SlideShare a Scribd company logo
1 of 2
RAJ KUMAR GOEL INSTITUTE OF TECHNOLOGY FOR WOMEN, GZB
Pre-University Examination 2015-16 (Even Semester)
Roll No.: Subject Name: CYBER SECURITY
Year/Branch: II /EC/EN Subject Code: AUC-002
Max Time: 3 Hours Max Marks: 100
SECTION-A
Q.1 Attempt all parts carry equal marks. Write answer of each part in short. (2x10=20)
(a) What is information system?
(b) Define information assurance.
(c) What do you mean by an attack?
(d) Why is backup essential?
(e) Write short note on denial of service attack.
(f) What do you mean by confidentiality.
(g) What is digital signature?
(h) Explain the security threats ?
(i) What is the use of CCTV in information security ?
(j) Briefly explain copyright law.
SECTION-B
Note: Attempt any five questions from this section. (10x5=50)
Q.1 What is the information security? Explain cyber crime and cyber security in this refereence.
Q.2 What are the security issues related hardware, data storage and downloadable devices?
Q.3 Describe security risk analysis in detail.
Q.4 What do you understand by security architecture and design? Discuss.
Q.5 What do you mean by firewall? Give its limitations and also explain types of
firewall.
Q.6 What do you mean by cryptography? Also differentiate between public key cryptography and
private key cryptography.
Q.7 What are intellectual property and intellectual property rights? What different categories of
intellectual properties have been defined in India? Expalin the feature of Indian Copyright
Act.
Q.8 Discuss the Virtual Private Network (VPN) along with its advantages. Also explain
tunneling in VPN.
SECTION-C
Note: Attempt any two questions from this section. (15x2=30)
Q.1 a) What is access control? Eplain different types.
b) Define Intrusion Dtection System (IDS). How you can say that IDS is the backbone of
information system.
Q.2 a) What are electronic – payment system ? Compare electronic – payment system over
internet with conventional payment mechanism.
b) Write short note on –
i. Credit/debit card
ii. E-cash
iii. Smart card
Q.3 a) What are the ISO standards for information security ? Discuss.
b) Explain the IT Act 2000 .

More Related Content

Similar to Cyber security put paper

Security in the Internet of Things
Security in the Internet of ThingsSecurity in the Internet of Things
Security in the Internet of ThingsBHAVANA KONERU
 
A Study on Device Oriented Security Challenges in Internet of Things (IoT)
A Study on Device Oriented Security Challenges in Internet of Things (IoT)A Study on Device Oriented Security Challenges in Internet of Things (IoT)
A Study on Device Oriented Security Challenges in Internet of Things (IoT)Eswar Publications
 
Network Security (May – 2018) [IDOL: Revised Course | Question Paper]
Network Security (May – 2018) [IDOL: Revised Course | Question Paper]Network Security (May – 2018) [IDOL: Revised Course | Question Paper]
Network Security (May – 2018) [IDOL: Revised Course | Question Paper]Mumbai B.Sc.IT Study
 
Enterprise Networking (May – 2019) [Choice Based | Question Paper]
Enterprise Networking (May – 2019) [Choice Based | Question Paper]Enterprise Networking (May – 2019) [Choice Based | Question Paper]
Enterprise Networking (May – 2019) [Choice Based | Question Paper]Mumbai B.Sc.IT Study
 
October 2021: Top 10 Read Articles in Network Security and Its Applications
October 2021: Top 10 Read Articles in Network Security and Its ApplicationsOctober 2021: Top 10 Read Articles in Network Security and Its Applications
October 2021: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
 
85320337 networking-case-study
85320337 networking-case-study85320337 networking-case-study
85320337 networking-case-studyhomeworkping3
 
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...IJCNCJournal
 
Cybersecurity Interview Preparation Questions.pdf
Cybersecurity Interview Preparation Questions.pdfCybersecurity Interview Preparation Questions.pdf
Cybersecurity Interview Preparation Questions.pdfHaris Chughtai
 
IPR & Cyber Law (December - 2018) [IDOL - Revised Course]
IPR & Cyber Law (December - 2018) [IDOL - Revised Course]IPR & Cyber Law (December - 2018) [IDOL - Revised Course]
IPR & Cyber Law (December - 2018) [IDOL - Revised Course]Mumbai B.Sc.IT Study
 
Security solutions in vlsi design
Security solutions in vlsi  designSecurity solutions in vlsi  design
Security solutions in vlsi designRaja pirian
 
A STUDY ON SECURITY ISSUES AND CHALLENGES IN IoT
A STUDY ON SECURITY ISSUES AND CHALLENGES IN IoTA STUDY ON SECURITY ISSUES AND CHALLENGES IN IoT
A STUDY ON SECURITY ISSUES AND CHALLENGES IN IoTDaniel Wachtel
 
A Survey on Security and Privacy Issues in Edge Computing-Assisted Internet o...
A Survey on Security and Privacy Issues in Edge Computing-Assisted Internet o...A Survey on Security and Privacy Issues in Edge Computing-Assisted Internet o...
A Survey on Security and Privacy Issues in Edge Computing-Assisted Internet o...DESMOND YUEN
 
Fog computing security and privacy issues, open challenges, and blockchain so...
Fog computing security and privacy issues, open challenges, and blockchain so...Fog computing security and privacy issues, open challenges, and blockchain so...
Fog computing security and privacy issues, open challenges, and blockchain so...IJECEIAES
 
Architecting cybersecurity to future proof smart cities against emerging cybe...
Architecting cybersecurity to future proof smart cities against emerging cybe...Architecting cybersecurity to future proof smart cities against emerging cybe...
Architecting cybersecurity to future proof smart cities against emerging cybe...NUS-ISS
 
A reliable next generation cyber security architecture for industrial interne...
A reliable next generation cyber security architecture for industrial interne...A reliable next generation cyber security architecture for industrial interne...
A reliable next generation cyber security architecture for industrial interne...IJECEIAES
 
Survey of Operating Systems for the IoT Environment
Survey of Operating Systems for the IoT EnvironmentSurvey of Operating Systems for the IoT Environment
Survey of Operating Systems for the IoT EnvironmentEswar Publications
 
C O M P U T E R N E T W O R K S J N T U M O D E L P A P E R{Www
C O M P U T E R  N E T W O R K S  J N T U  M O D E L  P A P E R{WwwC O M P U T E R  N E T W O R K S  J N T U  M O D E L  P A P E R{Www
C O M P U T E R N E T W O R K S J N T U M O D E L P A P E R{Wwwguest3f9c6b
 
Computer Networks Jntu Model Paper{Www.Studentyogi.Com}
Computer Networks Jntu Model Paper{Www.Studentyogi.Com}Computer Networks Jntu Model Paper{Www.Studentyogi.Com}
Computer Networks Jntu Model Paper{Www.Studentyogi.Com}guest3f9c6b
 

Similar to Cyber security put paper (20)

Security in the Internet of Things
Security in the Internet of ThingsSecurity in the Internet of Things
Security in the Internet of Things
 
A Study on Device Oriented Security Challenges in Internet of Things (IoT)
A Study on Device Oriented Security Challenges in Internet of Things (IoT)A Study on Device Oriented Security Challenges in Internet of Things (IoT)
A Study on Device Oriented Security Challenges in Internet of Things (IoT)
 
Network Security (May – 2018) [IDOL: Revised Course | Question Paper]
Network Security (May – 2018) [IDOL: Revised Course | Question Paper]Network Security (May – 2018) [IDOL: Revised Course | Question Paper]
Network Security (May – 2018) [IDOL: Revised Course | Question Paper]
 
ethicsIAT2.doc
ethicsIAT2.docethicsIAT2.doc
ethicsIAT2.doc
 
Enterprise Networking (May – 2019) [Choice Based | Question Paper]
Enterprise Networking (May – 2019) [Choice Based | Question Paper]Enterprise Networking (May – 2019) [Choice Based | Question Paper]
Enterprise Networking (May – 2019) [Choice Based | Question Paper]
 
October 2021: Top 10 Read Articles in Network Security and Its Applications
October 2021: Top 10 Read Articles in Network Security and Its ApplicationsOctober 2021: Top 10 Read Articles in Network Security and Its Applications
October 2021: Top 10 Read Articles in Network Security and Its Applications
 
85320337 networking-case-study
85320337 networking-case-study85320337 networking-case-study
85320337 networking-case-study
 
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
 
Cybersecurity Interview Preparation Questions.pdf
Cybersecurity Interview Preparation Questions.pdfCybersecurity Interview Preparation Questions.pdf
Cybersecurity Interview Preparation Questions.pdf
 
IPR & Cyber Law (December - 2018) [IDOL - Revised Course]
IPR & Cyber Law (December - 2018) [IDOL - Revised Course]IPR & Cyber Law (December - 2018) [IDOL - Revised Course]
IPR & Cyber Law (December - 2018) [IDOL - Revised Course]
 
Security solutions in vlsi design
Security solutions in vlsi  designSecurity solutions in vlsi  design
Security solutions in vlsi design
 
A STUDY ON SECURITY ISSUES AND CHALLENGES IN IoT
A STUDY ON SECURITY ISSUES AND CHALLENGES IN IoTA STUDY ON SECURITY ISSUES AND CHALLENGES IN IoT
A STUDY ON SECURITY ISSUES AND CHALLENGES IN IoT
 
A Survey on Security and Privacy Issues in Edge Computing-Assisted Internet o...
A Survey on Security and Privacy Issues in Edge Computing-Assisted Internet o...A Survey on Security and Privacy Issues in Edge Computing-Assisted Internet o...
A Survey on Security and Privacy Issues in Edge Computing-Assisted Internet o...
 
Fog computing security and privacy issues, open challenges, and blockchain so...
Fog computing security and privacy issues, open challenges, and blockchain so...Fog computing security and privacy issues, open challenges, and blockchain so...
Fog computing security and privacy issues, open challenges, and blockchain so...
 
Architecting cybersecurity to future proof smart cities against emerging cybe...
Architecting cybersecurity to future proof smart cities against emerging cybe...Architecting cybersecurity to future proof smart cities against emerging cybe...
Architecting cybersecurity to future proof smart cities against emerging cybe...
 
A reliable next generation cyber security architecture for industrial interne...
A reliable next generation cyber security architecture for industrial interne...A reliable next generation cyber security architecture for industrial interne...
A reliable next generation cyber security architecture for industrial interne...
 
Survey of Operating Systems for the IoT Environment
Survey of Operating Systems for the IoT EnvironmentSurvey of Operating Systems for the IoT Environment
Survey of Operating Systems for the IoT Environment
 
C O M P U T E R N E T W O R K S J N T U M O D E L P A P E R{Www
C O M P U T E R  N E T W O R K S  J N T U  M O D E L  P A P E R{WwwC O M P U T E R  N E T W O R K S  J N T U  M O D E L  P A P E R{Www
C O M P U T E R N E T W O R K S J N T U M O D E L P A P E R{Www
 
Computer Networks Jntu Model Paper{Www.Studentyogi.Com}
Computer Networks Jntu Model Paper{Www.Studentyogi.Com}Computer Networks Jntu Model Paper{Www.Studentyogi.Com}
Computer Networks Jntu Model Paper{Www.Studentyogi.Com}
 
INT 1010 05-1.pdf
INT 1010 05-1.pdfINT 1010 05-1.pdf
INT 1010 05-1.pdf
 

Recently uploaded

Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
ROOT CAUSE ANALYSIS PowerPoint Presentation
ROOT CAUSE ANALYSIS PowerPoint PresentationROOT CAUSE ANALYSIS PowerPoint Presentation
ROOT CAUSE ANALYSIS PowerPoint PresentationAadityaSharma884161
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPCeline George
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxAnupkumar Sharma
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceSamikshaHamane
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfphamnguyenenglishnb
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Quarter 4 Peace-education.pptx Catch Up Friday
Quarter 4 Peace-education.pptx Catch Up FridayQuarter 4 Peace-education.pptx Catch Up Friday
Quarter 4 Peace-education.pptx Catch Up FridayMakMakNepo
 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomnelietumpap1
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Celine George
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designMIPLM
 

Recently uploaded (20)

Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
ROOT CAUSE ANALYSIS PowerPoint Presentation
ROOT CAUSE ANALYSIS PowerPoint PresentationROOT CAUSE ANALYSIS PowerPoint Presentation
ROOT CAUSE ANALYSIS PowerPoint Presentation
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERP
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in Pharmacovigilance
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Quarter 4 Peace-education.pptx Catch Up Friday
Quarter 4 Peace-education.pptx Catch Up FridayQuarter 4 Peace-education.pptx Catch Up Friday
Quarter 4 Peace-education.pptx Catch Up Friday
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choom
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-design
 

Cyber security put paper

  • 1. RAJ KUMAR GOEL INSTITUTE OF TECHNOLOGY FOR WOMEN, GZB Pre-University Examination 2015-16 (Even Semester) Roll No.: Subject Name: CYBER SECURITY Year/Branch: II /EC/EN Subject Code: AUC-002 Max Time: 3 Hours Max Marks: 100 SECTION-A Q.1 Attempt all parts carry equal marks. Write answer of each part in short. (2x10=20) (a) What is information system? (b) Define information assurance. (c) What do you mean by an attack? (d) Why is backup essential? (e) Write short note on denial of service attack. (f) What do you mean by confidentiality. (g) What is digital signature? (h) Explain the security threats ? (i) What is the use of CCTV in information security ? (j) Briefly explain copyright law. SECTION-B Note: Attempt any five questions from this section. (10x5=50) Q.1 What is the information security? Explain cyber crime and cyber security in this refereence. Q.2 What are the security issues related hardware, data storage and downloadable devices? Q.3 Describe security risk analysis in detail. Q.4 What do you understand by security architecture and design? Discuss. Q.5 What do you mean by firewall? Give its limitations and also explain types of firewall. Q.6 What do you mean by cryptography? Also differentiate between public key cryptography and private key cryptography. Q.7 What are intellectual property and intellectual property rights? What different categories of intellectual properties have been defined in India? Expalin the feature of Indian Copyright Act. Q.8 Discuss the Virtual Private Network (VPN) along with its advantages. Also explain tunneling in VPN.
  • 2. SECTION-C Note: Attempt any two questions from this section. (15x2=30) Q.1 a) What is access control? Eplain different types. b) Define Intrusion Dtection System (IDS). How you can say that IDS is the backbone of information system. Q.2 a) What are electronic – payment system ? Compare electronic – payment system over internet with conventional payment mechanism. b) Write short note on – i. Credit/debit card ii. E-cash iii. Smart card Q.3 a) What are the ISO standards for information security ? Discuss. b) Explain the IT Act 2000 .