0% found this document useful (0 votes)
3 views

Tutorial Sheet cyber unit 2

CS 2
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
3 views

Tutorial Sheet cyber unit 2

CS 2
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 2

Tutorial Sheet-2

Program B. Tech CSE


Session 2024-25
Subject Name with Code CYBER SECURITY (BCC301)
Year & Semester 3rd semester
Unit No. 2
Date of Distribution 09.11.2024
Name of Course Coordinator/Faculty Mr. Chinmay Shukla
Course Outcome(CO1) Understand the security policies and cyber laws.

Long Answer Type Questions:

Q Question Description BL MM
What are the primary security challenges posed by mobile and wireless devices in the context
of cyber crime, and how do these challenges differ between individual users and
1 organizations? 2 4
How has the proliferation of mobile devices contributed to the rise of credit card fraud in the
2 4
2 mobile computing era, and what specific trends can be identified in this type of cyber crime?
In what ways do authentication service security measures impact the overall security posture
of mobile devices, and what are some common attacks that exploit weaknesses in these 2 4
3 authentication systems?
Discuss the organizational measures that can be implemented to mitigate security risks
4 associated with mobile devices in a corporate environment, including policies and 4
technologies that enhance data protection. 2
What are the implications of registry settings for mobile devices in terms of security
5 management, and how can improper configurations lead to vulnerabilities that cyber criminals 2 4
might exploit?
Short Answer Type Questions:

6 What is the role of encryption in securing data transmitted over mobile networks? 2 2
7 Define 'mobile phishing' and explain its significance in the context of cyber crime. 2 2
What are 'man-in-the-middle' attacks, and how do they specifically target mobile device
8 communications?
2 2
9 Explain how public Wi-Fi networks pose a threat to mobile device security. 2 2
What measures can organizations take to enforce secure authentication practices for mobile
10 device access?
2 2
REFERENCES

TEXT BOOKS:
Ref. Authors Book Title Publisher/Press Edition &Year of
[ID] Publication
Cyber Security:
Sunit Understanding
Belapure and Cyber Crimes,
[T1] Wiley India Pvt Ltd 2013
Nina Computer Forensics
Godbole And Legal
Perspectives

Basta, Basta, Cyber Security and


Cengage Learning
[T2] Brown, Cyber Laws, 1st 2001
publication
Kumar edition

Signature of Course Coordinator Signature of HoD

You might also like