0% found this document useful (0 votes)
6 views12 pages

Data Security 2 Marks

The document outlines key concepts in information security, including definitions and descriptions of security, email spoofing, risk management, and the software development life cycle (SDLC). It also covers various types of threats, access controls, policies, and disaster recovery plans, along with the differences between physical and logical design. Additionally, it discusses mechanisms of access control, types of firewalls, cryptography, and incident response strategies.

Uploaded by

portablegaming0
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
6 views12 pages

Data Security 2 Marks

The document outlines key concepts in information security, including definitions and descriptions of security, email spoofing, risk management, and the software development life cycle (SDLC). It also covers various types of threats, access controls, policies, and disaster recovery plans, along with the differences between physical and logical design. Additionally, it discusses mechanisms of access control, types of firewalls, cryptography, and incident response strategies.

Uploaded by

portablegaming0
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 12

Data Security 2 Marks

UNIT 1

Clarify Information Security

Describe Security

Describe E-mail Spoofing

List the components of information system

Paraphrase Network Security

Interpret SDLC

List the phases of SDLC Waterfall method

Explain Risk Management

Paraphrase Firewall

Articulate Security Blueprint

1. Clarify Information Security:


Information Security safeguards data from unauthorized access, misuse, or
breaches to ensure confidentiality, integrity, and availability.

2. Describe Security:
Security involves protecting systems, networks, and data from threats to prevent loss,
damage, or unauthorized access.

3. Describe E-mail Spoofing:


E-mail spoofing is when an attacker forges an email header to make it appear as if it came
from a trusted source, often used in phishing attacks.

4. List the components of information system:


• Hardware

• Software

• Data

• People

• Processes

• Networks

5. Paraphrase Network Security:


Network security refers to the strategies and tools used to protect the integrity and
accessibility of computer networks and data.

6. Interpret SDLC:
The Software Development Life Cycle (SDLC) is a structured process for planning,
developing, testing, and deploying software systems.

7. List the phases of SDLC Waterfall method:

• Requirement Analysis

• System Design

• Implementation

• Testing

• Deployment

• Maintenance

8. Explain Risk Management:


Risk management identifies, assesses, and mitigates potential threats to minimize their
impact on information systems.
9. Paraphrase Firewall:
A firewall is a security system that controls incoming and outgoing network traffic based on
predetermined rules to block unauthorized access.

10. Articulate Security Blueprint:


A Security Blueprint is a detailed plan outlining an organization’s security policies,
procedures, and technologies to protect information assets.

UNIT 2

Describe about threat

Explain Hackers

Summarize Malicious code

List the types of virus

Interpret the meaning of intellectual propery

Describe Subject and Object

Explain why access matrix is not used

Illustrate the Types of Access Control

Summarize the goals of Confidentiality Policies

Identify the main entities in Clinical Information Systems security model

Describe about Threat:


A threat is any potential danger that can exploit a vulnerability to harm a system, network,
or data.

2. Explain Hackers:
Hackers are individuals who gain unauthorized access to computer systems, often to steal,
modify, or destroy data.
3. Summarize Malicious Code:
Malicious code refers to harmful software like viruses, worms, trojans, or spyware designed
to damage or disrupt systems.

4. List the types of virus:

• File Infector Virus

• Macro Virus

• Boot Sector Virus

• Polymorphic Virus

• Multipartite Virus

5. Interpret the meaning of Intellectual Property:


Intellectual Property refers to creations of the mind—like inventions, software, or designs—
protected by law to give creators exclusive rights.

6. Describe Subject and Object:


A subject is an active entity (like a user or process) that accesses data, while an object is a
passive entity (like files or databases) being accessed.

7. Explain why Access Matrix is not used:


The Access Matrix is not used in practice due to its large size and inefficiency in managing
permissions in large systems.

8. Illustrate the Types of Access Control:

• Discretionary Access Control (DAC)

• Mandatory Access Control (MAC)

• Role-Based Access Control (RBAC)


• Attribute-Based Access Control (ABAC)

9. Summarize the goals of Confidentiality Policies:


Confidentiality policies aim to restrict unauthorized access to sensitive information and
ensure data privacy and secrecy.

10. Identify the main entities in Clinical Information Systems security model:

• Patient

• Healthcare Provider

• System Administrator

• Medical Records/Data

• Access Control Mechanisms

UNIT – III

Interpret risk assessment

Write about Discretionary Controls(DAC)

Explain what is Likelihood

Illustrate Residual Risk

Explain what are Policies

Illustrate General Security Policy

Illustrate Program Security Policy

Illustrate Issue-Specific Policies

Describe The Disaster Recovery Plan(DRP)

Describe about Business Continuity Plan(BCP)


1. Interpret Risk Assessment:
Risk assessment is the process of identifying, evaluating, and prioritizing risks to an
organization’s assets to determine potential impacts.

2. Write about Discretionary Controls (DAC):


Discretionary Access Control allows data owners to decide who can access their resources
and what actions they can perform.

3. Explain what is Likelihood:


Likelihood refers to the probability of a threat exploiting a vulnerability and causing harm to
information systems.

4. Illustrate Residual Risk:


Residual risk is the remaining risk after security measures and controls have been applied
to reduce the initial risk.

5. Explain what are Policies:


Policies are formal rules or guidelines that dictate how an organization manages and
protects its information assets.

6. Illustrate General Security Policy:


A general security policy outlines the organization’s overall commitment to protecting data
and sets the foundation for specific policies.

7. Illustrate Program Security Policy:


Program security policy defines security requirements and standards for individual
programs or systems within an organization.

8. Illustrate Issue-Specific Policies:


Issue-specific policies address specific areas of concern such as internet usage, password
rules, or email security.
9. Describe The Disaster Recovery Plan (DRP):
A DRP is a documented strategy for recovering IT systems and data after a disaster to
resume normal business operations quickly.

10. Describe about Business Continuity Plan (BCP):


BCP is a plan that ensures critical business functions continue during and after a crisis or
disruption, minimizing downtime and losses.

UNIT – IV

Discover the difference between physical design and logical design

Paint the significant points in information security blueprint

Show the five criterias for a policy to be effective and thus legally enforcable

Illustrate using the diagram for spheres of security.

Sketch the different stages in the business impact analysis step.

Experiment about the defence in depth policy.

Illustrate the components of contigency planning

Write the drawbacks of iso 17799/bs 7799.

Show the fivetesting strategies of incident planning.

1. Discover the difference between physical design and logical design:

• Logical design focuses on abstract data structures and relationships (what the
system should do).

• Physical design deals with actual hardware, software, and network components
(how the system will be implemented).
2. Paint the significant points in Information Security Blueprint:

• Defines security framework and architecture

• Aligns with business goals

• Identifies threats and vulnerabilities

• Establishes policies and controls

• Includes training and awareness plans

3. Show the five criteria for a policy to be effective and thus legally enforceable:

• Distributed and accessible

• Read and understood

• Acknowledged by users

• Consistently enforced

• Up-to-date and reviewed regularly

5. Illustrate using the diagram for Spheres of Security:


User Layer
→ Workstation
→ Internal Network
→ LAN/Servers
→ Applications/Data
→ Policies and Controls
(Each layer protected by controls like firewalls, authentication, etc.)

6. Sketch the different stages in the Business Impact Analysis step:

• Identify critical functions

• Determine dependencies

• Assess impact of disruptions

• Estimate downtime tolerance


• Recommend recovery priorities

7. Experiment about the Defence in Depth policy:


Defence in Depth is a layered security strategy where multiple defensive mechanisms (e.g.,
firewall, antivirus, access control) protect systems, so if one fails, others still provide
protection.

8. Illustrate the components of Contingency Planning:

• Business Impact Analysis (BIA)

• Incident Response Plan (IRP)

• Disaster Recovery Plan (DRP)

• Business Continuity Plan (BCP)

• Testing and Training

9. Write the drawbacks of ISO 17799 / BS 7799:

• High implementation cost

• Too generic and lacks specificity

• Requires customization for industries

• Complex for small organizations

• Doesn’t cover legal compliance in detail

10. Show the five testing strategies of incident planning:

• Checklist Testing

• Structured Walk-Through

• Simulation Testing

• Parallel Testing

• Full-Interruption Testing
4. Demonstrate the five testing strategies of incident planning :

1. Checklist Testing – A review of the incident response plan by comparing it against a


checklist to ensure all components are present.

2. Structured Walkthrough (Tabletop Test) – Team members verbally walk through


the steps of the plan to identify gaps or improvements.

3. Simulation Testing – A simulated incident is created to test how well the team
responds in real-time without affecting operations.

4. Parallel Testing – Backup systems are tested in parallel with live systems to ensure
they can take over if needed.

5. Full-Interruption Testing – The normal operations are shut down to test full
recovery procedures. It's risky and used cautiously.

UNIT – V

Illustrate the mechanisms that access control relies on.

Differentiate signature-based IDPS and behaviour-based IDPS.

Outline hybrid firewall.

Outline the five generations of Firewalls.

Analyse the primary disadvantage of application-level firewalls.

Illustrate cryptography

Differentiate Honey pots and Honey Nets

Compare Cryptography and Steganography

Categorize IDPS detection methods.

Devise the controls of protecting the secure facility.


1. Illustrate the mechanisms that Access Control relies on:
Access control relies on the following mechanisms:

• Identification – Recognizing a user

• Authentication – Verifying identity (e.g., password, biometrics)

• Authorization – Granting access rights

• Accountability – Tracking user actions (audit logs)

2. Differentiate Signature-Based IDPS and Behaviour-Based IDPS:

• Signature-Based IDPS detects known threats using predefined patterns.

• Behaviour-Based IDPS identifies abnormal activities by analyzing system behavior.

3. Outline Hybrid Firewall:


A hybrid firewall combines packet filtering, stateful inspection, and application-layer
filtering to provide stronger, more flexible network protection.

4. Outline the Five Generations of Firewalls:

1. Packet Filtering Firewalls

2. Stateful Inspection Firewalls

3. Application-Level Gateways (Proxies)

4. Dynamic Packet Filtering Firewalls

5. Kernel Proxy Firewalls / Next-Gen Firewalls

5. Analyse the Primary Disadvantage of Application-Level Firewalls:


They introduce latency and require more resources because they inspect data at the
application layer, making them slower and harder to configure.
6. Illustrate Cryptography:
Cryptography is the process of converting readable data into an unreadable form using
encryption to ensure confidentiality, integrity, and authentication.

7. Differentiate Honey Pots and Honey Nets:

• A Honeypot is a single system set up to attract attackers.

• A Honeynet is a network of honeypots that simulates a full environment.

8. Compare Cryptography and Steganography:

• Cryptography hides the content of the message.

• Steganography hides the existence of the message.

9. Categorize IDPS Detection Methods:

• Signature-Based Detection

• Anomaly/Behaviour-Based Detection

• Stateful Protocol Analysis

• Hybrid Detection (combines multiple methods)

10. Devise the Controls of Protecting the Secure Facility:

• Physical Barriers (e.g., fences, locks)

• Surveillance Systems (CCTV)

• Security Guards

• Biometric/Access Controls

• Environmental Controls (fire suppression, HVAC)

You might also like