Exam Details
Subject | Policy, Standards And Laws | |
Paper | ||
Exam / Course | PGDFSTYDM)/ P.G. DIPLOMA IN INFORMATION SECURITY (PGDIS) | |
Department | School of Vocational Education and Training (SOVET) | |
Organization | indira gandhi national open university | |
Position | ||
Exam Date | June, 2016 | |
City, State | new delhi, |
Question Paper
1. Write short notes (any four)
Cyber Appellate Tribunal
Digital rights management
Cryptanalysis
Ranking of web pages
Spamdexing
2. What do you understand by Cyber Squatting?
3. What is Internet protocol service? Explain its effectiveness and utilization in the Cyber Crime Investigations.
4. What do you mean by Cyber Crime? Discuss the nature and types of Cyber Crime.
5. What is meant by "data", "documents", "documentation", "logs" and "records" What are the differences between them
6. Write the classification of Patent Applications.
7. What do you understand by Digital Signature
8. Explain the stages for the development of the International Standards.
9. What are ISO 7799 and BS 7799 Explain their different sections and salient features.
10. Explain in detail the three types of Security Policies (EISP, ISSP and sysSP).
11. What IS Risk Management Why the identification of risks, by listing assets and vulnerabilities, is so important in the Risk Management Process
Cyber Appellate Tribunal
Digital rights management
Cryptanalysis
Ranking of web pages
Spamdexing
2. What do you understand by Cyber Squatting?
3. What is Internet protocol service? Explain its effectiveness and utilization in the Cyber Crime Investigations.
4. What do you mean by Cyber Crime? Discuss the nature and types of Cyber Crime.
5. What is meant by "data", "documents", "documentation", "logs" and "records" What are the differences between them
6. Write the classification of Patent Applications.
7. What do you understand by Digital Signature
8. Explain the stages for the development of the International Standards.
9. What are ISO 7799 and BS 7799 Explain their different sections and salient features.
10. Explain in detail the three types of Security Policies (EISP, ISSP and sysSP).
11. What IS Risk Management Why the identification of risks, by listing assets and vulnerabilities, is so important in the Risk Management Process
Other Question Papers
Departments
- Centre for Corporate Education, Training & Consultancy (CCETC)
- Centre for Corporate Education, Training & Consultancy (CCETC)
- National Centre for Disability Studies (NCDS)
- School of Agriculture (SOA)
- School of Computer and Information Sciences (SOCIS)
- School of Continuing Education (SOCE)
- School of Education (SOE)
- School of Engineering & Technology (SOET)
- School of Extension and Development Studies (SOEDS)
- School of Foreign Languages (SOFL)
- School of Gender Development Studies(SOGDS)
- School of Health Science (SOHS)
- School of Humanities (SOH)
- School of Interdisciplinary and Trans-Disciplinary Studies (SOITDS)
- School of Journalism and New Media Studies (SOJNMS)
- School of Law (SOL)
- School of Management Studies (SOMS)
- School of Performing Arts and Visual Arts (SOPVA)
- School of Performing Arts and Visual Arts(SOPVA)
- School of Sciences (SOS)
- School of Social Sciences (SOSS)
- School of Social Work (SOSW)
- School of Tourism & Hospitality Service Sectoral SOMS (SOTHSM)
- School of Tourism &Hospitality Service Sectoral SOMS (SOTHSSM)
- School of Translation Studies and Training (SOTST)
- School of Vocational Education and Training (SOVET)
- Staff Training & Research in Distance Education (STRIDE)
Subjects
- Application and business Security developments
- Bcp, dr planning and audit
- Cyber security
- Digital forensics
- Introduction to Information Security
- Network security
- Policy, Standards And Laws