0% found this document useful (0 votes)
1 views1 page

Unit-1 Assignment (Cyber Security)

This document is an assignment for a Cyber Security course at GL Bajaj Institute of Technologies & Management, detailing the topics to be covered. It includes questions on differentiating Cyber Security from Information Security, understanding threats, vulnerabilities, risks, and various cybercrime categories. The assignment was issued on April 20, 2025, with a submission deadline of April 28, 2025.

Uploaded by

55 Sana
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
1 views1 page

Unit-1 Assignment (Cyber Security)

This document is an assignment for a Cyber Security course at GL Bajaj Institute of Technologies & Management, detailing the topics to be covered. It includes questions on differentiating Cyber Security from Information Security, understanding threats, vulnerabilities, risks, and various cybercrime categories. The assignment was issued on April 20, 2025, with a submission deadline of April 28, 2025.

Uploaded by

55 Sana
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd

[Approved by AICTE, Govt. of India & Affiliated to Dr.

APJ
GL BAJAJ
Institute of Technologies & Management
Abdul Kalam Technical University, Lucknow, U.P., India]
Department of Computer Science and Engineering (AIML)
Grater Noida

ASSIGNMENT –I (Unit-1)
Subject: Cyber Security Subject code: BCC-401
Faculty Name: Ms. Puja Given Date: 20th April 2025
Last Submission Date: 28th April 2025
S. No. Question Detail

1. Differentiate between Cyber Security and Information Security.

2. Write the difference between threats, vulnerability and risk.


3. What is Phishing and how it can be prevented?
4. What is DDOS attack and how to stop and prevent them?
5. How criminals Plan the attack?
6. What are the different categories of Cybercrime?

You might also like