Professional Documents
Culture Documents
Part – B: (5 X 6 = 30 Marks)
Answer either (a) or (b) Each question carry equal marks
21a What is the Specialized area of Security and explain the information security components?
(or)
21b What is Information Security? Explain the various Components of Information Security.
25a Identify the security methods that implemented in Honey Pots, Honey Nets and Padded Cell System.
(or)
25b Distinguish the various Security Goals, Security Services with neat diagram.
Part – C: (5 X 10 = 50 Marks)
Answer either (a) or (b) Each question carry equal marks
26a What is SDLC? Explain in detail about the SDLC with a neat diagram.
(or)
26b Explain in detail about the Security SDLC.
27a What are the categories of threat? Briefly explain any five categories with examples.
(or)
27b Explain the various laws and Ethics followed in Information Security.
28a Define Risk Management. Identify the components of risk management and explain each component in
(or) detail.
28b Apply briefly about risk control strategies and how to select, evaluate and maintain the strategies in
detail.
29a Distinguish the various components used in designing of Security Architecture.
(or)
29b Construct the major steps in Developing the contingency planning in detail.
30a Categorize briefly about various components of Intrusion Detection systems used in the Security
(or) Systems.
30b Define Cryptography? Analyze and discuss the different authentication Models used in Cryptography.