University Of Pune Question Paper
M. C. M. (Semester - IV) Examination - 2010
INFORMATION SECURITY
(New 2008 Pattern)
Time : 3 Hours] [Max. Marks : 70
Instructions :
(1) Q. No. 6 is compulsory.
(2) Solve any one case from Q. No. 1.
(3) Solve any three questions from Q. Nos. 2 to 5.
(4) State your assumptions clearly.
Q.1) You are a Security Consultant of World Bank, a large International
Bank. The bank has purchased an old warehouse, internally it has a
secure facility. The location and its purpose is known only to a small
number of people who are employees of the bank. These persons have
signed a secrecy agreement in relation to the operations and locations
of the warehouse. As a part of your review of physical controls, you
examine adequacy of controls to prevent and detect fire. You notice
that there are no hand-held fire extinguishers kept at strategic locations
through out the room. After questioning Operations Manager, you find
that it is clear that they are familiar with the procedures and they are
practised regularly.
What is your conclusion about the adequacy of controls described
by the Operations Manager ? How will you proceed in terms of
investigation of the fire pevention and detection controls of the
warehouse ?
OR
Q.1) As more users are added in an interactive system, response time gets
longer. The Project Manager is perplexed that system can cope up
with many more users without noticeable response time. He cannot
determine whether the problem occurred is of hardware or software
based. He asks you to assist him to identify problem. During your
meeting with the Project Manager, you ask him to provide configuration
of hardware and software for the interactive system.
Identify system events that might be measured to determine, whether
the response time problems are software based or hardware based.
Explain type of measure you would undertake to trace, activate, duration
and so on. (State your assumptions, if any)
Q.2) Discuss basics of Information Security and its evolution.
Q.3) What are the threats in Infrastructure Security ?
Q.4) Discuss in brief the building block diagram of Information Security.
Q.5) Discuss SSE-CMM Model in detail.
Q.6) Write short notes : (Any Four)
(a) Firewall
(b) Security of E-mail System
(c) COBIT
(d) Role of Internet and www
(e) VPN
M. C. M. (Semester - IV) Examination - 2010
INFORMATION SECURITY
(New 2008 Pattern)
Time : 3 Hours] [Max. Marks : 70
Instructions :
(1) Q. No. 6 is compulsory.
(2) Solve any one case from Q. No. 1.
(3) Solve any three questions from Q. Nos. 2 to 5.
(4) State your assumptions clearly.
Q.1) You are a Security Consultant of World Bank, a large International
Bank. The bank has purchased an old warehouse, internally it has a
secure facility. The location and its purpose is known only to a small
number of people who are employees of the bank. These persons have
signed a secrecy agreement in relation to the operations and locations
of the warehouse. As a part of your review of physical controls, you
examine adequacy of controls to prevent and detect fire. You notice
that there are no hand-held fire extinguishers kept at strategic locations
through out the room. After questioning Operations Manager, you find
that it is clear that they are familiar with the procedures and they are
practised regularly.
What is your conclusion about the adequacy of controls described
by the Operations Manager ? How will you proceed in terms of
investigation of the fire pevention and detection controls of the
warehouse ?
OR
Q.1) As more users are added in an interactive system, response time gets
longer. The Project Manager is perplexed that system can cope up
with many more users without noticeable response time. He cannot
determine whether the problem occurred is of hardware or software
based. He asks you to assist him to identify problem. During your
meeting with the Project Manager, you ask him to provide configuration
of hardware and software for the interactive system.
Identify system events that might be measured to determine, whether
the response time problems are software based or hardware based.
Explain type of measure you would undertake to trace, activate, duration
and so on. (State your assumptions, if any)
Q.2) Discuss basics of Information Security and its evolution.
Q.3) What are the threats in Infrastructure Security ?
Q.4) Discuss in brief the building block diagram of Information Security.
Q.5) Discuss SSE-CMM Model in detail.
Q.6) Write short notes : (Any Four)
(a) Firewall
(b) Security of E-mail System
(c) COBIT
(d) Role of Internet and www
(e) VPN
0 comments:
Pen down your valuable important comments below