Вы находитесь на странице: 1из 8

KIET GROUP OF INSTITUTIONS

DEPARTMENT OF INFORMATION TECHNOLOGY


CYBER SECURITY (RUC-501)

UNIT I
Assignment I

Q1. What is Information System?

Q2. What are the threats to IS?

Q3. What is Information Assurance and how it is provided?

Q4. Define the role of security in Internet and Web Services.


KIET GROUP OF INSTITUTIONS

DEPARTMENT OF INFORMATION TECHNOLOGY


CYBER SECURITY (RUC-501)

UNIT I
Assignment II

Q1. How do you classify information Systems in general? Explain


in detail.

Q2. Describe security risk analysis.

Q3. Write the difference between Information Security and


Information Assurance .

Q4. Write the difference between cyber security and information


security.
KIET GROUP OF INSTITUTIONS

DEPARTMENT OF INFORMATION TECHNOLOGY


CYBER SECURITY (RUC-501)

UNIT II
Assignment I

Q1. What do you understand by security of Data?

Q2. What are the different reason for loss of data ?

Q3. What are the considerations for data security in regards with
data backup, archival and disposal?

Q4. Discuss various types of firewalls. How can we use firewalls to


secure our applications?
KIET GROUP OF INSTITUTIONS

DEPARTMENT OF INFORMATION TECHNOLOGY


CYBER SECURITY (RUC-501)

UNIT II
Assignment II

Q1. What are security threats? Discuss the security threats to E-


commerce .

Q2. What is Digital Signature and how can we use it?

Q3. What are different types of VPN ?Elaborate.

Q4. What is encryption and decryption?

Q5. What is E-payment scheme?


KIET GROUP OF INSTITUTIONS

DEPARTMENT OF INFORMATION TECHNOLOGY


CYBER SECURITY (RUC-501)

UNIT III
Assignment I

Q1. What are the steps involved in building secure information


system?

Q2. What are the security activities involved in each phase of


SDLC?

Q3. What are the steps involved in Risk Management process?


KIET GROUP OF INSTITUTIONS

DEPARTMENT OF INFORMATION TECHNOLOGY


CYBER SECURITY (RUC-501)

UNIT III
Assignment II

Q1 What are the security issues related to hardware, data storage


and downloadable devices? Discuss.

Q2.What are the different physical security systems to protect IT


Assets?

Q3. What are the concepts included in the common framework for
developing secure applications?
KIET GROUP OF INSTITUTIONS

DEPARTMENT OF INFORMATION TECHNOLOGY


CYBER SECURITY (RUC-501)

UNIT IV
Assignment I

Q1. What are the ISO standards for developing the enterprise level
security standards and effective management practices?

Q2. What are the rights given to a person or an organisation for its
intellectual activity, i.e creations of mind?

Q3. Describe Intellectual property Issues(IPR)


KIET GROUP OF INSTITUTIONS

DEPARTMENT OF INFORMATION TECHNOLOGY


CYBER SECURITY (RUC-501)

UNIT V
Assignment I

Q1 What do you understand by Copyright act and Patent Law.

Q2.Explain briefly the IT Act 2000 and the coverage in each


chapter.

Q3. Which policy helps in avoiding the risk of browsing the internet
accessing sites containing offensive material?

Вам также может понравиться