Model
Question Paper -
First Semester
CYBER LAW AND
LEGISLATION
(Regular – 2021 Admissions)
Time : Three Hours Maximum : 100 marks
Answer all questions.
- a) Explain Computer Security mandates and
legislation.
b) Write note on international security activity
OR
- a) What are the needs for Cyber
Security? Explain threats
to security.
b) Give a note on Information Protection and Access Controls.
- a) Explain assurance
and documentation requirements.
b) Write note on Government network evaluations policies.
OR
- a) Discuss the requirement of security policies
b) Briefly explain the following trusted computer system evaluation criteria
a. Orange book
b. Red book
5. a) Describe the Corporate
policies in detail
b) Write note on process management
OR
6. Describe the following
a. Asset classification policy
b. Planning and preparation policies
7. a) Explain Organizational and Human Security.
b) Discuss the Role of information
security professionals.
OR
This is an amazing set of questions. For individuals, small business, or enterprises, it is essential to learn about cyber security in order to prevent potential threats. As a cyber forensic investigator India, glad to come across this. Thanks for sharing, great blog.
ReplyDeleteI am impressed. I don't think Ive met anyone who knows as much about this subject as you do. You are truly well informed and very intelligent. You wrote something that people could understand and made the subject intriguing for everyone. Really, great blog you have got here. Security Awareness Training
ReplyDeleteThanks for sharing nice information with us. i like your post and all you share with us is uptodate and quite informative, i would like to bookmark the page so i can come here again to read you, as you have done a wonderful job.cybersecurity
ReplyDeleteThanks for this usefull article, waiting for this article like this again.360 Cyber
ReplyDeleteThe demand of information security and Ethical hacking professionals is higher. Learning it with a reputed institute and a certified program like Ethical Hacking training in Chennai could provide several opportunities. Thank you for sharing this question set.
ReplyDeleteIn conclusion, cybersecurity has come a long way since the publicized hacking cases of the 1990's (Krebs, 2003). These cases brought awareness to the need for the best and brightest to enter the field of computer and network security Honeypot Security
ReplyDelete