0% found this document useful (0 votes)
55 views2 pages

CSCL 206003

CYBER SECURITY AND CYBER LAW QP

Uploaded by

bilwashree.m
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
55 views2 pages

CSCL 206003

CYBER SECURITY AND CYBER LAW QP

Uploaded by

bilwashree.m
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

USN 206CS003

Ph.D./M.S.(Engg.) by Research Degree Examination, December 2022


Cyber Security and Cyber Law

Time: 3 hrs. Max. Marks: 100

Note: Answer any FIVE full questions, choosing ONE full question from each module.

Module-1
2. Any revealing of identification, appeal to evaluator and /or equations written eg, 42+8 = 50, will be treated as malpractice.

1 a. Discuss the following terms related to cyber crimes:


i) Web Jacking ii) Email Bombing iii) Data Didding
iv) Industrial Espionage v) Logic Bomb (10 Marks)
b. Identify the cyber type:
i) A law firm in India discovered that someone copied the code for its web site
www.abc.com, changed the “India” references to Russia and routed to the bogus site.
Important Note : 1. On completing your answers, compulsorily draw diagonal cross lines on the remaining blank pages.

ii) Publishing of an offensive statement against a person on a social networking site.


(04 Marks)
c. Explain how Botnet can be used as a fuel to cyber crime and also list the mechanisms used
to avoid Botnet attacks. (06 Marks)

OR
2 a. Define Attack Vector. Discuss the various attack vector used for launching cyber attack.
(10 Marks)
b. A friend sends an electronics Hallmark greeting card (e-card) to your work email. You need
to click on the attachment to see the card. What should you do? What are the possibility for
the attack? (04 Marks)
c. What is port scanning? What it does? How hackers used this method to gain the
information? (06 Marks)

Module-2
3 a. Explain the different kinds of attack on Bluetooth. (08 Marks)
b. Discuss the various precautions to be followed led to protect from smishing attacks.
(06 Marks)
c. What are the popular types of attacks against 3G mobile networks? Discuss in detail.
(06 Marks)

OR
4 a. Explain the various factors that contribute for the outbreak on mobile device attack.
(06 Marks)
b. Considering the following scenario mention the tool used:
i) If a Bluetooth of a device is switches ON, possible to connect to the phone without
alerting the owner and to gain access to restricted portions of stored data.
ii) This tool enables to search for Bluetooth enabled device and will try to extract as much
information as possible for each newly discovered device after connecting it with the
target.
iii) Exploit the vulnerability of the device and access the images, phone book, messages and
other personal information.
iv) Testing Bluetooth penetration.
v) This is a GUI - based utility for finding discoverable and hidden Bluetooth enabled
devices. (05 Marks)

1 of 2
206CS003
c. Discuss the following Authentication Service Security :
i) LDAP Security for Handheld devices
ii) RAS Security
iii) Media Player Control Security (09 Marks)

Module-3
5 a. Explain how attacks on passwords are broadly classified. (06 Marks)
b. What is the vulnerable variable in this code? Justify.
#include <stdio.h>
int myfunc( ) {
char buff1[5], buff2[22];
scanf(“t.s”, buff2);
strcpy(buff1, buff2);
} (04 Marks)
c. Outline the different techniques used by phishers to launch phishing attack. (10 Marks)

OR
6 a. Discuss few tips to reduce the amount of spam emails. (06 Marks)
b. Explain with an example how SQL injection can be used to get into a table with two fields
login and password. (08 Marks)
c. Discuss the following type of DoS attack:
i) Bandwidth attack
ii) Logic attacks
iii) Protocol attacks. (06 Marks)

Module-4
7 a. Explain the relevance of OSI 7 layer model to computer forensics. (14 Marks)
b. List the guidelines for the digital evidence collection phase and the contexts involved in
identifying digital evidence. (06 Marks)

OR
8 a. Explain the Forensic Analysis of email with an example. (12 Marks)
b. Discuss in detail the phases required for computer forensics. (08 Marks)

Module-5
9 a. Write a short note on the Copyright and the Patent law. (10 Marks)
b. Explain the steps involved in policy review process. (10 Marks)

OR
10 a. Briefly explain the ISO standards to be considered while laying down the policies. (10 Marks)
b. Write short notes on :
i) Email security policy
ii) Software copyright. (10 Marks)

*****

2 of 2

You might also like