This document contains 30 questions covering a wide range of topics related to information assurance and security. It asks about differentiating between information security and computer security, defining information assurance, describing the challenges of information assurance, encryption techniques like symmetric and asymmetric encryption, cryptanalysis, intrusion detection, attacks like denial of service attacks and passive/active attacks, human-computer interaction, evidence rules, confidentiality integrity and availability, risk assessment, external and insider attacks, white hat and black hat hackers, cost-benefit analysis, security policies and guidelines, developing information assurance policies, incident detection, forensic duplication, disaster recovery, the security lifecycle, security attacks, security mechanisms, public key cryptography, intrusion detection, mandatory access control, developing,
This document contains 30 questions covering a wide range of topics related to information assurance and security. It asks about differentiating between information security and computer security, defining information assurance, describing the challenges of information assurance, encryption techniques like symmetric and asymmetric encryption, cryptanalysis, intrusion detection, attacks like denial of service attacks and passive/active attacks, human-computer interaction, evidence rules, confidentiality integrity and availability, risk assessment, external and insider attacks, white hat and black hat hackers, cost-benefit analysis, security policies and guidelines, developing information assurance policies, incident detection, forensic duplication, disaster recovery, the security lifecycle, security attacks, security mechanisms, public key cryptography, intrusion detection, mandatory access control, developing,
Copyright:
Attribution Non-Commercial (BY-NC)
Available Formats
Download as DOC, PDF, TXT or read online from Scribd
This document contains 30 questions covering a wide range of topics related to information assurance and security. It asks about differentiating between information security and computer security, defining information assurance, describing the challenges of information assurance, encryption techniques like symmetric and asymmetric encryption, cryptanalysis, intrusion detection, attacks like denial of service attacks and passive/active attacks, human-computer interaction, evidence rules, confidentiality integrity and availability, risk assessment, external and insider attacks, white hat and black hat hackers, cost-benefit analysis, security policies and guidelines, developing information assurance policies, incident detection, forensic duplication, disaster recovery, the security lifecycle, security attacks, security mechanisms, public key cryptography, intrusion detection, mandatory access control, developing,
Copyright:
Attribution Non-Commercial (BY-NC)
Available Formats
Download as DOC, PDF, TXT or read online from Scribd
1.Differentiate Information security and computer security
2. How does IA differ from information security? 3.Write down the standard definition for information assurance 4. What are the three dimensional challenges of Information Assurance? 5.Define Stenography 6.Compare conventional and public key encryption 7. What is brute force attack? 8.Write short notes on hash functions. 9.What is symmetric encryption? 10. What is asymmetric encryption? 11. Comment on cryptanalysis. 12. List down the three classes of intruders 13. What is rule based intrusion detection? 14. What is DOS attack? 15. Comment on Passive attacks. 16. Comment on Active attacks. 17. Compare Active and passive attacks. 18. Define HCI. 19. Write short notes on Evidence Rule. 20. What is CIA? 21. What is Risk assessment? 22. What are External attacks? 23. What are insider attacks? 24. Comment on White hat. 25. Compare white hat and black hat. 26. What is cost-benefit analysis? 27. Differentiate Policies and guidelines. 28. What are the various aspects of developing the IA policies? 29. How can an incident be detected? 30. What is forensic duplication? 16 marks 1. Explain briefly about Disaster Recovery 2. Explain the security life cycle in detail 3. What are security attacks , Explain briefly 4. Write brief notes on security mechanisms 5. Draw and explain the public key cryptography mechanism 6. Write in detail about the Intrusion Detection 7. Explain MAC briefly. 8. Explain the mechanics of i) Developing ii) Communicating iii) Enforcing IA policies 9. Explain the Incident Response methodology. 10. Explain in detail about Threat analysis model.