INFORMATION SECURITY
Part-A
(20x2=40)
1. What are the Multilayer of the security?
2. Email spoofing?
3. What do you understands by the term methodology ?
4. Explain the Risk Management?
5. Software privacy?
6. What is called Elite Hacker?
7. Clarify Brute force attack?
8. Indicate the necessary of deterrence?
9. What you mean by liability?
10. State dumpster driving?
11. List out three categories of control ?
12. Def transference?
13. what is Policy?
14. Give details about Evidence?
15. What is Firewall?
16. State Alert message?
17. What do you meant by Proxy-server?
18. Define Socks?
19. Specify a padded cell?
20. Define Mantrap?
Part-B
(12x5=60)
21.a) List out the Components of an Information System? 6
b) Briefly discuss Security System Development life cycle? 6
22. List out the different Attacks caused in the security . Explain any 12?
23. Write short note on Codes of Ethics and professional organizations?
24.a) What is Risk Assessment ? Exp steps? 6
b) Approaches of Risk control strategies? 6
25.a) Write short notes on ISO 17799/BS7799? 4
b) How do you design security Architecture ? 8
26. In what we can Categorize Firewall by Processing mode.Discuss/
27. Indicate the Technologies associated with Access Control ?
28. Illustrate the various Cryptography Tools?
KEYWORDS:2009 ANNA UNIVERSITY CHENNAI M.C.A COMPUTER APLICATIONS INFORMATION SECURITY QUESTION PAPER,ANNA UNIVERSITY QUESTION PAPER,ANNA UNIVERSITY,ANNA UNIVERSITY CHENNAI,ANNA UNIVERSITY COIMBATORE,ANNA UNIVERSITY TRICHY,ANNA UNIVERSITY TIRUNELVELI,ANNA UNIVERSITY MADURAI,ANNA UNIVERSITY SYLLABUS,ANNA-UNIVERSITY RESULTS,ANNA UNIVERSITY DISTANCE EDUCATION,ANNA UNIVERSITY MBA-CENTRE FOR DISTANCE EDUCATION,ANNA UNIVERSITY SCHEDULE OF EXAMINATIONS,ANNA UNIVERSITY ADMISSION,ANNA UNIVERSITY COURSES,ANNA UNIVERSITY ACADEMIC,ANNA UNIVERSITY DEPARTMENTS,ANNA UNIVERSITY RESEARCH,ANNA UNIVERSITY MAIL,ANNA UNIVERSITY QUESTION PAPERS,ANNA UNIVERSITY COUNSELLING DATES,ANNA UNIVERSITY RE-EVALUATION RESULTS
Part-A
(20x2=40)
1. What are the Multilayer of the security?
2. Email spoofing?
3. What do you understands by the term methodology ?
4. Explain the Risk Management?
5. Software privacy?
6. What is called Elite Hacker?
7. Clarify Brute force attack?
8. Indicate the necessary of deterrence?
9. What you mean by liability?
10. State dumpster driving?
11. List out three categories of control ?
12. Def transference?
13. what is Policy?
14. Give details about Evidence?
15. What is Firewall?
16. State Alert message?
17. What do you meant by Proxy-server?
18. Define Socks?
19. Specify a padded cell?
20. Define Mantrap?
Part-B
(12x5=60)
21.a) List out the Components of an Information System? 6
b) Briefly discuss Security System Development life cycle? 6
22. List out the different Attacks caused in the security . Explain any 12?
23. Write short note on Codes of Ethics and professional organizations?
24.a) What is Risk Assessment ? Exp steps? 6
b) Approaches of Risk control strategies? 6
25.a) Write short notes on ISO 17799/BS7799? 4
b) How do you design security Architecture ? 8
26. In what we can Categorize Firewall by Processing mode.Discuss/
27. Indicate the Technologies associated with Access Control ?
28. Illustrate the various Cryptography Tools?
KEYWORDS:2009 ANNA UNIVERSITY CHENNAI M.C.A COMPUTER APLICATIONS INFORMATION SECURITY QUESTION PAPER,ANNA UNIVERSITY QUESTION PAPER,ANNA UNIVERSITY,ANNA UNIVERSITY CHENNAI,ANNA UNIVERSITY COIMBATORE,ANNA UNIVERSITY TRICHY,ANNA UNIVERSITY TIRUNELVELI,ANNA UNIVERSITY MADURAI,ANNA UNIVERSITY SYLLABUS,ANNA-UNIVERSITY RESULTS,ANNA UNIVERSITY DISTANCE EDUCATION,ANNA UNIVERSITY MBA-CENTRE FOR DISTANCE EDUCATION,ANNA UNIVERSITY SCHEDULE OF EXAMINATIONS,ANNA UNIVERSITY ADMISSION,ANNA UNIVERSITY COURSES,ANNA UNIVERSITY ACADEMIC,ANNA UNIVERSITY DEPARTMENTS,ANNA UNIVERSITY RESEARCH,ANNA UNIVERSITY MAIL,ANNA UNIVERSITY QUESTION PAPERS,ANNA UNIVERSITY COUNSELLING DATES,ANNA UNIVERSITY RE-EVALUATION RESULTS