100% found this document useful (1 vote)
371 views2 pages

Question Bank Cyber Security and Intellectual Property Rights

This document contains a question bank related to cyber security and intellectual property rights divided into two units. The first unit covers topics like the difference between cyber security and information security, information systems, types of attacks, passwords, frauds and intellectual property theft. It also discusses security principles, authentication, denial of service attacks, worms, viruses, phishing, pharming and classification of attacks. The second unit discusses security threats, attacker motives, viruses, worms, Trojan horses, firewalls, VPNs, application security, digital signatures, intrusion detection systems and hacking. It also covers types of hacking, hackers, advantages and disadvantages of hacking and notes on firewalls and e-cash.

Uploaded by

masumi
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
100% found this document useful (1 vote)
371 views2 pages

Question Bank Cyber Security and Intellectual Property Rights

This document contains a question bank related to cyber security and intellectual property rights divided into two units. The first unit covers topics like the difference between cyber security and information security, information systems, types of attacks, passwords, frauds and intellectual property theft. It also discusses security principles, authentication, denial of service attacks, worms, viruses, phishing, pharming and classification of attacks. The second unit discusses security threats, attacker motives, viruses, worms, Trojan horses, firewalls, VPNs, application security, digital signatures, intrusion detection systems and hacking. It also covers types of hacking, hackers, advantages and disadvantages of hacking and notes on firewalls and e-cash.

Uploaded by

masumi
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 2

QUESTION BANK

Cyber Security and Intellectual property rights

Unit-1
1. What is Cyber Security and how it is different from Information Security?
2. What do you mean by Information System? What is the need of
Information System?
3. What are the types of Information System?
4. Explain the terms: Criminal attacks, Publicity attacks, Legal attacks. What
is security?
5. How to protect yourself while on the Internet.
6. What is password?
7. Define: Frauds,Scams, Identity theft, Intellectual property theft, Brand
theft
8. Discuss the types of attacks with example.
9. What are the key principles of security?
10.Discuss the reason behind the significance of Authentication.
11.What is ‘masquerade’? Which principle of security is breached because of
that?
12.What is Denial of service attack?
13.What is worm? What is the significant difference between virus and
worm?
14.Discuss the concept of ‘phishing’ and ‘pharming’.
15.Classify attacks on a system.
16.What is cybercrime? Brief different cybercrimes.
17.What is Cyber Security and How it is different from Information Security?
18.Explain different categories of cybercrime?
19.Discuss 5 kinds of cybercrime.
20.Discuss cyber pornography with example
21.Explain 5 types of cybercrime that are done frequently in digital world?
22.List out the top cyber safety actions.
Unit-2

1. Discuss the security threats in detail.


2. Discuss the specific motives or goals of a attacker for an attack on a system.
3. Explain the terms: Virus, Worms, Trojan Horse, Impersonation,
Eavesdropping, Social engineering, Mail bombing, Network spoofing.
4. Explain the difference between Virus , Worms and Trozan Horse?
5. Explain Firewall and working of Firewall?
6. Explain the working of Virtual Private network?
7. What do you mean by Application Security? Explain the steps involved in
securing Database?
8. Explain the S-MIME protocol for Secure E-Mail?
9. Write a short note on Digital signatures.
10.How can be Intrusion Detection system is the backbone of Information
system? Justify along with its categories?
11.Elaborate Cyber crime play a vital role against person ,property and govt. to
protect all valuable information and rights?
12.Write a note on Hacking.
13.Explain the types of hacking.
14.Explain the types of hackers.
15.State the advantages and Disadvantages of hacking.
16.Write a note on Firewalls.
17.Write a note on E-cash.

You might also like