dis
dis
dis
Unit 1 - 2 Marks
2. What is C.I.A?
6. What is Security?
Availability
Accuracy
Authenticity
Confidentiality
Integrity
Utility
Possession
Bottom Up Approach
Top-down Approach
• Using a methodology
• The same phases used in the traditional SDLC adapted to support the
specialized implementation of a security project
– The champion
– Security professionals
– Systems administrators
– End users
23. What are the three types of data ownwership and their
responsibilities?
• Data Owner - responsible for the security and use of a particular set
of information
• Data Users - the end systems users who work with the information to
perform their daily jobs supporting the mission of the organization
(For example All hackers in the world are a collective threat Kevin
Mitnick,who was convicted for hacking into phone systems was a
threat agent.)
The security blue print is the plan for the implementation of new
security measures in the organization. Some times called a
framework,the blue print presents an organized approach to the
security planning process.
16 Marks
8) Explain in detail the Legal, Ethical and Professional issues during the
security investigation
Unit 2 - 2 Marks
o Inexperience
o Improper training
o Incorrect assumptions
o Other circumstances
o trade secrets
o copyrights
o trademarks
o patents
o Expert hacker
Includes:
o macro virus
o boot virus
o worms
o Trojan horses
o logic bombs
o denial-of-service attacks
o polymorphic
o hoaxes
Can disrupt not only the lives of individuals, but also the storage,
transmission, and use of information
• Web Browsing
• Virus
• Unprotected Shares
• Mass Mail
• SNMP
• Hoaxes
• Back Doors
• Password Crack
• Brute Force
• Dictionary
• Denial of Service
• Distributed DoS
b. so many requests are made that the target system cannot handle
them successfully along with other, legitimate requests for service
30)Define Man-in-the-Middle
Unit 3 - 2 Marks
d. Confidentiality
e. Integrity
f. Availability
• Information Security
• Information Technology
• These assets are the targets of various threats and threat agents and
our goal is to protect them from these threats
• Position name/number/ID
• Supervisor
• Special skills
• Name
• IP address
• MAC address
• Element type
• Serial number
• Manufacturer name
• Physical location
• Logical location
• Controlling entity
7. What are Asset Information for Procedures?
• Description
• Intended purpose
• Classification
• Owner/creator/manager
• Online or offline
• Where located
• confidential data
• internal data
• public data
Threat Identification
• Each of the threats identified so far has the potential to attack any of
the assets protected
• This will quickly become more complex and overwhelm the ability to
plan
• To make this part of the process manageable, each step in the threat
identification and vulnerability identification process is managed
separately, and then coordinated at the end of the process
• Examine how each of the threats that are possible or likely could be
perpetrated and list the organization’s assets and their vulnerabilities
o Likelihood
o Uncertainty
• For each threat and its associated vulnerabilities that have any
residual risk, create a preliminary list of control ideas
• Residual risk is the risk that remains to the information asset even
after the existing control has been applied
22. What is access control?
• Nondiscretionary Controls
• Role-Based Controls
• Task-Based Controls
• Lattice-based Control
• The goal of this process has been to identify the information assets of
the organization that have specific vulnerabilities and create a list of
them, ranked for focus on those most needing protection first
• Avoidance
• Transference
• Mitigation
• Acceptance
The actions an organization can perhaps should take while the incident
is in progress are documented in what is known as Incident Response
Plan(IRP).
The BCP is the most strategic and long term of the three plans. It
encompasses the continuation of business activities if a catastrophic
event occurs,such as the loss of an entire database,building or entire
operations center. The BCP includes the planning the steps necessary
to to ensure the continuation of the organization when the scope or
scale of a disaster exceeds the ability of the DRP to restore operations.
a. Control Function
b. Architectural Layer
c. Strategy Layer
16 Marks
Unit 4 - 2 Marks
1. What is a policy?
• IT security policy
The ISSP:
ACLs regulate:
Objectives:
o Personnel Security
o Compliance
– Risk Management
– Personnel Security
– Physical Security
– Contingency Planning
– Data Integrity
– Documentation
– Audit Trails
o policies
o technology
Three approaches:
1. What are ISO 7799 and BS7799? Explain their different sections and
salient features.
6. Compare and contrast the ISO 17700 wit BS 7799 NIST security
model
i. Defense in depth
Unit 5 – 2 Marks
The final form of firewall is the kernel proxy, a specialized form that
works under the Windows NT Executive, which is the kernel of
Windows NT. It evaluates packets at multiple layers of the protocol
stack, by checking security in the kernel as data is passed up and
down the stack
1) Packet filtering
2) Application gateways
3) Circuit gateways
5) Hybrids
With two NICs all traffic must physically go through the firewall to
move between the internal and external networks
• The first general model consists of two filtering routers, with one or
more dual-homed bastion-host between them
• The second general model involves the connection from the outside
or untrusted network
o What features are included in the base price? What features are
available at extra cost? Are all cost factors known?
o Can the candidate firewall adapt to the growing network in the target
organization?
17) What are Sock Servers?
• When Web services are offered outside the firewall, deny HTTP traffic
from reaching your internal networks by using some form of proxy
access or DMZ architecture
b) Host-based IDS
c) Application-based IDS
d) Signature-based IDS
26.What is LFM?
A Padded Cell is a honey pot that has been protected so that it cannot
be easily compromised. In otherwords,a padded cell is a hardened
honey spot..
31.What are the advantages and disadvantages of using honey
pot or padded cell approach?
Advantages:
Disadvantages:
The legal implication of using such devices are not well defined.
Honey pots and Padded cells have not yet been shown to be
generally useful security technologies.
A network tool that collects copies of packets from the network and
analyzes them
35.What is Cryptography?.
36.What is Cryptoanalysis?
38.Define Decryption
o Authentication
o Integrity
o Privacy
o Authorization
o Nonrepudiation
o PEM uses 3DES symmetric key encryption and RSA for key
exchanges and digital signatures
Temperature extremes
Gases
Liquids
Living organisms
Projectiles
Movement
Energy anomalies
Guards
Mantraps
Electronic Monitoring
Computer Rooms
o Works with the CIO on strategic plans, develops tactical plans, and
works with security managers on operational plans
1. Explain in detail
6. What are fire wall rules? Explain different fire wall rule sets.
12. What are the purposes of Scanning and Analysis tools? Who will be
using these tools? Explain the functioning of few of these tools.