Download AKTU B-Tech 4th Sem 2015-16 AUC 002 Cyber Security Question Paper

Download AKTU (Dr. A.P.J. Abdul Kalam Technical University (AKTU), formerly Uttar Pradesh Technical University (UPTU) B-Tech 4th Semester (Fourth Semester) 2015-16 AUC 002 Cyber Security Question Paper

Printed Pages: 4 AUC-002
(Following Paper ID and Roll No. to be ?lled in your
Answer Books)
RollNoI l] I l
.0......
Theory Examination (Semester-IV) 2015-16
CYBER SECURITY
mm: : 2 Hours Max. Marks : 50
Sec?on-A
Note : Attempt all the parts. All parts carry equal marks. Write
answer of each part in short.
Q1. Attempt any ?ve parts : (2X5=10)
(a) What are the security threats? Discuss.
(b) What do you understand by security structure and
design?
(c) Descnbe the Intellectual Property Issues (IPR).
(d) Discuss the di??erence between Malware and spyware.
(1) P.T.O.
3105/273/2009/50225

Q2.
(6)
(f)
(h).
(i)
(1')
Who are the major, victims of cyber-crime?
What do you know about Security Risk Management?
What are ?rewalls?
Is hacking always for ?nancial gains?
Why backup is essential?
What is a virus? Explain.
Section-B
Attempt any four questions from this section. (4X5=20)
(a)
(b)
(C)
(d)
What are the key technological components used for
secun'ty implementatbn?
What is the information security? Explain cyber-crime
and cyber security in this reference.
Draw the diagrammatical approach to make difference
between symmetric and asymmetric cryptography.
How can you say that intrusion detection system is the
backbone of information system? Justify along with its
categories.
(2)
3105/273/2009/50225
(f)
(g)
01)
Write short note on:
i. Incident Response Plan
ii. Disaster Response Plan
iii. Business continuity Plan
Elaborate the difference between security and threats
and explain web security.
What is security SDLC? Explain its different phases.
Explain and di??erentiate between integrating security at
the implementation phase and the developing phase.
Section-C
Note: Attempt any two questions from this section.
(2x10=20)
Q3. Elaborate the term access control What is included in autho-
rization process for (File, Program, Data rights) and explain
the all types of controls. [5+5]
Q4. What are the data security considerations? Explain in this ref-
erence Data backup security, data archival security and data
disposal considerations. [5+5]
(3) P.T.O.
3105/773/2009/50225

Q5. Write short notes on any two of the follows:
(1) Intellectual Property Law
(ii) Copyright Act
(iii) Cyber Laws in India.
_ (4)
3105/273/2009/50225

This post was last modified on 29 January 2020