MED ICT ICTED 526 Network Security 2080

Revision as of 03:36, 13 January 2025 by WikiSysop (talk | contribs)

Subjective

TRIBHUVAN UNIVERSITY

2080 (New Course)

Master/Education /2 Semester ICT.Ed.526 Network Security

Candidates are required to give answers in their own words practicable. The figures in the margin indicate full marks.

Attempt all questions

Group "B" 6X5 marks

1. How do information security manager protect an organization from security threats? Explain security design principle

2. How do you protect data from users? Define Kerberos with example.

3. Describe subject, object and access right for access control. Explain major component of access control.

Suppose you are an Information Security Officer at Tribhuvan University Information Technology Innovation Center (TUITIC). The TUITIC intends to introduce new IT Security Guidelines for data security. How do you prepare information security guidelines as an Information Security Officer?

OR

Why is it important to have Security Audits? Explain Security Auditing Trail.

5. How does Secure Electronic Transaction work? Define importance and challenges of Web Security.

OR

Why is email protection important? Define email security protocols briefly.

6. What are the major cloud security approaches? Define cloud security as service.

.