Cyber Security Question Paper MCA 2025 AKTU{Solved}

Syllabus

UnitTopic
IIntroduction – Introduction to Information Systems, Types of Information Systems, Development of Information Systems, Introduction to Information Security and CIA triad, Need for Information Security, Threats to Information Systems, Information Assurance and Security Risk Analysis, Cyber Security.
IIApplication Security – (Database, E-mail and Internet), Data Security Considerations (Backups, Archival Storage and Disposal of Data), Security Technology (Firewall, VPNs, Intrusion Detection System), Access Control. Security Threats – Viruses, Worms, Trojan Horse, Bombs, Trapdoors, Spoofs, E-mail Viruses, Macro Viruses, Malicious Software, Network and Denial of Services Attack.
IIIIntroduction to E-Commerce – Threats to E-Commerce, Electronic Payment System, e-Cash, Credit/Debit Cards. Digital Signature, Cryptography, Developing Secure Information Systems, Application Development Security, Information Security Governance & Risk Management, Security Architecture & Design, Security Issues in Hardware, Data Storage & Downloadable Devices, Physical Security of IT Assets – Access Control, CCTV, Backup Security Measures.
IVSecurity Policies – Why policies should be developed, Policy Review Process, Publication and Notification Requirement of policies, Types of policies – WWW policies, Email Security policies, Corporate Policies, Sample Security Policies. Case Study – Corporate Security
VInformation Security Standards – ISO, IT Act, Copyright Act, IPR. Cyber Crimes, Cyber Laws in India; IT Act 2000 Provisions, Intellectual Property Law, Copyright Law, Semiconductor Law and Patent Law, Software Piracy and Software License.

SECTION A

1. Attempt all questions in brief.

Q no.QuestionCOLevel
a.What is mean by Information System1K1
b.What is CIA1K2
c.What is an Information?1K1
d.Define Access Control2K2
e.What is mean by Intellectual Property5K2
f.What is need of having Application Security3K3
g.What are the features of Ecommerce System3K3

SECTION B

2. Attempt any three of the following:

Q no.QuestionCOLevel
a.Describe on Threats to Information Systems1K3
b.Explain in detail on Cyber security1K4
c.Why is it necessary to develop Policies3K4
d.What are the threats in E-Payment System4K3
e.Explain in detail on Firewall? How it provides Security to Hardware and Software2K4

SECTION C

3. Attempt any one part of the following:

Q no.QuestionCOLevel
a.What is a Risk? What are the ways in which the Risk can be Evaluated2K2
b.Explain in detail on VPN and its types2K3

4. Attempt any one part of the following:

Q no.QuestionCOLevel
a.Explain various security standards5K4
b.Why we need cyber laws in India? Define any 2 laws that you feel is necessary5K4

5. Attempt any one part of the following:

Q no.QuestionCOLevel
a.What is the need for having information security? Explain the levels1K3
b.Explain Cryptography in Detail.3K3

6. Attempt any one part of the following:

Q no.QuestionCOLevel
a.Explain General Information system in Detail1K4
b.Write in detail on Software Piracy and Software Licens5K3

7. Attempt any one part of the following:

Q no.QuestionCOLevel
a.What are the various security threats in Applications2K4
b.Write in detail on symmetric and asymmetric key algorithm3K4

Leave a Comment