Firstranker's choice
Printed Pages: 01
--- Content provided by FirstRanker.com ---
Paper Id: 199503
Sub Code: RUC 501
Roll No.
B TECH
--- Content provided by FirstRanker.com ---
(SEM V) THEORY EXAMINATION 2018-19
CYBER SECURITY
Time: 3 Hours
Total Marks: 70
Note: 1. Attempt all Sections. If require any missing data; then choose suitably.
--- Content provided by FirstRanker.com ---
SECTION A
- Attempt all questions in brief. 2 x 7 = 14
- Write a short note on the Copyright Act?
- What do you mean by physical Security for information Systems?
- Describe Intellectual Property Issues (IPR).
- Write short notes on "Patent Law".
- What do you mean by WWW policy?
- Give small notes on Corporate Policy.
- Differentiate between Cyber Security and Information Security.
--- Content provided by FirstRanker.com ---
SECTION B
--- Content provided by FirstRanker.com ---
- Attempt any three of the following: 7 x 3 = 21
- What are the key differences between Symmetric and Asymmetric encryption?
- Explain Information Security Governance in detail and process involved in the Risk Management?
- Explain briefly about Application Development Security with guidelines.
- Elaborate the term Access Control. What is include in authorization process for (File, Program, Data rights) and explain the all types of controls.
- What do you understand by security structure (Architecture) and design?
--- Content provided by FirstRanker.com ---
SECTION C
- Attempt any one part of the following: 7x1=7
- What do you mean by Intellectual Property? Describe various means using which Intellectual Property may be protected to an extent.
- Explain Confidentiality, Integrity and Availability in terms of cyber security.
- Attempt any one part of the following: 7x1=7
- What are the approaches followed in developing Information System (IS)? Explain the difference between security and threats.
- What is the need of information Security also explain the term ISMS?
- Attempt any one part of the following: 7x1=7
- Explain the role of Security in Internet and Web Services.
- What is Intrusion Detection System? Explain with Block Diagram.
--- Content provided by FirstRanker.com ---
- Attempt any one part of the following: 7x1=7
- Explain in Detail about Secure Information System Development.
- Describe the working principle of CCTV.
- Attempt any one part of the following: 7x1=7
- What are the Data Security Considerations? Explain in this reference Data Backup Security.
- What is Public Key Cryptography? Define its Advantage and Disadvantage.
--- Content provided by FirstRanker.com ---
--- Content provided by FirstRanker.com ---
--- Content provided by FirstRanker.com ---
This download link is referred from the post: AKTU B-Tech Last 10 Years 2010-2020 Previous Question Papers || Dr. A.P.J. Abdul Kalam Technical University