Forgot Password?
Mobile number is now mandatory for the security of your account.
We've sent you a verification code on your mobile number. Please enter it here to set a new password.
We've sent you a verification code on your mobile number or email address. Please enter it here to set a new password.
(a) Explain Distributed Information System & it's importance.
(b) Explain the types of attacks and classification of threat in detail.
How biometric system help in securing the information? What are the various criteria's for biometric selection and also explain, how the design issues in biometric systems can be handled taking a case study of any biometric system you have used?
What is EDI and list the benefits which EDI offers to a business organization? Explain the various components of EDI. How electronic payment system is more beneficial in comparison to traditional payment system?
What is VPN? List the various protocols of VPN? Also explain in detail,the working of VPN for exchanging information between two private networks with the help of a diagram.
Compare and contrast between IDS (Intrusion Detection System) and IPS (Intrusion Prevention System). What are the various intrusion detection methodologies? Also explain any three types of threats.
Distinguish between Symmetric and Asymmetric key cryptography. Which type of cryptography is more secure and why? Explain the Diffie- Hellman Key Exchange algorithm for symmetric key cryptography.
Attempt the following question briefly:
(a) What is the difference between threat, vulnerability and risk?
(b) Describe the major security challenges in laptop and mobile devices.
(c) What are the various ethical issue framework in information security?
(d) What is VPN and major security concerns in VPN?
(e) Explain the following attacks: Pharming, packet-spoofing, and zombie attack.
(f) What is media forensics? How ethical hacking different from cracking?
(g) Justify with a real time example how authentication can be achieved in banking sector.
Write a short note on :
(a) Business Transaction on Web.
(b) Legal challenges framework for Information Security.
Congratulations! Your trial of
is now active.
Let's catch up on a Zoom call and I'll help you craft a killer career plan! Bring your own coffee.
Sourabh Bajaj