P17CS741 Page No...
1
U.S.N
P.E.S. College of Engineering, Mandya - 571 401
(An Autonomous Institution affiliated to VTU, Belagavi)
Seventh Semester, B.E. - Computer Science and Engineering
Semester End Examination; Jan. / Feb. - 2021
Cyber Security
Time: 3 hrs Max. Marks: 100
Note: Answer FIVE full questions, selecting ONE full question from each unit.
UNIT - I
1 a. Define cyber crime. Explain the types of cyber criminals. 6
b. Write a short note on cyber crime and information security. 6
c. What are the risks associated with cloud computing environment? How to remediate
8
these risks?
2 a. Describe how botnets can be used as a fuel to cyber crime? 6
b. What are the different attacks launched with attack vector? Explain. 8
c. Discuss about the global perspective on cyber crimes. 6
UNIT - II
3 a. Discuss about the types and techniques of credit card frauds. 6
b. Explain the kinds of attacks that are possible on mobile / cell phones with example. 8
c. What are the operating guidelines for implementing mobile security policies? 6
4 a. Write a note on Trojan horses and backdoors attacks. What are the steps to be followed to
8
protect the system from them?
b. What is virus? List and explain different types of virus. 6
c. Explain different ways of password cracking. 6
UNIT - III
5 a. Describe the various techniques used by Phishers to launch phishing attack. 7
b. Define Identity theft and list out all types and also explain any two types of Identity theft. 7
c. What are types of phishing scams? Explain. 6
6 a. Discuss the positive and negative aspects of ITA 2000. 8
b. Explain your views on punishment for cyber criminals. Is it possible to punish them? 6
c. Write a note on digital signature in relevance to be Indian IT act. 6
UNIT - IV
7 a. Explain the steps taken by attackers who hack networks using OSI 7 layer model to
7
computer forensics.
b. Explain the process involved in digital forensics life cycle. 7
c. What are the typical elements needs to be addressed in a forensics investigation engagement
6
contract? Explain.
Contd…2
P17CS741 Page No... 2
8 a. What is a social networking site? What are the security issues that can emanate from social
7
networking sites?
b. What are root kits? Why are they dangerous? 5
c. Explain the complexity and quantity problems faced in digital forensics investigation. 8
UNIT - V
9 a. List and explain the different toolkit for handheld devices for forensics. 8
b. Explain the key organizational guidelines on cell phone forensics. 6
c. Explain the generally accepted evidence principles and the difference with
6
handheld devices.
10 a. Discuss about the cost of cyber crimes in an organization. 6
b. Describe the issues that are being faced by the IT management due to web threat. 8
c. Discuss about the organization guidelines for internet usage safe, computing guidelines and
6
compute usage policy.
***