Download AKTU B-Tech 6th Sem 2014-2015 Information Security And Cyber Laws Question Paper

Download AKTU (Dr. A.P.J. Abdul Kalam Technical University (AKTU), formerly Uttar Pradesh Technical University (UPTU) B-Tech 6th Semester (Sixth Semester) 2014-2015 Information Security And Cyber Laws Question Paper

_ Printed Pages : 2
IIIIIUIIIIIIIIII?l|||?||lll?|lllsll|11!|| EIT505
(Following Paper [D and Roll No. to be filled in your Answer Book)
PAPER ID : 110605
Roll No.
(B. Tech.
{SEMJ V1) THEORY EXAMINATION, 2014-15
INFORMATION SECURITY AND CYBER LAWS
Time : 2 Hours] [Total Marks : 50
l Attempt any four parts of the following: 3X4=12
(a) De?ne the term "tunnelling" in VPN. Expalin its
different types of it.
(b) Discuss the different approaches used for Intrusion
Detection in a system.
(c) Differentiate between direct and indirect security
metrics.
(d) What is Electronic Data Interchange? What are
the bene?ts of EDI ?!
(0) Write down the different factors of biometric
system.
(1) Explain the following term:
(i) Con?dentiality
(ii) Data Integrity
110605] 1 [ Contd...

110605]
2 Attempt any four parts of the following: 3X4==12
(a) Explain the biometric system with the help of a
diagram.
(b) What is VPN ? Discuss different types of VPN.
(c) Differentiate between Credit card and Debit card.
(d) What is E-Commerce? Explain different types of
It.
(e) What is Physical Security? Write down the basic
tenets of physical security.
(0 Discuss the ethical and legal issues in so?ware
piracy.
3 Attempt any Two parts of the following: 7><2=14
(a) What do you mean by cyber cime? Discuss
different types of cyber crime in detail.
(b) Write down short note on the following:
(i) IPR (ii) Patent Law (iii) Copyright Law
(c) What is information system? Explain the di??erent
characteristics and components of information
system. ?
4 Attempt any Two parts of the following: , 6X2=12
(a) \ What do you mean by access control to an
infonnation resource? Discuss differences between
authentication and user identi?cation.
(b) What is Digital Signature system? How digital
signature are related to Public Key Cryptography?
" (c) What are van'ous types of threats to Information
Systems? Discuss in detail.
2 [13775]

This post was last modified on 29 January 2020