0% found this document useful (0 votes)
54 views1 page

IT2042 / Information Security

This document outlines topics related to information security concepts and system development. Part A discusses what information security is, approaches to security implementation (top-down and bottom-up), the CIA triangle components of confidentiality, integrity and availability and what they are used for, layers of security in an organization, measures to protect confidentiality, and characteristics of information. Part A also asks about when a computer can be the subject and object of an attack. Part B instructs the reader to explain the system development life cycle process, SSDLC, components of information systems, and the NSTISSC security model in detail.

Uploaded by

prisci_durai
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
54 views1 page

IT2042 / Information Security

This document outlines topics related to information security concepts and system development. Part A discusses what information security is, approaches to security implementation (top-down and bottom-up), the CIA triangle components of confidentiality, integrity and availability and what they are used for, layers of security in an organization, measures to protect confidentiality, and characteristics of information. Part A also asks about when a computer can be the subject and object of an attack. Part B instructs the reader to explain the system development life cycle process, SSDLC, components of information systems, and the NSTISSC security model in detail.

Uploaded by

prisci_durai
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 1

IT2042 / Information Security

UNIT I
Part A
1. What is information security?
2. What is meant by top-down approach to security implementation? Give its advantages.
3. What is meant by bottom-up approach to security implementation? Give its
disadvantages.
4. What are the three components of C.I.A. triangle? What are they used for?
5. Name the multiple layers of security in a successful organization.
6. Give the measures that can be taken to protect confidentiality of information.
7. What are the critical characteristics of information?
8. When can a computer be a subject and an object of an attack respectively?

Part B
1. Explain in detail about system development life cycle process
2. Explain in detail about SSDLC
3. Explain in detail about components of information system.
4. Discuss in detail NSTISSC security model

You might also like