ICT Ed. 475: Network and Information Security | BICTE | Sixth Semester | Bicte Note | Bicte Blog

     Syllabus     Questions


Unit 1 Introduction


Unit 2 Policies



Unit 3 Cryptography


Unit 4 Security and Protection


                      

Unit 5 Threats, Assessment and Solutions


 


Important Questions:

  1. Define computer security and explain its basic components.
  2. Describe the different types of threats to computer security.
  3. Explain the concept of security policies and their types.
  4. Discuss confidentiality, integrity, and availability policies with examples.
  5. Explain the Bell-LaPadula model of confidentiality policies.
  6. Describe the Biba model of integrity policies.
  7. Define denial of service (DoS) attacks and explain the goals of availability policies.
  8. Explain the differences between symmetric and asymmetric cryptosystems.
  9. Discuss the principles of public key cryptography and its uses.
  10. Describe the process and importance of key management in cryptography.
  11. Explain the different types of cryptographic checksums and their uses.
  12. Discuss the role and implementation of digital signatures.
  13. Describe the principles of hashing and its applications in security.
  14. Explain the concept of authentication and the different methods used.
  15. Discuss the challenges and solutions in password selection and management.
  16. Explain the principles of biometric authentication and its advantages.
  17. Describe the network security infrastructure and the role of firewalls.
  18. Discuss the different types of malware and their impacts on system security.
  19. Explain the process and importance of vulnerability analysis in network security.
  20. Describe the principles of intrusion detection and the organization of intrusion detection systems.

21.  Explain the role of policy and mechanism in computer security.

22.  Discuss the assumptions and trust in security models.

23.  Explain the concept of assurance in security.

24.  Describe the operational and human issues in computer security.

25.  Explain the role of trust in the implementation of security policies.

26.  Discuss the Bell-LaPadula model and its significance in confidentiality policies.

27.  Describe the goals and models of denial of service attacks.

28.  Explain the differences between stream ciphers and block ciphers.

29.  Discuss the concept of authenticated encryption and its importance.

30.  Explain the basics of password authentication and common challenges.

31.  Discuss the different methods of attacking passwords and their prevention.

32.  Describe the concept of password aging and its significance.

33.  Explain the principles of multifactor authentication and its benefits.

34.  Discuss the principles and challenges of network infrastructure analysis.

35.  Explain the processes of encryption and decryption in network security.

36.  Describe the different types of firewalls and their applications.

37.  Discuss the security challenges and solutions in wired and wireless networks.

38.  Explain the concept of virtual private networks (VPNs) and their importance.

39.  Discuss the principles and practices of email security.

40.  Explain the challenges and solutions in web and database security.


No comments:

Post a Comment