Data Security 2 Marks
UNIT 1
Clarify Information Security
Describe Security
Describe E-mail Spoofing
List the components of information system
Paraphrase Network Security
Interpret SDLC
List the phases of SDLC Waterfall method
Explain Risk Management
Paraphrase Firewall
Articulate Security Blueprint
1. Clarify Information Security:
Information Security safeguards data from unauthorized access, misuse, or
breaches to ensure confidentiality, integrity, and availability.
2. Describe Security:
Security involves protecting systems, networks, and data from threats to prevent loss,
damage, or unauthorized access.
3. Describe E-mail Spoofing:
E-mail spoofing is when an attacker forges an email header to make it appear as if it came
from a trusted source, often used in phishing attacks.
4. List the components of information system:
• Hardware
• Software
• Data
• People
• Processes
• Networks
5. Paraphrase Network Security:
Network security refers to the strategies and tools used to protect the integrity and
accessibility of computer networks and data.
6. Interpret SDLC:
The Software Development Life Cycle (SDLC) is a structured process for planning,
developing, testing, and deploying software systems.
7. List the phases of SDLC Waterfall method:
• Requirement Analysis
• System Design
• Implementation
• Testing
• Deployment
• Maintenance
8. Explain Risk Management:
Risk management identifies, assesses, and mitigates potential threats to minimize their
impact on information systems.
9. Paraphrase Firewall:
A firewall is a security system that controls incoming and outgoing network traffic based on
predetermined rules to block unauthorized access.
10. Articulate Security Blueprint:
A Security Blueprint is a detailed plan outlining an organization’s security policies,
procedures, and technologies to protect information assets.
UNIT 2
Describe about threat
Explain Hackers
Summarize Malicious code
List the types of virus
Interpret the meaning of intellectual propery
Describe Subject and Object
Explain why access matrix is not used
Illustrate the Types of Access Control
Summarize the goals of Confidentiality Policies
Identify the main entities in Clinical Information Systems security model
Describe about Threat:
A threat is any potential danger that can exploit a vulnerability to harm a system, network,
or data.
2. Explain Hackers:
Hackers are individuals who gain unauthorized access to computer systems, often to steal,
modify, or destroy data.
3. Summarize Malicious Code:
Malicious code refers to harmful software like viruses, worms, trojans, or spyware designed
to damage or disrupt systems.
4. List the types of virus:
• File Infector Virus
• Macro Virus
• Boot Sector Virus
• Polymorphic Virus
• Multipartite Virus
5. Interpret the meaning of Intellectual Property:
Intellectual Property refers to creations of the mind—like inventions, software, or designs—
protected by law to give creators exclusive rights.
6. Describe Subject and Object:
A subject is an active entity (like a user or process) that accesses data, while an object is a
passive entity (like files or databases) being accessed.
7. Explain why Access Matrix is not used:
The Access Matrix is not used in practice due to its large size and inefficiency in managing
permissions in large systems.
8. Illustrate the Types of Access Control:
• Discretionary Access Control (DAC)
• Mandatory Access Control (MAC)
• Role-Based Access Control (RBAC)
• Attribute-Based Access Control (ABAC)
9. Summarize the goals of Confidentiality Policies:
Confidentiality policies aim to restrict unauthorized access to sensitive information and
ensure data privacy and secrecy.
10. Identify the main entities in Clinical Information Systems security model:
• Patient
• Healthcare Provider
• System Administrator
• Medical Records/Data
• Access Control Mechanisms
UNIT – III
Interpret risk assessment
Write about Discretionary Controls(DAC)
Explain what is Likelihood
Illustrate Residual Risk
Explain what are Policies
Illustrate General Security Policy
Illustrate Program Security Policy
Illustrate Issue-Specific Policies
Describe The Disaster Recovery Plan(DRP)
Describe about Business Continuity Plan(BCP)
1. Interpret Risk Assessment:
Risk assessment is the process of identifying, evaluating, and prioritizing risks to an
organization’s assets to determine potential impacts.
2. Write about Discretionary Controls (DAC):
Discretionary Access Control allows data owners to decide who can access their resources
and what actions they can perform.
3. Explain what is Likelihood:
Likelihood refers to the probability of a threat exploiting a vulnerability and causing harm to
information systems.
4. Illustrate Residual Risk:
Residual risk is the remaining risk after security measures and controls have been applied
to reduce the initial risk.
5. Explain what are Policies:
Policies are formal rules or guidelines that dictate how an organization manages and
protects its information assets.
6. Illustrate General Security Policy:
A general security policy outlines the organization’s overall commitment to protecting data
and sets the foundation for specific policies.
7. Illustrate Program Security Policy:
Program security policy defines security requirements and standards for individual
programs or systems within an organization.
8. Illustrate Issue-Specific Policies:
Issue-specific policies address specific areas of concern such as internet usage, password
rules, or email security.
9. Describe The Disaster Recovery Plan (DRP):
A DRP is a documented strategy for recovering IT systems and data after a disaster to
resume normal business operations quickly.
10. Describe about Business Continuity Plan (BCP):
BCP is a plan that ensures critical business functions continue during and after a crisis or
disruption, minimizing downtime and losses.
UNIT – IV
Discover the difference between physical design and logical design
Paint the significant points in information security blueprint
Show the five criterias for a policy to be effective and thus legally enforcable
Illustrate using the diagram for spheres of security.
Sketch the different stages in the business impact analysis step.
Experiment about the defence in depth policy.
Illustrate the components of contigency planning
Write the drawbacks of iso 17799/bs 7799.
Show the fivetesting strategies of incident planning.
1. Discover the difference between physical design and logical design:
• Logical design focuses on abstract data structures and relationships (what the
system should do).
• Physical design deals with actual hardware, software, and network components
(how the system will be implemented).
2. Paint the significant points in Information Security Blueprint:
• Defines security framework and architecture
• Aligns with business goals
• Identifies threats and vulnerabilities
• Establishes policies and controls
• Includes training and awareness plans
3. Show the five criteria for a policy to be effective and thus legally enforceable:
• Distributed and accessible
• Read and understood
• Acknowledged by users
• Consistently enforced
• Up-to-date and reviewed regularly
5. Illustrate using the diagram for Spheres of Security:
User Layer
→ Workstation
→ Internal Network
→ LAN/Servers
→ Applications/Data
→ Policies and Controls
(Each layer protected by controls like firewalls, authentication, etc.)
6. Sketch the different stages in the Business Impact Analysis step:
• Identify critical functions
• Determine dependencies
• Assess impact of disruptions
• Estimate downtime tolerance
• Recommend recovery priorities
7. Experiment about the Defence in Depth policy:
Defence in Depth is a layered security strategy where multiple defensive mechanisms (e.g.,
firewall, antivirus, access control) protect systems, so if one fails, others still provide
protection.
8. Illustrate the components of Contingency Planning:
• Business Impact Analysis (BIA)
• Incident Response Plan (IRP)
• Disaster Recovery Plan (DRP)
• Business Continuity Plan (BCP)
• Testing and Training
9. Write the drawbacks of ISO 17799 / BS 7799:
• High implementation cost
• Too generic and lacks specificity
• Requires customization for industries
• Complex for small organizations
• Doesn’t cover legal compliance in detail
10. Show the five testing strategies of incident planning:
• Checklist Testing
• Structured Walk-Through
• Simulation Testing
• Parallel Testing
• Full-Interruption Testing
4. Demonstrate the five testing strategies of incident planning :
1. Checklist Testing – A review of the incident response plan by comparing it against a
checklist to ensure all components are present.
2. Structured Walkthrough (Tabletop Test) – Team members verbally walk through
the steps of the plan to identify gaps or improvements.
3. Simulation Testing – A simulated incident is created to test how well the team
responds in real-time without affecting operations.
4. Parallel Testing – Backup systems are tested in parallel with live systems to ensure
they can take over if needed.
5. Full-Interruption Testing – The normal operations are shut down to test full
recovery procedures. It's risky and used cautiously.
UNIT – V
Illustrate the mechanisms that access control relies on.
Differentiate signature-based IDPS and behaviour-based IDPS.
Outline hybrid firewall.
Outline the five generations of Firewalls.
Analyse the primary disadvantage of application-level firewalls.
Illustrate cryptography
Differentiate Honey pots and Honey Nets
Compare Cryptography and Steganography
Categorize IDPS detection methods.
Devise the controls of protecting the secure facility.
1. Illustrate the mechanisms that Access Control relies on:
Access control relies on the following mechanisms:
• Identification – Recognizing a user
• Authentication – Verifying identity (e.g., password, biometrics)
• Authorization – Granting access rights
• Accountability – Tracking user actions (audit logs)
2. Differentiate Signature-Based IDPS and Behaviour-Based IDPS:
• Signature-Based IDPS detects known threats using predefined patterns.
• Behaviour-Based IDPS identifies abnormal activities by analyzing system behavior.
3. Outline Hybrid Firewall:
A hybrid firewall combines packet filtering, stateful inspection, and application-layer
filtering to provide stronger, more flexible network protection.
4. Outline the Five Generations of Firewalls:
1. Packet Filtering Firewalls
2. Stateful Inspection Firewalls
3. Application-Level Gateways (Proxies)
4. Dynamic Packet Filtering Firewalls
5. Kernel Proxy Firewalls / Next-Gen Firewalls
5. Analyse the Primary Disadvantage of Application-Level Firewalls:
They introduce latency and require more resources because they inspect data at the
application layer, making them slower and harder to configure.
6. Illustrate Cryptography:
Cryptography is the process of converting readable data into an unreadable form using
encryption to ensure confidentiality, integrity, and authentication.
7. Differentiate Honey Pots and Honey Nets:
• A Honeypot is a single system set up to attract attackers.
• A Honeynet is a network of honeypots that simulates a full environment.
8. Compare Cryptography and Steganography:
• Cryptography hides the content of the message.
• Steganography hides the existence of the message.
9. Categorize IDPS Detection Methods:
• Signature-Based Detection
• Anomaly/Behaviour-Based Detection
• Stateful Protocol Analysis
• Hybrid Detection (combines multiple methods)
10. Devise the Controls of Protecting the Secure Facility:
• Physical Barriers (e.g., fences, locks)
• Surveillance Systems (CCTV)
• Security Guards
• Biometric/Access Controls
• Environmental Controls (fire suppression, HVAC)