Define following:-
[7 marks]Social Engineering
[ marks]Hactivism
[ marks]Authorization
[ marks]Difference between hackers and crackers
[ marks]Script Kiddies
[ marks]Masquerade
[ marks]vulnerabilities
[ marks]What do you mean by Hackers? Explain Methodology of Hackers.
[7 marks]Explain Bell-La Padula Confidentiality Model in detail.
[7 marks]What is Information Security? Explain Security Goals in detail.
[7 marks]Write a short note on: Attacks and Vulnerabilities.
[7 marks]Explain Security Threats in details.
[7 marks]Explain SQL Injection in detail.
[7 marks]Explain Military Security Policy. Explain Chinese Wall Security Policy.
[7 marks]Write a short note on: Database Security.
[7 marks]Explain Characteristics of a Good Security Policy.
[7 marks](i) Explain Man-in-the-Middle Attack. (ii) Explain Session Hijacking with example.
[3 marks]Explain Seven issues of Security Planning.
[7 marks]Explain: Session Hijacking and Packet Sniffing.
[7 marks]Explain Web site defacement.
[7 marks](i) Explain Trusted System (ii) Difference between active v/s passive attacks
[3 marks]Compare Copyright, Patent and Trade Secret Protection.
[7 marks]Explain Content of Security Plan.
[7 marks]