You are on page 1of 2

BHARATH INSTITUTE OF HIGHER EDUCATION AND RESEARCH

Declared as Deemed to be University under section 3 of UGC act 1956


173, Agaram Main Road, Selaiyur, Chennai – 600 073,Tamil Nadu

End Semester Examinations – Nov / Dec-2021


Regulation – 2018
Programme(s) Year Semester Course Code(s) Course Title
B.Tech - Computer Science & III V U18PECS012 Network Information Security
Engineering
Time: Three Hours Max Marks: 80

Part – B: (5 X 6 = 30 Marks)
Answer either (a) or (b) Each question carry equal marks

21a What is the Specialized area of Security and explain the information security components?
(or)
21b What is Information Security? Explain the various Components of Information Security.

22a Summarize the business needs for information security?


(or)
22b Illustrate the Key terms used in Information Security Terminology.
23a Define Risk Control. Identify the various control process with suitable examples.
(or)
23b Apply the cost benefit analysis (CBA) to the organization and explain how to protect and valuate the
assets.
24a Compare the different types of information security policies.
(or)
24b Classify any three NIST documents in NIST security model.

25a Identify the security methods that implemented in Honey Pots, Honey Nets and Padded Cell System.
(or)
25b Distinguish the various Security Goals, Security Services with neat diagram.

Part – C: (5 X 10 = 50 Marks)
Answer either (a) or (b) Each question carry equal marks
26a What is SDLC? Explain in detail about the SDLC with a neat diagram.
(or)
26b Explain in detail about the Security SDLC.

27a What are the categories of threat? Briefly explain any five categories with examples.
(or)
27b Explain the various laws and Ethics followed in Information Security.
28a Define Risk Management. Identify the components of risk management and explain each component in
(or) detail.
28b Apply briefly about risk control strategies and how to select, evaluate and maintain the strategies in
detail.
29a Distinguish the various components used in designing of Security Architecture.
(or)
29b Construct the major steps in Developing the contingency planning in detail.
30a Categorize briefly about various components of Intrusion Detection systems used in the Security
(or) Systems.

30b Define Cryptography? Analyze and discuss the different authentication Models used in Cryptography.

You might also like