Download AKTU B-Tech 3rd Sem 2015-2016 AUC 002 Cyber Security Question Paper

Download AKTU (Dr. A.P.J. Abdul Kalam Technical University (AKTU), formerly Uttar Pradesh Technical University (UPTU) B-Tech 3rd Semester (Third Semester) 2015-2016 AUC 002 Cyber Security Question Paper

Printed Pages: 3 787 AUC-002
(Following Paper ID and Roll No. to be ?lled in your
Answer Book)
Roll No.
B(Tech.
(SEM. III) THEORY EXAMINATION, 2015-16
CYBER SECURITY
[Time : 3 hours] [MaximumMarks : 100|
SECTION - A
1. Attempt all parts. All parts carry equal marks. Write
answer of each part in short. (2x10=20)
(a) What do you mean by Information Security ?
(b) What is Security Risk Analysis ?
(c) What is Copy Right law in Cyber Security ?
(d) Describe the security threats to E-commerce.
(6) Explain the requirement of digital signature
system.
(f) Explain functions of Information System with
suitablediagram. '
35000 (1) [P.T.O.]

(g) How do distributed information systems help the
global enterprises in today?s business world ?
(h) Explain the concept of EDI. _ _
(i) What is W policies in Cyber? Security ?
(i) What are Email Security policies ?
SECTION - B
Note :Attempt any ?ve questions from this section :(10x5=50)
2. What do you mean by biometric system ? Discuss the
advantages of Biometrics over traditional authentication
method. ?
3. Explain the concept of Intrusion Detection System.
4. What is Intellectual Property Law ?
5. What is Software License in Cyber Security ?
'6. What is Backup Security Measures ?
7. What is Cyber Security ? How to secure your information
explain in detail.
8. What is Virtual Private Network ?
9. What are the important parameters to be taken care while
35000 (2) AUC?002
developing a secure information system ?
SECTION - C
Note: Attempt any two questions from this section : (15x2=30)
10.
11.
12.
35000 (3)
Explain the following Payment System in E?Commerce:
(a) e-Cash '
(1)) Credit / Debit Cards
(c) Net Banking
Explain the following in detail :
(a) Cyber Laws in India, ITAct 2000 Provisions
(b) So?ware License
(0) Semiconductor Law
Brie?y explain the following :
(a) Access Control in Cyber Security
(b) Public Key Cryptography
(0) Face Recognisation
_x_
AUC-002

This post was last modified on 29 January 2020