year: 2021-22
BTECH CSE II Sem
Subject Name: Introduction to cybersecurity and law Sub Code: CSC-102
Assignment 1
Date : 25-04-2022 Max Marks: 30
COURSE OUTCOMES
By the end of the course, students will be able to:

● Illustrate why securing the Nation’s computer systems, which has been a goal of multiple
successive administrations and has broad bipartisan and public support, has proven to be so
CO 1
difficult to achieve.

● Analyze attack methodology and combat hackers from intrusion or other suspicious attempts
CO 2 at connection to gain unauthorized access to a computer and its resources

A Adapt Protection of data and respond to threats that occur over the Internet
CO 3
● Construct and implement risk analysis, security policies, and damage assessment
CO 4
● Plan, implement and audit operating systems' security in a networked, multi-platform and
CO 5 cross platform environment

Demonstrate contingency operations that include administrative planning process for


CO 6 incident response, disaster recovery, and business continuity planning within information
security

Note: Attempt All Questions.


Q. No. Questions Marks
1 What is computer network? Explain the uses of computer network. 5

2 List The Layers Of OSI? 5

3 What Is the Difference Between TCP And UDP? 5

4 Explain the characteristics of physical transmission media 5

5 Define the term cryptography. Explain the major components used in 5


cryptography.

6 Explain the symmetric key and asymmetric key cryptography with suitable 5
examples.

Explain the basic components of security. What do you mean by


Confidentiality, Integrity and Availability (CIA) in security system?

You might also like