Cyber Security 2017- MCA 2nd year AKTU
Printed Pages: 02 Sub Code: RCA305
Paper ID: | 1 | 4 | 1 | 4 | Roll No:___________ |
M.C.A.
(SEM III) THEORY EXAMINATION 2017-18
CYBER SECURITY
Time: 3 hours Max Marks: 100
Note: Attempt all Sections. Assume any missing data.
SECTION A
1. Attempt all questions in brief. 2 x 7 = 14
a. What are security threats?
b. Explain Security structure.
c. What do you mean by copyright Act?
d. Discuss about Information system.
e. Explain Development of Information system.
f. Describe IPR.
g. What do you mean by Disposal of Data?
SECTION B
2. Attempt any three of the following. 7 x 3 =21
a. What do you mean by Cryptography? Explain Asymmetric key Cryptography.
b. Discuss about VPNs.
c. Explain Digital signature. Also define DSS.
d. What is the WWW polices explain these.
e. Describe Backup security measures.
SECTION C
3. Attempt any one part of the following: 7 x 1 = 7
(a) How you can say that Intrusion Detection in the backbone of IS? Justify along with its categories.
(b) Explain the information system resource and activities and what may be the reason of failure to it.
4. Attempt any one part of the following: 7 x 1 = 7
(a) What is the application security? Define it in the case of vendor challenges and user challenges for application security.
(b) What do you mean by cyber-crime and cyber-security reference by information security?
5. Attempt any one part of the following: 7 x 1 = 7
(a) What is electronics payment system? Also define e-Cash.
(b) Explain Semiconductor Law and Patent Law with the help of example.
6. Attempt any one part of the following: 7 x 1 = 7
(a) What are the different technologies used for the security of data and application?
(b) Explain Access control. What is including is authorization process for – File Program. And explain all type of control.
7. Attempt any one part of the following: 7 x 1 = 7
(a) What do you mean by Confidentiality and authentication concept in cryptography?
(b) Short note on: (i) ISO and (ii) IT Act.