0% found this document useful (0 votes)
6 views1 page

Assignment 2

The document outlines key topics related to cybersecurity, including the characteristics of strong passwords, the concepts of piggybacking and shoulder surfing, and the practice of dumpster diving. It also requests a block diagram of biometric systems and explanations of fingerprint, retina, and voice pattern biometrics, as well as a discussion on access control mechanisms and their types.

Uploaded by

DEVILS GAMERS
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
6 views1 page

Assignment 2

The document outlines key topics related to cybersecurity, including the characteristics of strong passwords, the concepts of piggybacking and shoulder surfing, and the practice of dumpster diving. It also requests a block diagram of biometric systems and explanations of fingerprint, retina, and voice pattern biometrics, as well as a discussion on access control mechanisms and their types.

Uploaded by

DEVILS GAMERS
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 1

Unit-II

1. Explain components of good passwords.


2. Explain piggybacking and shoulder surfing.
3. Explain dumpster diving in detail.
4. Draw block diagram of biometric and explain following
biometric
i) Finger print ii) Retina iii) Voice pattern
5. Explain access control mechanism with it’s types

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy