About Me

Information Security 8th MJ13 IT2042

Sponsored Ads:

Quick Links
University Papers University Syllabus Entrance Exam
PSU Papers Bank Papers Placement Papers
VTU Anna Univerity Syllabus Anna Univerity Papers
Question Paper Code : 21293
B.E./B.TECH. DEGREE EXAMINATION , MAY/JUNE 2013
Eighth Semester
Computer Science and Engineering
IT 2042 / IT 706 – INFORMATION SECURITY
(Common to Seventh Semester Information Technology)
(Regulation 2008)

University Papers | Syllabus | Entrance Exam | Govt & PSU Papers | Bank Papers

Programming Questions  |  Travel Tips | Mobile Review | Placement Papers

ANNA UNIVERSITY SYLLABUS: CLICK HERE

ANNA UNIVERSITY PAPERS: CLICK HERE

Download PDF File - Click Here


PART A – (10 X 2 = 20 marks)

1. Define information security.
2. List the critical characteristics of information.
3. What is intellectual property?
4. What is a policy? How is it different from a law?
5. Why do we have to do periodic reviews in managing risks?
6. Give the meaning of “dumpster diving” with respect to information security.
7. Define policy and standards.
8. Give any five major sections of ISO/IEC 17799 standard.
9. What is content filter?
10.List any four physical security controls.

PART B – (5 X 16 = 80marks)

11. (a) List and explain the various components of an information system.
(Or)
(b) Explain the components of System Development Life Cycle (SDLC) with neat sketch.

12.  (a) What is the difference between attack and vulnerability? List and explain any seven attacks.
(Or)
(b) List and discuss about the role and focus of any four professional organizations in providing information security.

13.  (a) Sketch and explain the components of risk identification process.
(Or)
(b) (i) Brief about the data classification and management process. (8)
(ii) List and explain the different types of access control. (8)

14.  (a) (i) Brief about the elements of an Issue-Specific Security Policy Statement. (8)
(ii) Brief about any Four Significant points of the NIST SP 800-14 Security model. (8)
(Or)
(b) Explain the security architecture design process with neat sketch.

15.  (a)  Explain the different types of Intrusion Detection System (IDS) with their advantages and dis advantages.
(Or)
(b) (i) Brief about the various cryptography tools.   (8)
(ii) List and describe the credentials of the various information security certifications. (8)

Post a Comment

0 Comments