The document outlines various concepts related to cybersecurity, including user authentication, access control principles, and the C.I.A triangle. It discusses types of malware, the fingerprint authentication mechanism, and security threats like dumpster diving and social engineering. Additionally, it compares different access control methods, encryption techniques, and highlights the importance of risk management and security policies.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0 ratings0% found this document useful (0 votes)
1 views2 pages
QBFiltered
The document outlines various concepts related to cybersecurity, including user authentication, access control principles, and the C.I.A triangle. It discusses types of malware, the fingerprint authentication mechanism, and security threats like dumpster diving and social engineering. Additionally, it compares different access control methods, encryption techniques, and highlights the importance of risk management and security policies.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2
1. What is user authentication?
2. What is access control ? List principles of access control.
3. Explain the characteristics of C.I.A triangle. 4. Describe types of malwares and their impact on security. 5. Illustrate with neat diagram the finger print mechanism for the authentication of user. 6. Explain Dumpster Diving with respect to the security leaks related to it. 7. Compare Role based access control with attribute based access control (Minimum 4 points each). 8. Describe symmetric key encryption with neat diagram. 9. Explain the process of steganography. 10. List out the types of virus. 11. Compare active attack with passive attack (Minimum 4 points each). 12. Define the term: i) Risk identification ii) Risk control 13. State the principles of access control. 14. Differentiate between Authorization & Authentication (Minimum 4 points each). 15. Define cryptography. 16. Draw the block diagram of process of encryption & decryption. 17. Explain social engineering 18. Describe Trojan Horse. 19. Describe security policies, standard and guidelines. 20. Give relation between threat, vulnerability and risk. 21. Compare Intruders and Insiders. 22. What are the different ways of Spoofing? 23. Explain Access rights and permission in detail 24. Describe classification of biometric characteristics 25. What is cryptanalysis and cryptology? 26. Define plain text and cipher text. 27. Explain Asymmetric key cryptography. 28. Explain Advantages, disadvantages and application of steganography. 29. Explain any four password policies. 30. Explain role of biometric in security.