0% found this document useful (0 votes)
34 views1 page

Cyberca 1

The document outlines the requirements for a PPT presentation on Cryptography and Network Security for the 8th semester at Techno Engineering College Banipur. Groups of five members must choose a topic from a provided list and submit their presentations by February 25, 2025. Further details regarding the evaluation rubrics and presentation dates will be communicated in class.

Uploaded by

Aritra Pain
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
34 views1 page

Cyberca 1

The document outlines the requirements for a PPT presentation on Cryptography and Network Security for the 8th semester at Techno Engineering College Banipur. Groups of five members must choose a topic from a provided list and submit their presentations by February 25, 2025. Further details regarding the evaluation rubrics and presentation dates will be communicated in class.

Uploaded by

Aritra Pain
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 1

Techno Engineering College Banipur

Subject: Cryptography and Network Security_PEC-CS801B and PEC-IT801B


Department: CSE + IT
Semester: 8th
Full Marks: 15 Date: 20.02.25 Submission Date: 25.02.25
Assessment Type: PPT Presentation

General Instructions:
1. Make Groups having 5 Members.
2. Every group choose one topic from the following.
3. Group wise make a PPT presentation having maximum 10 slides.
4. Submit the pdf of the presentation using the following Google form link
uploaded in the Google Classroom by 25.02.2025.
5. Date of physical presentation will be announced in the class.
6. Follow the Google classroom for the evaluation rubrics of the ppt presentation.
Topics:
1. Demonstrate the Need for Security in computer. [CO1][U]
2. Illustrate the Principles of Security in Cryptography. [CO1][U]
3. Explain the Attacks on Computer & Computer Security. [CO1][U]

---------------------

You might also like