Saturday 14 January 2012

network security(4)


4. Security Policy Design

January-2004 [10]

1.
b)         Explain what is challenge response system?                                                                [4]
3.
c)         What are the essential components of a corporate security policy?                                [6]

 

July-2004 [7]

1.
c)         A Data entry firm experiences on an average a loss of 10 files of 1000 bytes each per day due to power failures. The loss probability is 0.9. The cost of keying in a character is Rs. 0.005. At what cost burden the firm should consider putting in a loss prevention mechanism?                                                                                                               [4]
2.
b)         What is the basic purpose of a security model for computer systems?                           [3]

 

January-2005 [0]


July-2005 [0]


January-2006 [10]

1.
d)         State four primary functions of CERT.                                                                          [4]
7.         Write short notes on any three:
            iii)         Risk Assessment (RA)                                                                                   [6]

July-2006 [10]

1.
g)         What are main services provided by Computer security incident response teams?           [4]
5.
b)         What are the procedures involved in Quantitative Risk Assessment? How is the Annualized Loss Expectancy (ALE) calculated?                                                                [6]

January-2007 [12]

1.
b)         Why is the Domain Security policy required? How is it different from local security policy?                                                                                                                                               [4]
3.
b)         How does User Based Security Model provide integrity protection with or without delay detection and privacy protection?                                                                                 [8]

 

July-2007 [21]

3.
c)         When management chooses to mitigate a risk in the design and implementation of security policy, what is the different security controls used?                                  [6]
4.
a)         How does User Based Security Model provide integrity protection with or without delay detection and privacy protection?                                                                                 [6]
b)         What are the procedures involved in Quantitative Risk Management? How is the Annualized Loss Expectancy (ALE) calculated?                                                                [6]
7.
b)         What is audit trail with respect to information or communication security?                       [3]

January-2008 [10]

1.
g)         Explain a method to secure the windows registry?                                                        [4]
6.
a)         What are the possible sources of threats in an enterprise network? Also identify the various types of threats and its targets in enterprise network?                                     [6]

July-2008 [22]

1.
f)          What do you understand by audit trail with respect to information security?        [4]

5.
a)         When management chooses to mitigate a risk in the design and implementation of security policy, what are the different security controls used?  [6]
b)         What are the procedures involved in Quantitative Risk Management? How is the
Annualized Loss Expectancy (ALE) calculated?               [6]

6.
c)         How does User Based Security Model provide integrity protection with or without delay detection and privacy protection?                        [6]



January-2009 [6]
7.         Write short notes on any three of the following:
e)         CERT                            [6]

July-2009 [0]


January-2010 [9]

6.
b)         What is the Annualized Loss Expectancy (ALE)? How can it be directly useful in cost benefit analysis?       [9]

July-2010 [9]
5.
a)         What is Annualized Loss Expectancy (ALE)? How can it be directly useful in cost benefit analysis?             [9]


No comments:

Post a Comment