Tutorial Sheet cyber unit 2
Tutorial Sheet cyber unit 2
Q Question Description BL MM
What are the primary security challenges posed by mobile and wireless devices in the context
of cyber crime, and how do these challenges differ between individual users and
1 organizations? 2 4
How has the proliferation of mobile devices contributed to the rise of credit card fraud in the
2 4
2 mobile computing era, and what specific trends can be identified in this type of cyber crime?
In what ways do authentication service security measures impact the overall security posture
of mobile devices, and what are some common attacks that exploit weaknesses in these 2 4
3 authentication systems?
Discuss the organizational measures that can be implemented to mitigate security risks
4 associated with mobile devices in a corporate environment, including policies and 4
technologies that enhance data protection. 2
What are the implications of registry settings for mobile devices in terms of security
5 management, and how can improper configurations lead to vulnerabilities that cyber criminals 2 4
might exploit?
Short Answer Type Questions:
6 What is the role of encryption in securing data transmitted over mobile networks? 2 2
7 Define 'mobile phishing' and explain its significance in the context of cyber crime. 2 2
What are 'man-in-the-middle' attacks, and how do they specifically target mobile device
8 communications?
2 2
9 Explain how public Wi-Fi networks pose a threat to mobile device security. 2 2
What measures can organizations take to enforce secure authentication practices for mobile
10 device access?
2 2
REFERENCES
TEXT BOOKS:
Ref. Authors Book Title Publisher/Press Edition &Year of
[ID] Publication
Cyber Security:
Sunit Understanding
Belapure and Cyber Crimes,
[T1] Wiley India Pvt Ltd 2013
Nina Computer Forensics
Godbole And Legal
Perspectives