[go: up one dir, main page]

0% found this document useful (0 votes)
28 views2 pages

P17CS741 - W2

Uploaded by

Faiz Baloch srk
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
28 views2 pages

P17CS741 - W2

Uploaded by

Faiz Baloch srk
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

P17CS741 Page No...

1
U.S.N

P.E.S. College of Engineering, Mandya - 571 401


(An Autonomous Institution affiliated to VTU, Belagavi)
Seventh Semester, B.E. - Computer Science and Engineering
Semester End Examination; Jan. / Feb. - 2021
Cyber Security
Time: 3 hrs Max. Marks: 100
Note: Answer FIVE full questions, selecting ONE full question from each unit.
UNIT - I
1 a. Define cyber crime. Explain the types of cyber criminals. 6
b. Write a short note on cyber crime and information security. 6
c. What are the risks associated with cloud computing environment? How to remediate
8
these risks?
2 a. Describe how botnets can be used as a fuel to cyber crime? 6
b. What are the different attacks launched with attack vector? Explain. 8
c. Discuss about the global perspective on cyber crimes. 6
UNIT - II
3 a. Discuss about the types and techniques of credit card frauds. 6
b. Explain the kinds of attacks that are possible on mobile / cell phones with example. 8
c. What are the operating guidelines for implementing mobile security policies? 6
4 a. Write a note on Trojan horses and backdoors attacks. What are the steps to be followed to
8
protect the system from them?
b. What is virus? List and explain different types of virus. 6
c. Explain different ways of password cracking. 6
UNIT - III
5 a. Describe the various techniques used by Phishers to launch phishing attack. 7
b. Define Identity theft and list out all types and also explain any two types of Identity theft. 7
c. What are types of phishing scams? Explain. 6
6 a. Discuss the positive and negative aspects of ITA 2000. 8
b. Explain your views on punishment for cyber criminals. Is it possible to punish them? 6
c. Write a note on digital signature in relevance to be Indian IT act. 6
UNIT - IV
7 a. Explain the steps taken by attackers who hack networks using OSI 7 layer model to
7
computer forensics.
b. Explain the process involved in digital forensics life cycle. 7
c. What are the typical elements needs to be addressed in a forensics investigation engagement
6
contract? Explain.

Contd…2
P17CS741 Page No... 2
8 a. What is a social networking site? What are the security issues that can emanate from social
7
networking sites?
b. What are root kits? Why are they dangerous? 5
c. Explain the complexity and quantity problems faced in digital forensics investigation. 8
UNIT - V
9 a. List and explain the different toolkit for handheld devices for forensics. 8
b. Explain the key organizational guidelines on cell phone forensics. 6
c. Explain the generally accepted evidence principles and the difference with
6
handheld devices.
10 a. Discuss about the cost of cyber crimes in an organization. 6
b. Describe the issues that are being faced by the IT management due to web threat. 8
c. Discuss about the organization guidelines for internet usage safe, computing guidelines and
6
compute usage policy.

***

You might also like