Printed Pages: 2
EIT505
(Following Paper ID and Roll No. to be filled in your Answer Book)
--- Content provided by FirstRanker.com ---
PAPER ID: 110605
Roll No.
B. Tech.
(SEM. VI) THEORY EXAMINATION, 2014-15
INFORMATION SECURITY AND CYBER LAWS
--- Content provided by FirstRanker.com ---
Time: 2 Hours] [Total Marks: 50
1 Attempt any four parts of the following: 3×4=12
- (a) Define the term "tunnelling" in VPN. Explain its different types of it.
- (b) Discuss the different approaches used for Intrusion Detection in a system.
- (c) Differentiate between direct and indirect security metrics.
- (d) What is Electronic Data Interchange? What are the benefits of EDI ?
- (e) Write down the different factors of biometric system.
- (f) Explain the following term:
- (i) Confidentiality
- (ii) Data Integrity
--- Content provided by FirstRanker.com ---
--- Content provided by FirstRanker.com ---
2 Attempt any four parts of the following: 3×4=12
- (a) Explain the biometric system with the help of a diagram.
- (b) What is VPN? Discuss different types of VPN.
- (c) Differentiate between Credit card and Debit card.
- (d) What is E-Commerce? Explain different types of it.
- (e) What is Physical Security? Write down the basic tenets of physical security.
- (f) Discuss the ethical and legal issues in software piracy.
--- Content provided by FirstRanker.com ---
3 Attempt any Two parts of the following: 7×2=14
- (a) What do you mean by cyber crime? Discuss different types of cyber crime in detail.
- (b) Write down short note on the following:
- (i) IPR
- (ii) Patent Law
- (iii) Copyright Law
--- Content provided by FirstRanker.com ---
- (c) What is information system? Explain the different characteristics and components of information system.
4 Attempt any Two parts of the following: 6×2=12
--- Content provided by FirstRanker.com ---
- (a) What do you mean by access control to an information resource? Discuss differences between authentication and user identification.
- (b) What is Digital Signature system? How digital signature are related to Public Key Cryptography?
- (c) What are various types of threats to Information Systems? Discuss in detail.
Get More previous year question papers at FirstRanker.com
--- Content provided by FirstRanker.com ---
This download link is referred from the post: AKTU B-Tech Last 10 Years 2010-2020 Previous Question Papers || Dr. A.P.J. Abdul Kalam Technical University