Printed Pages: 3 787 AUC-002
(Following Paper ID and Roll No. to be filled in your Answer Book)
Paper ID: 199143 Roll No.
--- Content provided by FirstRanker.com ---
B. Tech.
(SEM. III) THEORY EXAMINATION, 2015-16
CYBER SECURITY
[Time: 3 hours] [Maximum Marks : 100]
SECTION-A
--- Content provided by FirstRanker.com ---
- Attempt all parts. All parts carry equal marks. Write answer of each part in short. (2x10=20)
- What do you mean by Information Security?
- What is Security Risk Analysis?
- What is Copy Right law in Cyber Security?
- Describe the security threats to E-commerce.
- Explain the requirement of digital signature system.
- Explain functions of Information System with suitable diagram.
- How do distributed information systems help the global enterprises in today's business world?
- Explain the concept of EDI.
- What is WWW policies in Cyber Security?
- What are Email Security policies?
--- Content provided by FirstRanker.com ---
--- Content provided by FirstRanker.com ---
SECTION-B
Note: Attempt any five questions from this section :(10x5=50)
- What do you mean by biometric system ? Discuss the advantages of Biometrics over traditional authentication method.
- Explain the concept of Intrusion Detection System.
- What is Intellectual Property Law?
- What is Software License in Cyber Security?
- What is Backup Security Measures?
- What is Cyber Security? How to secure your information explain in detail.
- What is Virtual Private Network?
- What are the important parameters to be taken care while developing a secure information system?
--- Content provided by FirstRanker.com ---
--- Content provided by FirstRanker.com ---
SECTION-C
Note: Attempt any two questions from this section : (15x2=30)
- Explain the following Payment System in E-Commerce:
- e-Cash
- Credit/Debit Cards
- Net Banking
--- Content provided by FirstRanker.com ---
- Explain the following in detail :
- Cyber Laws in India, IT Act 2000 Provisions
- Software License
- Semiconductor Law
--- Content provided by FirstRanker.com ---
- Briefly explain the following :
- Access Control in Cyber Security
- Public Key Cryptography
- Face Recognisation
--- Content provided by FirstRanker.com ---
-x-
Source: FirstRanker.com
--- Content provided by FirstRanker.com ---
This download link is referred from the post: AKTU B-Tech Last 10 Years 2010-2020 Previous Question Papers || Dr. A.P.J. Abdul Kalam Technical University