INFORMATION SECURITY (CS) TWO MARK QUESTIONS AND .. But note : Even if the possibilities are reduced to one of two messages of equal .. SECURITY TME: am – am SUB CODE: CS CLASS / SEM: ME / I . NE Networking And Information Security Notes. Click Below Links to CP Advanced Operating System Notes. CLICK BELOW LINK. SE Object Oriented Software Engineering NOTES CLICK BELOW LINK TO DOWNLOAD CS NETWORK SECURITY NOTES.

Author: Tegami Balkis
Country: Brazil
Language: English (Spanish)
Genre: Marketing
Published (Last): 4 September 2017
Pages: 106
PDF File Size: 6.94 Mb
ePub File Size: 3.65 Mb
ISBN: 870-1-99658-242-8
Downloads: 3650
Price: Free* [*Free Regsitration Required]
Uploader: Shazshura

SVCE | Department of Computer Science and Engineering

Access control affects the function of the server in two ways. If not, it fails. Newer Post Older Post Home. Detection of Covert Channels – Covert channels require sharing. What are the types of plans in Mitigation strategy? Differentiate Preventive and Detective controls. PKI — Public Key Infrastructure It is an integrated system of software, encryption methodologies, protocols, legal agreements and third party services that enables users to communicate securely.

Short note on Protection State. Explaion about the locks and keys technique.

Confidentiality is the concealment of information or resources. To get full information or details of enterprise resource planning please have a look on the pages http: What are the general categories of unethical and illegal behaviour? An integrity policy is a security policy dealing only with integrity.


Steganography is the process of hiding information, and while it is not properly a form of cryptography, it is related to cryptography in that both are ways of transmitting information without allowing it to be revealed in transit.

What are the types of contingency planning?

He similarly defined five categories: What are the characteristics of Information Security? A covert channel is a path of communication that was not designed to be used for communication. Sniffers are programs or device that can monitor data traveling over an network. How does sechrity reject rate differ from false accept rate? What is a Biological Database? In some cases, this is simply a notification to the system security officer that an attack is believed to be underway.

What is annual loss expectancy? What is security pipeline interface SPI?


Keystrokes – Keystroke dynamics requires a signature based informatio keystroke intervals, keystroke pressure, keystroke duration, and where the key is struck on the edge or in the middle. A commercial security policy is a security policy developed primarily to provide integrity.

What is Residual Risk? These are programs, which are designed to damage, destroy, or deny service to the target system Wednesday 16th of August Consumer control of medical information.

They are software programs that hide their true nature and reveal their designed behavior only when activated. At this level, the testers have an account on the system and can act as authorized users of the system.


The theme of identity runs throughout humanity’s experience, and computers are no exception. What is Clean desk policy? Write about the Key Exchange and key generation. Explain the categories of Threat in detail. Define the State and Cookies. An agent obtains information from a data source or set of data sources. What is risk management? What is an alert roster? What are access controls and explain their types?

Use of an SPI to check for corrupted files. The manner in which the resource is shared controls which subjects can send and receive information using that shared resource.

biological databases lecture notes

Brief the Compiler-Based Mechanisms. How do worms differ from viruses? What is a hot site? What is security blue print? What are the attack replication vectors? At this level, the testers know that the target system exists and have noyes information to identify it once they reach it.