You are on page 1of 1

SIC Assignment

Unit -1
1. List and explain the components of building a security program.
2. “The job of the attacker is always easier than the job of the defender.” Explain.
3. Explain threat vectors.
4. What is virus? Explain the various types of viruses.
5. Describe network layer attacks
6. What are the various Application layer attacks? Explain.
7. Describe the different form of Man-in the- middle attack.
8. What is the concept of zone of trust in security? Explain.
9. Explain any five best practices of network defense.
10. Describe any five counter measures to minimize the successful attack.

Unit-2
1. Write a short note on Kerberos.
2. Write a short note on Certificate-Based Authentication.
3. Describe authorization with RBAC and ACLs.
4. Describe the key exchange process of Public Key Cryptography.
5. What is zoning in storage security? Explain its types.
6. List the risks related to the Confidentiality associated to CIA triad.
7. Explain Integrity risks.
8. What are the possible Availability risks in security? Explain.
9. Explain the best practices to mitigate the risks.
10. Explain different types of Database backups.

Unit -3
1. What is network Hardening? Explain the various steps of Network Hardening.
2. Explain the types of ICMP messages.
3. Explain the features of Firewall.
4. What is the concept of NAT? Explain.
5. What are the strengths and weaknesses of Firewall? Explain.
6. Which are the different form of wireless attacks? Explain.
7. Which are the benefits of RF knowledge? Explain.
8. Explain the concept of Bluetooth IPS.

You might also like