R15
Code No: 824BC
--- Content provided by FirstRanker.com ---
--- Content provided by FirstRanker.com ---
--- Content provided by FirstRanker.com ---
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY HYDERABAD
--- Content provided by FirstRanker.com ---
MCA V Semester Examinations, June/July - 2018
PRINCIPLES OF INFORMATION SECURITY
--- Content provided by FirstRanker.com ---
Time: 3hrs--- Content provided by FirstRanker.com ---
--- Content provided by FirstRanker.com ---
--- Content provided by FirstRanker.com ---
Max.Marks:75
Note: This question paper contains two parts A and B.
--- Content provided by FirstRanker.com ---
Part A is compulsory which carries 25 marks. Answer all questions in Part A. Part B
consists of 5 Units. Answer any one full question from each unit. Each question carries
10 marks and may have a, b, c as sub questions.
--- Content provided by FirstRanker.com ---
PART - A
--- Content provided by FirstRanker.com ---
--- Content provided by FirstRanker.com ---
--- Content provided by FirstRanker.com ---
--- Content provided by FirstRanker.com ---
5 ? 5 Marks = 25
--- Content provided by FirstRanker.com ---
1.a) What are the components of information security? Explain briefly.
--- Content provided by FirstRanker.com ---
[5]b) Describe digital millennium copy right act.
--- Content provided by FirstRanker.com ---
--- Content provided by FirstRanker.com ---
[5]
c) Explain the mechanisms of access control.
--- Content provided by FirstRanker.com ---
--- Content provided by FirstRanker.com ---
[5]
--- Content provided by FirstRanker.com ---
d) Describe Vernam and Ex-or ciphers with an example.
--- Content provided by FirstRanker.com ---
[5]
--- Content provided by FirstRanker.com ---
e) Describe the goals and team of digital forensic.
--- Content provided by FirstRanker.com ---
--- Content provided by FirstRanker.com ---
[5]
--- Content provided by FirstRanker.com ---
PART - B--- Content provided by FirstRanker.com ---
--- Content provided by FirstRanker.com ---
--- Content provided by FirstRanker.com ---
5 ? 10 Marks = 50
--- Content provided by FirstRanker.com ---
2.a)Describe the various phases of information security.
b)
--- Content provided by FirstRanker.com ---
Explain information extortion? Describe how such an attack can cause losses.
[5+5]
--- Content provided by FirstRanker.com ---
OR3.a)
Explain, the problem arises in software development security.
--- Content provided by FirstRanker.com ---
b)
What is information system? Explain its components.
--- Content provided by FirstRanker.com ---
--- Content provided by FirstRanker.com ---
[5+5]
--- Content provided by FirstRanker.com ---
4.What is Enterprise information security policy? Explain in detail its components. [10]
OR
--- Content provided by FirstRanker.com ---
5.
Discuss about five elements of business impact analysis for information security. [10]
--- Content provided by FirstRanker.com ---
6.
Give a detailed note on components of risk identification in information security. [10]
--- Content provided by FirstRanker.com ---
OR7.a)
Describe virtual private networks.
--- Content provided by FirstRanker.com ---
b) Explain network intrusion detection and prevention system.
--- Content provided by FirstRanker.com ---
[5+5]
--- Content provided by FirstRanker.com ---
8.Explain RSA algorithm and write its strengths and weaknesses.
--- Content provided by FirstRanker.com ---
[10]
--- Content provided by FirstRanker.com ---
OR9.
Explain components of public key infrastructure.
--- Content provided by FirstRanker.com ---
--- Content provided by FirstRanker.com ---
[10]
--- Content provided by FirstRanker.com ---
10.
--- Content provided by FirstRanker.com ---
Describe the life cycle of information security services.--- Content provided by FirstRanker.com ---
[10]
--- Content provided by FirstRanker.com ---
OR11.a) Explain various method to acquire forensic data.
b) Explain vulnerability assessment of security maintenance model.
--- Content provided by FirstRanker.com ---
[5+5]
--- Content provided by FirstRanker.com ---
---oo0oo---