Skip to content

Latest commit

 

History

History
43 lines (31 loc) · 1.95 KB

File metadata and controls

43 lines (31 loc) · 1.95 KB

MID TERM BREAK SCHEDULE

"03/09/2016" - "14/09/2016"

SUBJECTS

DSP CSS AI SC

DSP

  1. PROJECT

  2. ASSIGNMENT 1

  3. PRACTICALS

CSS

  1. Encryption Technique [Exp 4]

  2. Experiments 1[PlayFair],2[Columnar],3[RSA],

  3. exp 9[Personal System Threats & Protection]

    1. Examine your business or system at home information and records. Identify the information that is most important to you.
    2. Locate the important information and determine how it is stored.
    3. Determine the type of attack that would be most damaging to you. Consider access, modification, denial-of-service attacks.
    4. Try to identify how you would detect if any of these attacks were to take place.
    5. Choose the type of attack that you feel would be most devastating and develop an attack strategy.
    6. Now Begin with the list of attacks and the attack strategy that you developed in previous steps.
    7. Now look at each attack and determine the most appropriate security service to prevent or detect attack.
    8. When you have your list, determine if the accountability service is needed to allow any of the other services to function. If so, add this to your list where necessary.
    9. Prioritize your list in terms of which services are the most important to implement.
    10. If all the security services are implemented, would you be able to detect or prevent the attack strategy that you developed in assignment?
  4. Research Paper Presentation

AI

  1. Assignment
  2. Practicals

SC

  1. Assignment