Department
of Computer Engineering. [U.G.]
Subject
:- Information and Cyber Security [410251 ]
Semester:-
8
Subject
I/c:- Mr. Ranjit Gawande.
Model
Ans. Paper for Information and Cyber Security 2015 Pat.
Module
-1, Security Basics, Credit – 1
Syllabus
:-
Introduction, Elements of Information Security, Security Policy,
Techniques, Steps, Categories, Operational Model of Network Security,
Basic Terminologies in Network Security. Threats and Vulnerability,
Difference between Security and Privacy.
Reference
Book :- [1] Bernard
Menezes, “Network Security and Cryptography”, Cengage Learning
India, 2014, [2]
Nina
Godbole, Sunit Belapure, “Cyber Security”, Wiley India
Model Question-Based on Module -1
Sub Topic Covered:- Introduction, Elements of Information Security, Security Policy, Techniques, Steps, Categories,
- What are the security approaches used to implement security policy?
- How information security attacks are classified? Give Example for each
- Explain OSI or X.800 security architecture in detail.
- What are the eight security mechanisms to implement security?
- What are the various security services?
- What are the different categories of security services defined by X.800? Discuss each in detail.
- Explain the operational Model of Network Security in details
- What is cryptanalysis? Explain various cryptanalysis technique
- List the differences between Security and Privacy?
Explain
Mono-alphabetic and Poly-alphabetic ciphers with appropriate
examples.
To get the revised answer of this question Click to download the revised answer
Matoshri College of Engineering & R. C. Nashik
Department of Computer Engineering.
MCQ Bank