0% found this document useful (0 votes)
19 views4 pages

Extra Coomn

The document outlines various topics related to computer security, including definitions, types of attacks, and security principles. It covers concepts such as risk and threat analysis, virus types, access control policies, cryptography techniques, firewalls, and cybercrime. Additionally, it discusses specific security measures like biometrics, digital signatures, and compliance standards.

Uploaded by

aniketawachat13
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
0% found this document useful (0 votes)
19 views4 pages

Extra Coomn

The document outlines various topics related to computer security, including definitions, types of attacks, and security principles. It covers concepts such as risk and threat analysis, virus types, access control policies, cryptography techniques, firewalls, and cybercrime. Additionally, it discusses specific security measures like biometrics, digital signatures, and compliance standards.

Uploaded by

aniketawachat13
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
You are on page 1/ 4
Unit No} |, What is Computer Security & its need ? 2. Explain Security Basics in detail. OR Describe CIA security mdbgl? 3. Explain risk & threat analysis: w.rt. assets, Ci) Threats, ii) Vulnerabilities _ 4, Describe Insiders & Intruders. Who is more dangerous ? S. What is a virus ? Describe various phases of virus? $$$ __—— ree 6. Define virus. Explain atleast S types of viruses? 7. Describe with the neot diagram model fr security? 8, Describe the following term : sniffing Gi) Spoofing Gil) Man-in-the middle GU)TCPIIP Hijack 9. State the types of attacks and describe Active and Passive attack with at least one exomple each? 10, List types of attacks. Explain back doors and trap doors attacks? Unit No 2 1. Explain the following term ws to security 2. Identificetion b. Authentication 2. Describe Password Attack in Detail? 3. Whot is Biometrie Access Control ? Explain With dig ? 4. Enlist types of Biometrics? Explain any 2? 5. Explain Principal of Access Control? 6, Describe following Access Control policies in detail DAC ii)MAC Iii) RBAC Unit No 3 Y re 4 - 1. Explain the Following term . Plain Text b. Cipher Text © Cryptography 2. Cryptanolysis ©. Cryptology 2. Explain Substitution and Transposition Techniques? 5 Uist the application Characteristics and Need of cryptogrophy? “4, Coment Plain Text into Cipher Text using Coeser’s technique: WELCOME HOME ? ae S Comvert plain Text into into Cipher Text Using Columnar Techniques: NETWORK INFORMATION AND SECURITY? i 6. Compare. Substitution Technique And Transposition Techniques? 7. Distinguish Between Symmetric Key Cryptography And Asymmetric key Craptography? 2. Describe Stegnogrophy With Its Advantages And Disadvantages ? 4. Describe DES Algorithm? List the Steps of DES Algorithm? 10.Describe Digital Signature With Its Block Diagram? List Any two Advantages And Disadvantages? Unit No.4 |. Define Firewall? 2. Stote the working of Firewall ? State the needs ? 2. List and Describe different types of firewall with its advantages and disadvantages ? 4. List charateristics of firewall? 5. Describe various firewall policies ? 6, Stste different rule set of firewall ? 7. List and Describe different firewall configuration with the help of “8. State the Limitations of Firewall? @, Describe DM2 in detail with the help of Dig? 10.Define IDS ? : N.DiFference Between NIDS And HIDS ? 12.Describe HIDS Components with labelled Dig ? 13.Describe NIDS Components With Labelled Dig ? Vulnerability Assesment {ee Anomaly Detection iii. Misuse Detection Unit No S — 1. Describe Kerberos with their usages? 2. Describe IPsec Security with the help of sketch ? 2. Describe Email Security with their techniques ? 4. Describe in brief cyber crime ? 5. List and Describe different types of cyber crime ? 6, Describe cyber lows with their categories ? 7. Describe Compliance Standard in detail ? 4. List ond Describe different types of cybercrime? 4, Describe 150 27001? po 10.Describe 1SO 20000? || describe COBIT Framework | |] t2uahat is Pornography? with the help of sketch ?

You might also like