problem 1: When we talk regarding the information security, we must always remember that precaution is the best countermeasure; though there are few countermeasures that must be followed by every computer user in order secure themselves from the professional crackers while employing computers and internet. Recommend such countermeasures.
problem 2: Vulnerabilities are the flaws in computer software which make weaknesses in the overall security of the computer or network and permit an attacker to decrease a system's information assurance. Could you indentify such vulnerabilities?
problem 3: Cookies might be used to remember the information regarding the user who has visited a website in order to show relevant content in the future. prepare down the merits and demerits of cookies.
problem 4: Describe the primary purpose and features of the web browsers.
problem 5: There is no way to prevent receiving spoofed emails. Do you agree? Describe in detail.
problem 6: What are the various challenges for building secure software?
problem 7: Standards are very significant for any technology for its success and acceptance by the users. After the invention of World Wide Web, it became essential to make governing rules for World Wide Web. This need encouraged the web community to design and develop standards for the World Wide Web. Describe such standards and their requirements and advantages.
problem 8: Certification information of a product, service or system confirms that an acceptable standardized process has been consistently followed and gives an assurance on the quality, safety and industry best practices. Do you agree? Describe with illustrations.
problem 9: Describe the Indian laws associated to data protection and privacy.