In the Protocol ‘modern biotechnology’ is referred to as the application of fusion of cells beyond the taxonomic family (called ‘in vitro nucleic acid’ techniques) that overcome natural physiological reproductive or recombination barriers and are not techniques used in traditional breeding and selection. The term Living modified organism (LMO) is defined as the processing of any material that is of LMO origin, containing detectable novel combinations of replicable genetic material obtained through the use of modern biotechnology (for instance, flour from genetically modified maize). The LMOs intended for direct use as food or feed, or for processing are agricultural commodities from genetically modified crops (http://www.gmo-free-regions.org/glossary.html Accessed 26.11.16.). Although the Protocol did not use the term genetically modified organism, the LMO is almost equivalent to the GMO, which is any organism whose genetic material has been altered using genetic engineering techniques (i.e., a genetically engineered organism). A more popular name of the GMO is ‘transgenic organism’
SOLVED CS204 Assignment 2 Solution and Discussion
-
Re: CS204 Assignment 2 Solution and Discussion
Assignment No. 02
Semester:Spring 2020
Cyber Law – CS204Total Marks: 15
Due Date:16/06/2020
Objective:• The objective of this assignment is to enhance the knowledge of the students about cryptography technique for security purposes and cyber security measures.
Uploading instructions:
• Your assignment must be in .doc or .docx format (Any other formats like scan images, pdf, bmp, etc will not be accepted).
• Save your assignment with your ID (e.g. bc020200786.doc).
• No assignment will be accepted through email.Rules for Marking:
It should be clear that your assignment will not get any credit if:
• The assignment is submitted after due date.
• The submitted assignment does not open or file is corrupted.
• Your assignment is copied from internet, handouts or from any other student
• Assignment is covered from lectures 04 to 06.
For any query about the assignment, contact at [email protected]Assignment Questions
Questions: Marks 15
Question.1 (10 Marks)
Use the caesar cipher method to encrypt the following words with shift key of 3 and show the complete process step by step.
• “ASSIGNMENT”
• “TOOLS”Question. 2 (5 Marks)
Suppose that if you’ve ever tried to login to your online bank account and find that not all of your savings are being accounted for, it could be an indication that you’ve been targeted by cyber criminal. Although there are several ways that cyber criminals could have gotten your account data, there’s a fair chance you’ve accidentally come across a phishing website in the past, misinterpreting the login page of your online bank. Enlist all possible security measures to protect your online banking account from cyber criminals.
Best of Luck
-
@zaasmi said in CS204 Assignment 2 Solution and Discussion:
Suppose that if you’ve ever tried to login to your online bank account and find that not all of your savings are being accounted for, it could be an indication that you’ve been targeted by cyber criminal. Although there are several ways that cyber criminals could have gotten your account data, there’s a fair chance you’ve accidentally come across a phishing website in the past, misinterpreting the login page of your online bank. Enlist all possible security measures to protect your online banking account from cyber criminals.
- Respond as if the network has already been breached. Adopting this mindset forces the IT team to prioritize the most business-critical parts of the network and use network segmentation as a strategy. When done correctly, network segmentation, achieved through the creation of network zones, limits the ability for a hacker to move laterally across a compromised network. Network segmentation requires continual updates and configurations, but it can mean the difference between a hacker getting only as far as an employee’s infected computer and helping themselves to the bank’s ATM systems.
- Implement an enterprise-wide security policy. A well-defined security policy serves as a crucial road map for any bank IT team to maintain a truly adaptive security architecture. It’s what helps the people tasked with protecting the bank’s systems determine the best way for the network to operate with minimal risk. Additionally, the security policy should take into consideration all regulatory and enterprise compliance requirements and how to apply timely patches to maintain compliance.
- Security policy enforcement. It’s one thing to have a security policy that defines how the IT platform behaves and another to actually validate that it is being enforced across your network. Doing the former but not the latter might allow you to comply with some regulations, but it won’t make your network safer. Organizations must constantly monitor their network for changes to configurations and ensure that these changes are approved and compliant with policy. It’s a collaborative effort across the enterprise—network operations, security operations, and the CIO.
-
This post is deleted! -
@zaasmi said in CS204 Assignment 2 Solution and Discussion:
Question.1 (10 Marks)
Use the caesar cipher method to encrypt the following words with shift key of 3 and show the complete process step by step.
• “ASSIGNMENT”
• “TOOLS”“ASSIGNMENT”
Ciphertext
DVVLJQPHQW“TOOLS”
WRROV -
please share idea


100% Off on Your FEE Join US! Ask Me How?


