THEORY EXAMINATION (SEM–VI) 2016-17 INFORMATION SECURITY AND CYBER LAWS

B.Tech Cyber Security 0 downloads
₹29.00

INFORMATION SECURITY AND CYBER LAWS (EIT505)


SECTION – A

(Attempt All | 10 × 2 = 20 Marks)


(a) Need of Digital Signature

A digital signature is used to ensure authentication, integrity, and non-repudiation of electronic documents. It confirms that the message is sent by a genuine sender and has not been altered.


(b) Difference Between Worm and Virus

A virus requires a host file and spreads by user action, whereas a worm is a self-replicating program that spreads automatically over networks without human intervention.

 

(c) Trojan Horse

A Trojan horse is a malicious program disguised as legitimate software. It does not replicate itself but creates backdoors or steals sensitive information.

 

(d) Need of Information Security

Information security protects data from unauthorized access, misuse, disclosure, modification, or destruction, ensuring confidentiality, integrity, and availability.

 

(e) Database Security

Database security refers to protecting databases from unauthorized access, data breaches, and cyber-attacks using access control, encryption, and auditing techniques.

 

(f) Importance of Cyber Security

Cyber security protects systems, networks, and data from cyber threats, financial loss, identity theft, and ensures trust in digital systems.

 

(g) Encryption

Encryption is the process of converting plaintext into ciphertext using an algorithm and key to protect data from unauthorized access.

 

(h) Why Information Security Is Needed

Information security is needed to protect sensitive data, maintain privacy, prevent data loss, and ensure business continuity.

 

(i) Security Issues in Hardware

Hardware security issues include physical theft, tampering, hardware Trojans, side-channel attacks, and lack of proper access control.

 

(j) Symmetric vs Asymmetric Key Algorithms

Symmetric key algorithms use the same key for encryption and decryption, while asymmetric key algorithms use public and private key pairs.


SECTION – B

(Attempt Any Five | 5 × 10 = 50 Marks)

 

(a) Firewall and Its Types

A firewall is a security system that monitors and controls incoming and outgoing network traffic based on predefined rules.

Types of Firewalls:                                   Packet Filtering Firewall

Stateful Inspection Firewall                        Application-Level Gateway

Circuit-Level Gateway                                Next-Generation Firewall

Firewalls protect networks from unauthorized access and attacks.

 

(b) CCTV and Its Applications

Closed-Circuit Television (CCTV) is used for surveillance and monitoring.

 

Applications:                                            Security monitoring

Crime prevention                                       Traffic control

Workplace safety                                        Public area surveillance

 

(c) Application Development Security

Application development security involves integrating security practices throughout the software development life cycle (SDLC).
It includes secure coding, input validation, authentication, authorization, testing, and vulnerability assessment to prevent attacks like SQL injection and XSS.

 

(d) Information Security Governance and Risk Management

Information security governance defines policies, roles, and responsibilities for protecting information assets.
Risk management involves identifying threats, assessing risks, implementing controls, and continuous monitoring to reduce security risks.

 

(e) Ethical and Legal Issues in Software Piracy

Software piracy involves unauthorized copying or distribution of software.
Ethical issues include violation of intellectual property rights, while legal issues include penalties, fines, and imprisonment under copyright laws.

 

(f) Steps in Developing an Information System

Steps include:                                                 Requirement analysis

System design                                                Development

Testing                                                            Implementation

Maintenance

Security considerations must be included at every stage.

 

(g) Security Architecture and Design

Security architecture defines the structure of security controls such as firewalls, IDS, authentication mechanisms, and encryption systems.
A layered approach ensures defense-in-depth and minimizes security risks.

 

(h) Physical Security and Its Basic Tenets

Physical security protects hardware, buildings, and people.

 

Basic Tenets:                                                Access control

Surveillance                                                   Environmental controls

Alarm systems                                               Physical barriers


SECTION – C

(Attempt Any Two | 2 × 15 = 30 Marks)

 

3) Security Threats to E-Commerce

E-commerce systems face threats such as:    Phishing

Identity theft                                                   Credit card fraud

Malware attacks                                              Denial of Service (DoS)

Man-in-the-middle attacks

 

Types of Threats:                                           Technical threats

Financial threats                                               Privacy threats

Legal threats

Security measures include encryption, digital signatures, SSL, firewalls, and secure payment gateways.

 

4) Provisions of IT Act, 2000

Key Provisions:

Legal recognition of electronic records and digital signatures          Regulation of Certifying Authorities

Cyber crimes and penalties                                                                Data protection and privacy

Adjudication and appellate tribunals

 

Advantages:                                                                          Promotes e-commerce

Provides legal framework for cyber activities                         Enhances trust in digital transactions

 

Limitations:

Limited coverage of emerging cyber crimes                          Jurisdictional issues

Need for regular updates

 

5) Short Notes

(i) WWW Policy

Defines acceptable use, access control, and security guidelines for web resources.

 

(ii) E-mail Security Policy

Specifies rules for email usage, spam control, encryption, and protection against phishing.

 

(iii) Information Security Process

Includes risk assessment, implementation of controls, monitoring, and continuous improvement.

 

(iv) Patent Law

Protects inventions and grants exclusive rights to inventors for a fixed period.

 

(v) Copyright Law

Protects original literary, artistic, and software works from unauthorized use or copying

File Size
50.25 KB
Uploader
SuGanta International
⭐ Elite Educators Network

Meet Our Exceptional Teachers

Discover passionate educators who inspire, motivate, and transform learning experiences with their expertise and dedication

KISHAN KUMAR DUBEY

KISHAN KUMAR DUBEY

Sant Ravidas Nagar Bhadohi, Uttar Pradesh , Babusarai Market , 221314
5 Years
Years
₹10000+
Monthly
₹201-300
Per Hour

This is Kishan Kumar Dubey. I have done my schooling from CBSE, graduation from CSJMU, post graduati...

Swethavyas bakka

Swethavyas bakka

Hyderabad, Telangana , 500044
10 Years
Years
₹10000+
Monthly
₹501-600
Per Hour

I have 10+ years of experience in teaching maths physics and chemistry for 10th 11th 12th and interm...

Vijaya Lakshmi

Vijaya Lakshmi

Hyderabad, Telangana , New Nallakunta , 500044
30+ Years
Years
₹9001-10000
Monthly
₹501-600
Per Hour

I am an experienced teacher ,worked with many reputed institutions Mount Carmel Convent , Chandrapu...

Shifna sherin F

Shifna sherin F

Gudalur, Tamilnadu , Gudalur , 643212
5 Years
Years
₹6001-7000
Monthly
₹401-500
Per Hour

Hi, I’m Shifna Sherin! I believe that every student has the potential to excel in Math with the righ...

Divyank Gautam

Divyank Gautam

Pune, Maharashtra , Kothrud , 411052
3 Years
Years
Not Specified
Monthly
Not Specified
Per Hour

An IIT graduate having 8 years of experience teaching Maths. Passionate to understand student proble...

Explore Tutors In Your Location

Discover expert tutors in popular areas across India

Coding for Kids Near Sector 108 Gurugram (Dwarka Expressway) – Build Future-Ready Skills Early Sector 108, Gurugram
Yoga Classes Near By Lajpat Nagar Build Strength, Reduce Stress & Achieve Holistic Wellness in 2026 Lajpat Nagar, Delhi
German Language Classes Near Sector 118 Noida – Learn German with Expert Trainers Noida
Spoken English Classes Near Sector 107 Gurugram (Dwarka Expressway) – Speak Fluently, Communicate Confidently Sector 107, Gurugram
Yoga Classes Near Sector 138 Greater Noida – Improve Health, Mind & Lifestyle Through Professional Yoga Training Noida
Dance Classes (Bollywood, Hip-Hop, Classical) Near Sector 129 Greater Noida – Learn, Express, and Stay Fit Through Dance Noida
Spoken English Classes Near Rajouri Garden Improve Fluency, Build Confidence & Unlock Career Opportunities in 2026 Rajouri Garden, Delhi
Accounts & Commerce Classes Near Sector 99 Dwarka Expressway, Gurugram – Build Strong Financial & Business Foundations Sector 99A, Gurugram
Spoken English Classes Near By Vasant Kunj Improve Fluency, Build Confidence & Achieve Career Growth in 2026 Vasant Kunj, Delhi
Diet & Nutrition Consultation Near Vatika City, Gurugram – Your Path to Healthy Living Vatika City, Gurugram
Yoga Classes Near Saket Transform Your Mind, Body & Lifestyle with Professional Yoga Training in 2026 Saket, Delhi
Meditation Coaching Near Sohna Road – Discover Peace, Focus, and Mental Balance Sohna Road, Gurugram
Fashion Designing Course Near Sector 81 Gurugram – Turn Your Creativity into a Successful Career Sector 81, Gurugram
Zumba Classes Near Malviya Nagar – Dance Your Way to Fitness & Confidence Malviya Nagar, Delhi
Drum Lessons (Electronic Drums Preferred at Home) Near DLF Phase 4 Gurugram DLF Phase IV, Gurugram
Dance Classes (Bollywood, Hip-Hop, Classical) Near Palam Vihar Extension – Learn Dance with Professional Trainers New Palam Vihar, Gurugram
Music Production (Laptop-Based) Near DLF Cyber City – Learn Professional Music Creation DLF Cyber City, Gurugram
Spoken English Classes Near Sector 117 Noida – Improve Fluency, Confidence and Communication Skills Noida
Yoga Classes Near Sector 136 Greater Noida – Improve Your Health, Flexibility and Mental Wellness Noida
Voice-over Training Near Sushant Lok Phase 2 – Build a Powerful & Professional Voice Career Gurugram
⭐ Premium Institute Network

Discover Elite Educational Institutes

Connect with top-tier educational institutions offering world-class learning experiences, expert faculty, and innovative teaching methodologies

Réussi Academy of languages

sugandha mishra

Réussi Academy of languages
Madhya pradesh, Indore, G...

Details

Coaching Center
Private
Est. 2021-Present

Sugandha Mishra is the Founder Director of Réussi Academy of Languages, a premie...

IGS Institute

Pranav Shivhare

IGS Institute
Uttar Pradesh, Noida, Sec...

Details

Coaching Center
Private
Est. 2011-2020

Institute For Government Services

Krishna home tutor

Krishna Home tutor

Krishna home tutor
New Delhi, New Delhi, 110...

Details

School
Private
Est. 2001-2010

Krishna home tutor provide tutors for all subjects & classes since 2001

Edustunt Tuition Centre

Lakhwinder Singh

Edustunt Tuition Centre
Punjab, Hoshiarpur, 14453...

Details

Coaching Center
Private
Est. 2021-Present
Great success tuition & tutor

Ginni Sahdev

Great success tuition & tutor
Delhi, Delhi, Raja park,...

Details

Coaching Center
Private
Est. 2011-2020