0% found this document useful (0 votes)
10 views

cyber security Assignment-1

cyber

Uploaded by

harendra tomar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
10 views

cyber security Assignment-1

cyber

Uploaded by

harendra tomar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

Raj Kumar Goel Institute of Technology Ghaziabad

ISO 9001:2015 Certified


5th KM. STONE, DELHI-MEERUT ROAD, GHAZIABAD (U.P)-201003

Tel: (0120) 2788409, Fax: (0120) 2788447

Department of CSE(AIML)
Assignment 1

CYBER SECURITY (BCC-301)

Course Outcome (CO) Bloom’s


Knowledge Level
(KL)
At the end of course, the student will be able to
CO1 Understand the basic concepts of cyber security and K1, K2
cybercrimes.
CO2 Understand the security policies and cyber laws. K1, K2

CO3 Understand the tools and methods used in cybercrime K2


CO4 Understand the concepts of cyber forensics . K1, K2
CO5 Understand the cyber security policies and cyber laws K2

Maximum Marks: 20 Date of submission: 09/10/2023.

Q1. Attempt all questions in brief.

a) What do you mean by Cybercrime Era?


b) Define the term Hacker and Brute Force Hacking.
c) Define Botnet and password sniffing..
d) Briefly discuss about the the cracker,cracking and cracking tools.

e.)Describe the Black hat, White hat and Brown hat hacker?

f) Define Botnet and password sniffing.

g) Explain cyberterrorism, Wardailing?


h.)Explain the term information Security?
,
i)Explain the term Phishing,cybersquatting?

Q2.Who are Cybercriminals? Describe its types of Cybercrimes ?


Q3 What do you mean by Botnet attack vector? Give the name of botnet attack vector.

Q4. What do you mean by Social Engineering Cyber offenses? Describe it's all types.
Q5 Explain the term Cyber stalking offenses with its type and examples.
Q6 How Criminals Plan the Attacks?

Q7 Explain the term Netizens and survival mantra for Netizens.

Q8 Explain the meaning and Origins of the word Cybercrime and Information Security

Q9. Explain the Laws in India against Cyber stalking.

Q10 Briefly explain why Botnets as The Fuel for Cybercrime .


..

You might also like