Me-Computer Sem1 Csl-Cbcgs May19

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 1

56 B F2 53 F9 1 06 67 0C B

A 7 8 5
6A B7 F22 2531 1F97 718 065 675 50C6 6B8 8F50
B F2 53 F9 1 06 67 0C B F5 FC
AB 7F 25 1F 71 80 56 50 6B 8F 0F 5
2 3 9 6 7 C 5 6
B7 7F22 253 1F9 718 8065 5675 50C 6B8 8F5 0FC C56AAB7
F2 53 1F9 71 06 67 0C 6B F5 0FC 56 B F2
7F 25 1F 7 80 56 50 6 8F 0F 5 A 7F 25
22 3 9 18 65 75 C B8 5 C 6A B7 2 3
22 531 1F97 7180 065 675 0C6 6B8 F50 0FC 56A B7 F22 2531 1F9
5 6 0 F 5 F 7
25 31F F971 1806 656 750 C6B B8F 50F FC5 6AB B7F 225 531F F97 180
31 97 80 56 75 C6 8 50 C5 6A 7 22 31 97 18 65
53 F9 18 65 7 0C B F5 FC 6 B F2 53 F9 1 06 67

58888
1F 7 0 6 50 6 8F 0F 5 A 7F 2 1 7 80 56 50
1F 971 1806 6567 750 C6B B8F 50F C56 6AB B7F 225 531F F971 180 656 750 C6B
C 5 2 6 7 C
F9 9718 8065 5675 50C 6B8 8F5 0FC C56AAB7 7F2 253 31F9 9718 806 567 50C 6B 8F5
71 06 67 0C 6B F5 0F 56 B F2 25 1F 71 06 567 50 6B 8F 0F
71 806 567 50C 6B 8F5 0F C56 AB 7F2 25 31F 971 806 567 50 C6B 8F 50F C56
80 56 50 6 8F 0F C5 A 7F 25 31 97 80 56 50 C6 8F 50 C5 A
65 75 C6 B8 50 C 6A B7 22 31 F9 18 65 75 C B8 5 FC 6A B7
67 0C B F5 FC 56 B F2 53 F 71 06 67 0C 6B F5 0F 56 B F2
50 6B 8F 0F 5 AB 7F 25 1F 97 80 56 50 6 8F 0F C5 A 7F 25

b) Key Logger
C6 8 50 C 6A 7 22 31 97 18 65 75 C6 B8 50 C 6A B7 22 31

c) Cyberstalking
B8 F50 FC 56A B7 F22 53 F9 18 065 675 0C B8 F5 FC 56A B7 F2 53 F9
F5 FC 56 B F2 53 1F9 71 06 67 0C 6B F5 0FC 56 B F2 253 1F 71
0F 56 AB 7F 25 1F 71 806 56 50 6B 8F 0F 5 AB 7F 25 1F 97 80

d) Types of Phishing
C5 A 7F 22 31 97 80 56 750 C6 8F 50 C5 6A 7 22 31 97 180 65
6A B7 22 531 F97 18 65 75 C6 B8 50 FC 6A B7 F22 531 F9 18 65 675
B7 F22 53 F9 18 065 675 0C B8 F5 FC 56A B7 F2 53 F9 718 065 67 0C
F2 53 1F9 71 06 67 0C 6B F5 0FC 56 B F2 253 1F 71 06 67 50C 6B
N.B.: 1) Q.1 is compulsory.

25 1F 71 806 56 50 6B 8F 0F 5 AB 7F 25 1F 97 80 56 50 6 8F
31 97 80 56 75 C6 8 50 C5 6A 7 22 31 97 18 65 75 C6 B8 50
F9 18 65 75 0C B8 F5 FC 6A B7 F2 53 F9 18 06 67 0C B F5 FC
71 06 67 0C 6B F5 0F 56 B F2 25 1F 71 06 567 50 6B 8F 0F 56

Q6. Write short notes on (Any two)


80 56 50 6 8F 0F C5 A 7F 25 31 97 80 56 50 C6 8F 50 C5 A
65 75 C6 B8 50 C 6A B7 22 31 F9 18 65 75 C B8 5 FC 6A B7
67 0C B F5 FC 56 B F2 53 F 71 06 67 0C 6B F5 0F 56 B F2
50 6B 8F 0F 5 AB 7F 25 1F 97 80 56 50 6 8F 0F C5 A 7F 25
Q1. a) Give classification of cybercrime.

C6 8 50 C 6A 7 22 31 97 18 65 75 C6 B8 50 C 6A B7 22 31
B8 F50 FC 56A B7 F22 53 F9 18 065 675 0C B8 F5 FC 56A B7 F2 53 F9

a) Laws related to Electronic Banking


F5 FC 56 B F2 53 1F9 71 06 67 0C 6B F5 0FC 56 B F2 253 1F 71
3) All questions carry equal marks.

0F 56 AB 7F 25 1F 71 806 56 50 6B 8F 0F 5 AB 7F 25 1F 97 80
C5 A 7F 22 31 97 80 56 750 C6 8F 50 C5 6A 7 22 31 97 180 65
6A B7 22 531 F97 18 65 75 C6 B8 50 FC 6A B7 F22 531 F9 18 65 675

Q4. a) Explain Cyber defamation with example.


b) Explain in detail DOS and DDOS attacks
B7 F22 53 F9 18 065 675 0C B8 F5 FC 56A B7 F2 53 F9 718 065 67 0C
d) Discuss the concept of mishing & vishing.

F2 53 1F9 71 06 67 0C 6B F5 0FC 56 B F2 253 1F 71 06 67 50C 6B


25 1F 71 806 56 50 6B 8F 0F 5 AB 7F 25 1F 97 80 56 50 6 8F
31 97 80 56 75 C6 8 50 C5 6A 7 22 31 97 18 65 75 C6 B8 50
(3 Hours)

Q5. a) Explain risks associated with cloud computing


F9 18 65 75 0C B8 F5 FC 6A B7 F2 53 F9 18 06 67 0C B F5 FC
71 06 67 0C 6B F5 0F 56 B F2 25 1F 71 06 567 50 6B 8F 0F 56
80 56 50 6 8F 0F C5 A 7F 25 31 97 80 56 50 C6 8F 50 C5 A
65 75 C6 B8 50 C 6A B7 22 31 F9 18 65 75 C B8 5 FC 6A B7
67 0C B F5 FC 56 B F2 53 F 71 06 67 0C 6B F5 0F 56 B F2

________________
c) Explain LDAP & RSA Securities for mobile devices.

50 6B 8F 0F 5 AB 7F 25 1F 97 80 56 50 6 8F 0F C5 A 7F 25
2) Attempt any three from remaining five questions.

Q2. a) Explain in detail how cyber criminals plan the attacks.

C6 8 50 C 6A 7 22 31 97 18 65 75 C6 B8 50 C 6A B7 22 31
B8 F50 FC 56A B7 F22 53 F9 18 065 675 0C B8 F5 FC 56A B7 F2 53 F9
b) What is objective of computer based social engineering.

F5 FC 56 B F2 53 1F9 71 06 67 0C 6B F5 0FC 56 B F2 253 1F 71


0F 56 AB 7F 25 1F 71 806 56 50 6B 8F 0F 5 AB 7F 25 1F 97 80

b) Explain information security standard : HIPPA and GLBA


C5 A 7F 22 31 97 80 56 750 C6 8F 50 C5 6A 7 22 31 97 180 65

56AB7F22531F97180656750C6B8F50FC
6A B7 22 531 F97 18 65 75 C6 B8 50 FC 6A B7 F22 531 F9 18 65 675
B7 F22 53 F9 18 065 675 0C B8 F5 FC 56A B7 F2 53 F9 718 065 67 0C
F2 53 1F9 71 06 67 0C 6B F5 0FC 56 B F2 253 1F 71 06 67 50C 6B
Q3. a) Explain Cybercrime and Criminal Justice in Indian IT Act 2000.

.
25 1F 71 806 56 50 6B 8F 0F 5 AB 7F 25 1F 97 80 56 50 6 8F
31 97 80 56 75 C6 8 50 C5 6A 7 22 31 97 18 65 75 C6 B8 50
F9 18 65 75 0C B8 F5 FC 6A B7 F2 53 F9 18 06 67 0C B F5 FC
71 06 67 0C 6B F5 0F 56 B F2 25 1F 71 06 567 50 6B 8F 0F 56
80 56 50 6 8F 0F C5 A 7F 25 31 97 80 56 50 C6 8F 50 C5 A
65 75 C6 B8 50 C 6A B7 22 31 F9 18 65 75 C B8 5 FC 6A B7
67 0C B F5 FC 56 B F2 53 F 71 06 67 0C 6B F5 0F 56 B F2
50 6B 8F 0F 5 AB 7F 25 1F 97 80 56 50 6 8F 0F C5 A 7F 25
C6 8 50 C 6A 7 22 31 97 18 65 75 C6 B8 50 C 6A B7 22 31
b) What is buffer overflow problem? How to minimize buffer overflow attack.

B8 F50 FC 56A B7 F22 53 F9 18 065 675 0C B8 F5 FC 56A B7 F2 53 F9


F5 FC 56 B F2 53 1F9 71 06 67 0C 6B F5 0FC 56 B F2 253 1F 71
Paper / Subject Code: 59214 / Elective II: Cyber Security & Laws.

0F 56 AB 7F 25 1F 71 806 56 50 6B 8F 0F 5 AB 7F 25 1F 97 80
C5 A 7F 22 31 97 80 56 750 C6 8F 50 C5 6A 7 22 31 97 180 65
6A B7 22 531 F97 18 65 75 C6 B8 50 FC 6A B7 F22 531 F9 18 65 6
B7 F22 53 F9 18 065 675 0C B8 F5 FC 56A B7 F2 53 F9 718 065 67
F2 53 1F9 71 06 67 0C 6B F5 0FC 56 B F2 253 1F 71 06 67
25 1F 71 806 56 50 6B 8F 0F 5 AB 7F 25 1F 97 80 56 50
31 97 80 56 75 C6 8 50 C5 6A 7 22 31 97 18 65 75
[10]
[10]
[10]
[10]
[10]
[10]
[10]

[20]
b) Explain some precaution measures that should be taken by end user at cyber cafe [10]
[05]
[05]
[05]
[05]

F9 18 65 75 0C B8 F5 FC 6A B7 F2 53 F9 18 06 67 0C
71 06 67 0C 6B F5 0F 56 B F2 25 1F 71 06 567 50
80 56 50 6 8F 0F C5 A 7F 25 31 97 80 56 50 C6
65 75 C6 B8 50 C 6A B7 22 31 F9 18 65 75 C
(Total Marks : 80)

67 0C B F5 FC 56 B F2 53 F 71 06 67 0C 6B
50 6B 8F 0F 5 AB 7F 25 1F 97 80 56 50 6
C6 8 50 C 6A 7 22 31 97 18 65 75 C6 B8
B8 F50 FC 56A B7 F22 53 F9 18 065 675 0C B8
F5 FC 56 B F2 53 1F9 71 06 67 0C 6B F5
0F 56 AB 7F 25 1F 71 806 56 50 6B 8F
C5 A 7F 22 31 97 80 56 750 C6 8F 50
6A B7 22 531 F97 18 65 75 C6 B8 50
B7 F22 53 F9 18 065 675 0C B8 F5 F
F2 53 1F9 71 06 67 0C 6B F5 0FC
8 5

You might also like