Data Security 2 Marks
Data Security 2 Marks
UNIT 1
Describe Security
Interpret SDLC
Paraphrase Firewall
2. Describe Security:
Security involves protecting systems, networks, and data from threats to prevent loss,
damage, or unauthorized access.
• Software
• Data
• People
• Processes
• Networks
6. Interpret SDLC:
The Software Development Life Cycle (SDLC) is a structured process for planning,
developing, testing, and deploying software systems.
• Requirement Analysis
• System Design
• Implementation
• Testing
• Deployment
• Maintenance
UNIT 2
Explain Hackers
2. Explain Hackers:
Hackers are individuals who gain unauthorized access to computer systems, often to steal,
modify, or destroy data.
3. Summarize Malicious Code:
Malicious code refers to harmful software like viruses, worms, trojans, or spyware designed
to damage or disrupt systems.
• Macro Virus
• Polymorphic Virus
• Multipartite Virus
10. Identify the main entities in Clinical Information Systems security model:
• Patient
• Healthcare Provider
• System Administrator
• Medical Records/Data
UNIT – III
UNIT – IV
Show the five criterias for a policy to be effective and thus legally enforcable
• Logical design focuses on abstract data structures and relationships (what the
system should do).
• Physical design deals with actual hardware, software, and network components
(how the system will be implemented).
2. Paint the significant points in Information Security Blueprint:
3. Show the five criteria for a policy to be effective and thus legally enforceable:
• Acknowledged by users
• Consistently enforced
• Determine dependencies
• Checklist Testing
• Structured Walk-Through
• Simulation Testing
• Parallel Testing
• Full-Interruption Testing
4. Demonstrate the five testing strategies of incident planning :
3. Simulation Testing – A simulated incident is created to test how well the team
responds in real-time without affecting operations.
4. Parallel Testing – Backup systems are tested in parallel with live systems to ensure
they can take over if needed.
5. Full-Interruption Testing – The normal operations are shut down to test full
recovery procedures. It's risky and used cautiously.
UNIT – V
Illustrate cryptography
• Signature-Based Detection
• Anomaly/Behaviour-Based Detection
• Security Guards
• Biometric/Access Controls