Information Security Two Marks With Answer
Information Security Two Marks With Answer
Information Security Two Marks With Answer
3 0 0 3
OBJECTIVES:
To understand the basics of Information Security
To know the legal, ethical and professional issues in Information Security
To know the aspects of risk management
To become aware of various standards in this area
To know the technological aspects of Information Security
UNIT I INTRODUCTION 9
History, What is Information Security?, Critical Characteristics of Information,
NSTISSC Security Model, Components of an Information System, Securing the
Components, Balancing Security and Access, The SDLC, The Security SDLC
OUTCOMES:
At the end of this course, the students should be able to:
Discuss the basics of information security
Illustrate the legal, ethical and professional issues in information security
Demonstrate the aspects of risk management.
Become aware of various standards in the Information Security System
Design and implementation of Security Techniques.
TEXT BOOK:
1. Michael E Whitman and Herbert J Mattord, “Principles of Information
Security”, VikasPublishing House, New Delhi, 2003
REFERENCES:
1. Micki Krause, Harold F. Tipton, “ Handbook of Information Security
Management”, Vol 1-3CRC Press LLC, 2004.
2. Stuart McClure, Joel Scrambray, George Kurtz, “Hacking Exposed”, Tata
McGraw- Hill,2003
3. Matt Bishop, “Computer Security Art and Science”, Pearson/PHI, 2002.
UNIT – I
PART – A (2 Marks)
When a computer is the subject of attack, it is used as an active tool to conduct the
attack. When a computer is the object of an attack, it is the entity being attacked.
Vulnerability Exposure
Weakness or fault in a system or protection The exposure of an information system is a
mechanism that expose information to single instance when the system is open to
attack or damage. damage.
Software
Hardware
Data
People
Procedures
Networks
Investigation
Analysis
Logical Design
Physical Design
Implementation
Maintenance & change
PART – B
PART – C
1. Explain any five professionals in information security with their role and focus.
(Understand)
UNIT – II
PART – A (2 Marks)
PART – B
PART – C
1. Discuss the role and focus of any four professional organizations providing
information security. (Create)
UNIT – III
PART – A (2 Marks)
1. In risk management strategies why does a periodic review have to be a part of process?
(May/June 2012 May/June 2013) (Remember)
2. What is asset valuation? List any 2 components of asset valuation. (May/June 2022)
(Remember)
A method of assessing the worth of a company, real property, security, antique or
other item of worth. Asset valuation is commonly performed prior to the sale of an asset or
prior to purchasing insurance for an asset.
Questions to assist in developing the criteria to be used for asset valuation:
Which information asset is the most critical to the success of the organization?
Which information asset generates the most revenue?
PART – B
1. Explain in detail the process of asset identification for different categories. (Understand)
PART – C
1. Discuss briefly data classification and management. (Create)
2. Explain the risk control cycle process. (Understand)
UNIT – IV
PART – A (2 Marks)
3. What is the difference between the management, technical and operational control?
When would each be applied as a part of a security framework? (Understand)
Managerial controls cover security processes that are designed by strategic planners
and implemented by the security administration of the organization.
PART – B
PART – C
Network-based IDS
Host-based IDS
Application-based IDS
Signature-based IDS
Statistical Anomaly-Based IDS
8. What are firewalls? (Remember)
A firewall is any device that prevents a specific type of information from moving
between the un-trusted network outside and the trusted network inside. The firewall may be:
a separate computer system
a service running on an existing router or server
a separate network containing a number of supporting devices
c. Packet filtering
d. Application gateways
e. Circuit gateways
f. MAC layer firewalls
g. Hybrids
13.What is Cryptanalysis? (Remember)
Cryptanalysis is the process of obtaining the original message (called plaintext) from
an encrypted message (called the cipher text) without knowing the algorithms and keys used
to perform the encryption.
14.What is Public Key Infrastructure (PKI)? (Remember)
Public Key Infrastructure is the entire set of hardware, software, and cryptosystems
necessary to implement public key encryption.
PKI systems are based on public-key cryptosystems and include digital certificates
and certificate authorities (CAs) and can:
• Issue digital certificates
• Issue crypto keys
PART – B
PART – C
1. Discuss the different types of Scanning and Analysis tools available. (Create)
2. What is Cryptography? Explain the key terms associated with cryptography.
(Understand)