QB Cyber Scurity

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 3

SAGAR INSTITUTE OF SCIENCE & TECHNOLOGY

DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING


QUESTION BANK
BRANCH CSE
SEMESTER V
(EL)
NAME OF THE FACULTY: SURBHI SONI
SUBJECT/CODE : CYBER SECURITY

UNIT-I

Q 1. Define Cyber Crime? What are the different types of cyber crime?

Q 2. What are the challenges of Cyber Crime?

Q 3. Briefly explain under what categories can you classify cyber crime?

Q 4. Define Cyber Stalking?

Q 5. Explain the concept of spoofing? What is Email spoofing?

Q 6. What is a spam? Explain Email Spamming?

Q 7. What is a Salami Attack? What are the techniques of Salami Attack?

Q8. Explain how Internet time and bandwidth theft ? How can you avoid it?

Q 9. Ecplain Intellectual property crime?

Q 10. Explain the cyber attacks against an organisation?

UNIT-2
Q 1. Explain the Web Jacking Attack? What are the threats and risks involved in it?

Q 2. Explain the different types of online frauds in detail?

Q 3. Explain software piracy? What are its types?

Q 4. Explain the concept of sniffing? What is password sniffing?

Q 5. Case Study of virtual crimes?

Q6. Describe Session hijacking attack with suitable exampls?

Q 7. What is man-in-the-middle attack? How can you prevent it?

Q 8. Describe the cross-site scripting attack?

Q 9. Explain Identity Theft? What are its types and techniques with example?

Q10. What is an intrusion? What are the techniques of network Intrusion? Mechanism to prevent
network intrusion?

UNIT-3

Q 1. Explain the motivating factors and causes of teenage Cyber criminality?

Q 2.Define cheating according to Section 415 of IT Act 2000? Explain the process using illustrative
examples?

Q 3. What are the Sections of IPC under which the following offences are defined and all
explain the corresponding punishments?
1. Forgery
2. Falsification of accounts

Q 4. What are the ingredients of Cyber defamation?

Q 5.Explain the threats under which the punishment for cyber defamation will be granted and
what is the time spam for it??

Q 6. Explain Intellectual property right??


Q 7. What is a digital signature? What are the requirements of digital signature systems?

Q8. Write notes on :


a) Legal Recognition of digital signature
b) Advisory Committee

Q 9. Explain the monetary penalties that have been provided in the IT Law for non compliance ?

Q 10. Write short note on the following –


a>Cyber Appellate Tribunal
b>An adjudicating Authority

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy