ESSS Question Bank
ESSS Question Bank
COLLEGE
[Approved By AICTE, New Delhi &
Affiliated to ANNA UNIVERSITY, Chennai]
Thiruninravur– 602 024, Thiruvallur Dt.,
Tamil Nadu.
Q. K level CO
No
PART-A Questions (2 marks)
Mapping
1 Define Requirements Engineering? K1 CO2
2 Define secure software requirements. K1 CO2
3 What is the SQUARE process model? K1 CO2
List the main steps involved in the SQUARE process K1
4 CO2
model.
5 Explain requirements elicitation? K2 CO2
6 What is requirements prioritization? K1 CO2
How does untrusted executable content affect K1
7 CO2
software security? Justify your answer.
What is Stack Inspection in software K1
8 CO2
security?
9 Define Policy Specification Languages. K1 CO2
10 Explain are vulnerability trends? K1 CO2
11 Illustrate what is buffer overflow? K1 CO2
12 Define code injection. K1 CO2
13 What is session hijacking? K1 CO2
14 Define threat modeling in secure design? K1 CO2
15 List any two security design principles. K1 CO2
Q. CO
PART-B Questions (13 marks) K level
No Mapping
Explain the importance of Requirements
1 CO2
Engineering in developing secure software. K2
Describe the SQUARE process model in detail with
2 K1 CO2
its key steps.
Discuss different requirements elicitation
3 techniques and their role in secure software K1 CO2
development.
How is requirements prioritization performed for
4 K1 CO2
security-related software requirements?
Evaluate the impact of untrusted executable content
5 on system security and methods to isolate its K1 CO2
effects.
Describe Stack Inspection and its role in
6 K1 CO2
enforcing security policies.
What are Policy Specification Languages? Explain
7 their importance in security policy enforcement. K1 CO2
Analyze the latest vulnerability trends in software
8 security and how they impact modern applications. K1 CO2
Explain Buffer Overflow attacks with an
9 K1 CO2
example. How can they be prevented?
Describe Code Injection attacks and discuss
10 different techniques used to exploit vulnerabilities. K1 CO2
Q. CO
No
PART-C Questions (15 marks) K level Mapping
Explain Session Hijacking and discuss different
11 K1 CO2
techniques used to prevent it.
What is Threat Modeling? Discuss its
12 K1 CO2
significance in secure software design.
Explain various Security Design Principles and
13 their role in building secure software K1 CO2
systems.
14 Describe vulnerability trends and also explain its
usage in software security K1 CO2
Explain Stack inspection and its application in
15 K1
software security CO2
Q. CO
No
PART-A Questions (2 marks) K level Mapping
1 Define Risk Management in software security? K1 CO3
List the phases of the Risk Management Life Cycle. K1
2 CO3
Q. CO
No
PART-B Questions (13 marks) K level Mapping
1 Explain the Risk Management Life Cycle in detail K1 CO3
with its phases.
2 Describe Risk Profiling and its importance in K1 CO3
security management.
3 What are Risk Exposure Factors? Explain their role in K1 CO3
risk assessment.
4 Discuss Risk Evaluation and Mitigation K1 CO3
techniques with examples.
5 Compare and contrast Risk Assessment K1 CO3
Techniques used in cyber security.
6 Describe the concept of Threat Management and how K1 CO3
organizations handle emerging threats.
7 Explain Vulnerability Management and its K1 CO3
importance in maintaining software security.
Compare key differences between Threats, K1
8 Vulnerabilities, and Risks with real-world CO3
examples.
What are the different strategies for risk K1
9 mitigation in software security? Explain with CO3
examples.
Explain the importance of risk assessment in K1
10 securesoftware development and discuss CO3
different risk assessment models.
Q. CO
No
PART-C Questions (15 marks) K level Mapping
Q. CO
No
PART-B Questions (13 marks) K level Mapping
Explain Traditional Software Testing and compare
1 K1 CO4
it with Security Testing.
Describe the Secure Software Development Life
2 Cycle (SDLC) and its significance. K1 CO4
What is Risk-Based Security Testing? Explain its
3 importance and approach. K4 CO4
Discuss how ThreatModeling helps in
4 prioritizing security testing. K1 CO4
Explain the Penetration Testing Process in detail
5 with key phases. K1 CO4
Q. CO
No
PART-A Questions (2 marks) K level Mapping
1 Explain Governance in Security? CO5
K2
Define Enterprise Software Security CO5
2
Framework. K1
What is the role of Governance in Software CO5
3 Security? K1
List any two benefits of adopting an CO5
4 Enterprise Software Security Framework. K1
5 What is the relationship between Security and CO5
Project Management? K1
6 Define Security Governance in an CO5
organization. K1
7 What are the key elements of an Enterprise CO5
Security Framework? K1
Mention any two challenges in integrating security CO5
8 with project management. K1
9 What is Security Maturity in an organization? CO5
K1
10 Define Maturity of Practice in software CO5
security. K1
11 Apply Risk Governance in security CO5
management? K1
12 How does Project Management influence CO5
software security? K1
Mention any two industry-standard Security CO5
13 Frameworks. K1
14 What is ISO 27001, and how does it relate to CO5
security governance? K1
Compare security governance and security CO5
15 management. K1
Q. CO
No
PART-B Questions (13 marks) K level Mapping
Explain Governance in Security and its role CO5
1 K1
in enterprise security management.
Discuss the importance of adopting an Enterprise
2 Software Security Framework and K1 CO5
its benefits.
Describe various Enterprise Security CO5
3 K1
Frameworks used in organizations.
Explain the relationship between Security and
4 Project Management and how security is integrated K1 CO5
into project planning.
Discuss Security Governance Models and their CO5
5 K1
impact on software security.
How can organizations enhance Software Security
6 Maturity? Discuss different security maturity K1 CO5
models.
Explain the Maturity of Practice in security
7 CO5
and its evolution over time. K level
What are the challenges in adopting a Software
8 Security Framework, and how can they be K1 CO5
overcome?
Discuss the role of Security Policies,
9 Standards,and Compliance in security governance. K3 CO5
Q. CO
No
PART-C Questions (15 marks) K level Mapping