Data and Information Security - CW3551 - Important Questions and Question Bank
Data and Information Security - CW3551 - Important Questions and Question Bank
4th Semester
2nd Semester
Deep Learning -
AD3501
Embedded Systems
Data and Information Human Values and
and IoT - CS3691
5th Semester
7th Semester
8th Semester
Open Elective-1
Distributed Computing Open Elective 2
- CS3551 Project Work /
Elective-3
Open Elective 3 Intership
Big Data Analytics - Elective-4
CCS334 Open Elective 4
Elective-5
Elective 1 Management Elective
Elective-6
Elective 2
All Computer Engg Subjects - [ B.E., M.E., ] (Click on Subjects to enter)
Programming in C Computer Networks Operating Systems
Programming and Data Programming and Data Problem Solving and Python
Structures I Structure II Programming
Database Management Systems Computer Architecture Analog and Digital
Communication
Design and Analysis of Microprocessors and Object Oriented Analysis
Algorithms Microcontrollers and Design
Software Engineering Discrete Mathematics Internet Programming
Theory of Computation Computer Graphics Distributed Systems
Mobile Computing Compiler Design Digital Signal Processing
Artificial Intelligence Software Testing Grid and Cloud Computing
Data Ware Housing and Data Cryptography and Resource Management
Mining Network Security Techniques
Service Oriented Architecture Embedded and Real Time Multi - Core Architectures
Systems and Programming
Probability and Queueing Theory Physics for Information Transforms and Partial
Science Differential Equations
Technical English Engineering Physics Engineering Chemistry
Engineering Graphics Total Quality Professional Ethics in
Management Engineering
Basic Electrical and Electronics Problem Solving and Environmental Science and
and Measurement Engineering Python Programming Engineering
lOMoARcPSD|45374298
www.BrainKart.com
UNIT I - INRODUCTION
TWO MARKS
https://play.google.com/store/apps/details?id=info.therithal.brainkart.annauniversitynotes
lOMoARcPSD|45374298
www.BrainKart.com
ii) Analyze the methodology important in the implementation of information security? How
does a methodology improve the process?
8) What are the six components of an information system? Which are most directly affected by
the study of computer security?
9) i)Illustrate the different types of instruction set architecture in detail.
ii)Examine the basic instruction types with examples
10) Describethe Security Systems Development Life Cycle.
11) i)Composetheroles of Information Security Project Team.
ii)Design the steps unique to the security systems development life cycle in all the phases of
SSDLC model.
12) Illustrate briefly about SDLC waterfall methodology and its relation in respect to information
security.
13) Evaluate the various components of Information Security that a successful organization must
have.
14) i)List the various components of an information system and tell about them.
ii)List the history of Information Security.
15) i).What is NSTISSC Security Model?
ii).Describein detail about the top down approach and the bottom up approach with the help
of a diagram.
https://play.google.com/store/apps/details?id=info.therithal.brainkart.annauniversitynotes
lOMoARcPSD|45374298
www.BrainKart.com
20) What is the difference between a denial-of-service attack and a distributed denial-of-service
attack? Which is more dangerous? Why?
BIG QUESTIONS
1) How has the perception of the hacker changed over recent years? Compose the profile of a
hacker today.
2) Evaluate which management groups are responsible for implementing information security to
protect the organization’s ability to function?
3) Summarize how does technological obsolescence constitute a threat to information security?
How can an organization protect against it?
4) Generalize how the intellectual property owned by an organization usually have value? If so,
how can attackers threaten that value?
5) Illustrate which management groups are responsible for implementing information security to
protect the organization’s ability to function.
6) Pointout why data the most important asset an organization possesses? What other assets in
the organization require protection?
7) Analyze whether information security a management problem? What can management do that
technology cannot?
8) How will you develop management groups that are responsible for implementing information
security to protect the organization’s ability to function ?
9) Illustrate the methods does a social engineering hacker use to gain information about a user’s
login id and password? How would this method differ if it were targeted towards an
administrator’s assistant versus a data-entry clerk?
10) i) Statethe types of password attacks.
ii)Tell the three ways in which an authorization can be handled.
11) i)List the Computer Security Hybrid Policies.
ii) Describe the types of Computer Security.
12) i)Explain Integrity Policies.
ii)Assessthe Secure Software Development.
https://play.google.com/store/apps/details?id=info.therithal.brainkart.annauniversitynotes
lOMoARcPSD|45374298
www.BrainKart.com
BIG QUESTIONS
1) Explain Elgamal Digital Encryption Scheme.
2) Explain NIST Digital Signature Algorithm.
3) Explain Elliptic curve Digital Signature Algorithm.
4) Explain Schnorr Digital Encryption Scheme.
5) Outline RSA-PSS Digital signature algorithm.
6) Outline the working of X.509 certificate along with its format.
7) Explain briefly about Kerberos.
8) Explain the categories of certificate extensions in X.509 certificates.
https://play.google.com/store/apps/details?id=info.therithal.brainkart.annauniversitynotes
lOMoARcPSD|45374298
www.BrainKart.com
ii) Explain the categories of web security threats that affects the integrity, authenticity,
confidentiality and availability and explain its consequences and countermeasures.
4) Explain the protocols for securing internet communication, email and web transactions.
6) You are developing a mobile application where users can chat securely with one another. The
application will send messages over the internet, and you want to ensure that these messages remain
private and unaltered during transit. Describe how you would apply Transport Level Security (TLS) in
your application to protect the messages. Discuss how the two layers of protocols in TLS architecture
would participate in establishing and maintaining this secure communication.
https://play.google.com/store/apps/details?id=info.therithal.brainkart.annauniversitynotes
Click on Subject/Paper under Semester to enter.
Professional English Discrete Mathematics Environmental Sciences
Professional English - - II - HS3252 - MA3354 and Sustainability -
I - HS3152 GE3451
Digital Principles and
Statistics and Probability and
Computer Organization
Matrices and Calculus Numerical Methods - Statistics - MA3391
- CS3351
- MA3151 MA3251
3rd Semester
1st Semester
4th Semester
2nd Semester
Deep Learning -
AD3501
Embedded Systems
Data and Information Human Values and
and IoT - CS3691
5th Semester
7th Semester
8th Semester
Open Elective-1
Distributed Computing Open Elective 2
- CS3551 Project Work /
Elective-3
Open Elective 3 Intership
Big Data Analytics - Elective-4
CCS334 Open Elective 4
Elective-5
Elective 1 Management Elective
Elective-6
Elective 2
All Computer Engg Subjects - [ B.E., M.E., ] (Click on Subjects to enter)
Programming in C Computer Networks Operating Systems
Programming and Data Programming and Data Problem Solving and Python
Structures I Structure II Programming
Database Management Systems Computer Architecture Analog and Digital
Communication
Design and Analysis of Microprocessors and Object Oriented Analysis
Algorithms Microcontrollers and Design
Software Engineering Discrete Mathematics Internet Programming
Theory of Computation Computer Graphics Distributed Systems
Mobile Computing Compiler Design Digital Signal Processing
Artificial Intelligence Software Testing Grid and Cloud Computing
Data Ware Housing and Data Cryptography and Resource Management
Mining Network Security Techniques
Service Oriented Architecture Embedded and Real Time Multi - Core Architectures
Systems and Programming
Probability and Queueing Theory Physics for Information Transforms and Partial
Science Differential Equations
Technical English Engineering Physics Engineering Chemistry
Engineering Graphics Total Quality Professional Ethics in
Management Engineering
Basic Electrical and Electronics Problem Solving and Environmental Science and
and Measurement Engineering Python Programming Engineering