INFORMATION SECURITY (CS) TWO MARK QUESTIONS AND .. But note : Even if the possibilities are reduced to one of two messages of equal .. SECURITY TME: am – am SUB CODE: CS CLASS / SEM: ME / I . NE Networking And Information Security Notes. Click Below Links to CP Advanced Operating System Notes. CLICK BELOW LINK. SE Object Oriented Software Engineering NOTES CLICK BELOW LINK TO DOWNLOAD CS NETWORK SECURITY NOTES.

Author: Mashura Tygobei
Country: Burkina Faso
Language: English (Spanish)
Genre: Photos
Published (Last): 22 May 2013
Pages: 474
PDF File Size: 10.71 Mb
ePub File Size: 4.99 Mb
ISBN: 433-2-18826-746-7
Downloads: 80458
Price: Free* [*Free Regsitration Required]
Uploader: Fenrirr

What is intellectual propery? It is the risk that remains to the information asset even after the xecurity control has been applied. A computer virus is a program that inserts itself into one or more files and then performs some possibly null action.

Posted by Unknown at A strong mixing function is a function of two or more inputs that produces an output each bit of. Differentiate between Trojan horse and propagating Trojan horse. In the security industry, these systems are also known as decoys, lures, or flytraps.

They feed their new understanding or new hypothesis back into step 2 and iterate until the test is concluded. What is Risk Management?

Methodology is a formal approach to solve a problem based on a structured sequence of procedures. Who is a cyberactivist?


PGCSEMATERIALS: SE Object Oriented Software Engineering

What is information security policy? What are the characteristics of Information Security? Lipner’s Integrity Matrix Model. What is risk assessment? However, the information can be viewed at several levels. Mention the benefits of risk management. What are the ways to categorize the controls? S n ; end ; where each of the S i inforjation is a statement.

SVCE | Department of Computer Science and Engineering

Consumer control of medical information. Which community of interest usually takes the lead in Information security risk management? Stop attempts to exploit vulnerability by implementing a security principle, such as authentication or confidentiality 1.

What are script kiddies?

Write short notes on a mutual agreement. Explaion about the locks and keys technique. Short note on cryptographic checksum function. What is meant by top-down approach to security implementation? Computer systems that are not under attack exhibit several characteristics. State the roles involved in Risk management. Differentiate between threats and fs9224.

The message is then sent back to the server each time the browser requests a page from the server. What are the functions of Information Security? To get full information or details of enterprise resource planning please have a look on the pages http: It is the process of attracting attention to a system by placing tantalizing bits of information in key locations.


A confidentiality policy is a security policy dealing only with confidentiality. It is the process of collecting, analyzing and preserving computer related evidence.

A noisy covert channel is a covert channel that uses a resource available to subjects other than the sender and receiver, as well as to the sender and receiver. How do worms differ from viruses?


It is used when human safety is not a factor. What are the attack replication vectors? The results of the analysis may lead to changes in the data being recorded, to detection of some event or problem, or both. What are the measures to protect the confidentiality of information? TEMPEST is a technology that prevents the loss of data that may result from the emissions of electromagnetic radiation. A commercial security policy is a security policy developed primarily to provide integrity.

What is Network Security? A covert timing channel uses a temporal or ordering relationship among accesses to a shared resource. Prolonged increase in power voltage levels