question-bank - DIS (1)
question-bank - DIS (1)
question-bank - DIS (1)
UNIT I - INRODUCTION
TWO MARKS
security.
13) Evaluate the various components of Information Security that a successful organization must
have.
14) i)List the various components of an information system and tell about them.
ii)List the history of Information Security.
15) i).What is NSTISSC Security Model?
ii).Describein detail about the top down approach and the bottom up approach with the help
of a diagram.
8) How will you develop management groups that are responsible for implementing information
security to protect the organization’s ability to function ?
9) Illustrate the methods does a social engineering hacker use to gain information about a user’s
login id and password? How would this method differ if it were targeted towards an
administrator’s assistant versus a data-entry clerk?
10) i) Statethe types of password attacks.
ii) Tell the three ways in which an authorization can be handled.
11) i)List the Computer Security Hybrid Policies.
ii) Describe the types of Computer Security.
12) i)Explain Integrity Policies.
ii) Assessthe Secure Software Development.
ii) Explain the categories of web security threats that affects the integrity, authenticity,
confidentiality and availability and explain its consequences and countermeasures.
4) Explain the protocols for securing internet communication, email and web transactions.
6) You are developing a mobile application where users can chat securely with one another. The
application will send messages over the internet, and you want to ensure that these messages remain
private and unaltered during transit. Describe how you would apply Transport Level Security (TLS) in
your application to protect the messages. Discuss how the two layers of protocols in TLS architecture
would participate in establishing and maintaining this secure communication.