(SEM V) THEORY EXAMINATION 2019-20 CYBER SECURITY
CYBER SECURITY (RUC-501 / RUC-501A)
B.Tech (SEM-V) – AKTU
SECTION A
(Attempt all questions – 2 × 7 = 14 marks)
Q1 (a) What do you mean by access control to information resources?
Access control refers to the process of restricting access to information resources so that only authorized users can view, modify, or use them. It ensures that sensitive data is protected from unauthorized access by using authentication and authorization mechanisms such as passwords, biometrics, and access control lists.
Q1 (b) Explain the concept of EDI.
EDI (Electronic Data Interchange) is the electronic exchange of business documents such as invoices, purchase orders, and shipping notices between organizations in a standardized format. It improves speed, accuracy, and efficiency in business transactions by reducing paperwork.
Q1 (c) What is meant by security attack? How are they classified?
A security attack is any attempt to compromise the confidentiality, integrity, or availability of information. Security attacks are classified into passive attacks, which involve monitoring data without altering it, and active attacks, which involve modification or disruption of data or services.
Q1 (d) Describe security risk analysis.
Security risk analysis is the process of identifying threats, vulnerabilities, and potential impacts on information systems. It helps organizations assess risks and decide appropriate security controls to minimize losses.
Q1 (e) How can we use firewall to make our application secure?
A firewall protects applications by monitoring and controlling incoming and outgoing network traffic based on predefined security rules. It blocks unauthorized access, prevents malicious traffic, and ensures secure communication between networks.
Q1 (f) What is e-mail spamming / e-mail bombing?
E-mail spamming refers to sending large volumes of unwanted emails to users.
E-mail bombing is an attack where huge numbers of emails are sent to a single address to overload and disrupt the recipient’s mailbox or server.
Q1 (g) What are the techniques involved in intrusion detection?
Intrusion detection techniques include signature-based detection, which identifies known attack patterns, and anomaly-based detection, which detects unusual system behavior that may indicate an attack.
SECTION B
(Attempt any three – 7 × 3 = 21 marks)
Q2 (a) Explain legal issues in data mining security.
Legal issues in data mining security include privacy violations, unauthorized data usage, lack of user consent, and misuse of personal information. Organizations must follow data protection laws and ethical guidelines to ensure lawful data handling.
Q2 (b) Discuss different issues and challenges in cyber crime.
Cyber crime faces challenges such as anonymity of attackers, lack of international cooperation, rapid technological changes, insufficient cyber laws, and difficulty in collecting digital evidence. These challenges make investigation and prevention complex.
Q2 (d) What is digital signature? What are the requirements and services provided by digital signature?
A digital signature is an electronic method used to verify the authenticity and integrity of digital messages or documents.
Requirements include authentication, integrity, and non-repudiation.
Digital signatures provide services such as message authentication, data integrity, and legal validity.
SECTION C
(Attempt any one – 7 × 1 = 7 marks)
Q3 (a) What is Computer Forensics Technology?
Computer Forensics Technology involves the collection, analysis, and preservation of digital evidence from computers and networks. It is used to investigate cyber crimes, recover deleted data, and support legal proceedings. The process includes identification, acquisition, analysis, and reporting of digital evidence while maintaining its integrity.
Related Notes
BASIC ELECTRICAL ENGINEERING
ENGINEERING PHYSICS THEORY EXAMINATION 2024-25
(SEM I) ENGINEERING CHEMISTRY THEORY EXAMINATION...
THEORY EXAMINATION 2024-25 ENGINEERING MATHEMATICS...
(SEM I) THEORY EXAMINATION 2024-25 ENGINEERING CHE...
(SEM I) THEORY EXAMINATION 2024-25 ENVIRONMENT AND...
Need more notes?
Return to the notes store to keep exploring curated study material.
Back to Notes StoreLatest Blog Posts
Best Home Tutors for Class 12 Science in Dwarka, Delhi
Top Universities in Chennai for Postgraduate Courses with Complete Guide
Best Home Tuition for Competitive Exams in Dwarka, Delhi
Best Online Tutors for Maths in Noida 2026
Best Coaching Centers for UPSC in Rajender Place, Delhi 2026
How to Apply for NEET in Gurugram, Haryana for 2026
Admission Process for BTech at NIT Warangal 2026
Best Home Tutors for JEE in Maharashtra 2026
Meet Our Exceptional Teachers
Discover passionate educators who inspire, motivate, and transform learning experiences with their expertise and dedication
Explore Tutors In Your Location
Discover expert tutors in popular areas across India
Discover Elite Educational Institutes
Connect with top-tier educational institutions offering world-class learning experiences, expert faculty, and innovative teaching methodologies