Professional Documents
Culture Documents
Subject File
Subject File
Tutorial Classes 16
Descriptive Tests 02
Classes for beyond Syllabus 03
Remedial Classes / NPTEL 04
Total Number of Classes 80
TEACHING SCHEDULE/MICRO LESSON PLAN
Sl No. of
Cumulativ Teaching
. Classes
e number AID
N Name of the Topic require
of periods
o d
Course Objective and Course Outcomes: E-Board
1 Explaining Course Objective and Course 1 1
Outcomes
UNIT-I
UNIT-II
11 Cybercrime: Mobile and Wireless PPT/E-Board
1 14
Devices :Introduction
12 proliferation of mobile and wireless devices 1 16 PPT/E-Board
13 Trends in mobility, credit card frauds in mobile PPT/E-Board
and wireless computing era 1 18
14 Descriptive Test
15 Security challenges posed by mobile devices PPT/E-Board
1 21
16 Authentication service security, attacks on 1 22 PPT/E-Board
mobile/cell phones
Tools and methods used in cyber crime: phishing PPT/E-Board
17 1 24
Password cracking PPT/E-Board
18 1 26
UNIT-III
UNIT-IV
27 Cyber Security - Organizational implications: 1 41 PPT/E-Board
Introduction,
Cost of cyber crimes and IPR issues, PPT/E-Board
28 1 42
Web threats for organizations, security and PPT/E-Board
29 privacy implications from cloud computing 1 43
UNIT-V
Cyber Crime Examples: Introduction, Real-life PPT/E-Board
36 Examples :Official website of Maharashtra 1 50
Government
E-Mail spoofinghacked
instances, Indian banks lose PPT/E-Board
37 1 51
millions of rupees,
Parliament attack,Pune city police bust Nigerian PPT/E-Board
38 1 52
racket,
39 Mini-Cases: The Indian case of online gambling 1 53 PPT/E-Board
an Indian case of intellectual property crime, PPT/E-Board
40 1 55
illustrations of financial frauds in cyber domain.
41 Descriptive Test
TOTAL HOURS 55
Tutorial classes 16
Descriptive Tests 02
Classes for beyond Syllabus 03
Remedial Classes/NPTL 04
Total Number of Classes 80
Assignment Questions:
Academic Year : 2020-21
Subject Name with code : FUNDAMENTALS OF CYBER SECURITY (18MC0CS02)
Class : III-CSE-1,2,3
Name of the Faculty Member : Mr.R.Uttham Sai/Mr.B.Krishna Kumar
Blooms Taxonomy Levels (BTL)
1. Remembering
2. Understanding
3. Applying
4. Analyzing
5. Evaluating
6. Creating
6. These are a collective term for malicious spying programs used for secretly monitoring
someone’s activity and actions over a digital medium.
a) Malware b) Remote Access Trojans c) Key loggers d) Spyware
7. Stuxnet is a _________
a) Worm b) Virus c) Trojan d) Antivirus
8. ___________ is a violent act done using the Internet, which either threatens any
technology user or leads to loss of life or otherwise harms anyone in order to accomplish
political gain.
a) Cyber-warfare b) Cyber campaign c) Cyber-terrorism d) Cyber attack
9. In general how many key elements constitute the entire security structure?
a) 1 b) 2 c) 3 d) 4
10. According to the CIA Triad, which of the below-mentioned element is not considered in
the triad?
a) Confidentiality b) Integrity c) Authenticity d) Availability
11. This is the model designed for guiding the policies of Information security within a
company, firm or organization. What is “this” referred to here?
a) Confidentiality b) Non-repudiation c) CIA Triad d) Authenticity
12. CIA triad is also known as ________
a) NIC (Nonrepudiation,Integrity,Confidentiality)
b)AIC(Availability,Integrity,Confidentiality)
c) AIN (Availability, Integrity, Nonrepudiation)
d) AIC (Authenticity, Integrity, Confidentiality)
13. When you use the word _____ it means you are protecting your data from getting
disclosed.
a) Confidentiality b) Integrity c) Authentication d) Availability
14. _____ means the protection of data from modification by unknown users.
a) Confidentiality b) Integrity c) Authentication d) Non-repudiation
16. _______ of information means, only authorized users are capable of accessing the
information.
a) Confidentiality b) Integrity c) Non-repudiation d) Availability
17. Why these 4 elements (confidentiality, integrity, authenticity & availability) are
considered fundamental?
a) They help understanding hacking better
b) They are key elements to a security breach
c) They help understands security and its components better
d) They help to understand the cyber-crime better
18. This helps in identifying the origin of information and authentic user. This referred to here
as __________
a) Confidentiality b) Integrity c) Authenticity d) Availability
UNIT-2
4. DDoS in mobile systems wait for the owner of the _____________ to trigger the attack.
a) Worms b) virus c) botnets d) programs
10. Compromising a user’s session for exploiting the user’s data and do malicious activities
or misuse user’s credentials is called ___________
a) Session Hijacking b) Session Fixation c) Cookie stuffing d) Session Spying
14. _________ are the special type of programs used for recording and tracking user’s
keystroke.
a) Keylogger b) Trojans c) Virus d) Worms
UNIT-3
1. What is the name of the IT law that India is having in the Indian legislature?
a) India’s Technology (IT) Act, 2000
b) India’s Digital Information Technology (DIT) Act, 2000
c) India’s Information Technology (IT) Act, 2000
d) The Technology Act, 2008
4. Under which section of IT Act, stealing any digital asset or information is written a
cyber-crime.
a) 65 b) 65-D c) 67 d) 70
5. What is the punishment in India for stealing computer documents, assets or any
software’s source code from any organization, individual, or from any other means?
a) 6 months of imprisonment and a fine of Rs. 50,000
b) 1 year of imprisonment and a fine of Rs. 100,000
d) 3 years of imprisonment and a fine of Rs. 500,000
6. What is the updated version of the IT Act, 2000?
a) IT Act, 2007 b) Advanced IT Act, 2007 c) IT Act, 2008d) Advanced IT Act, 2008
8. What type of cyber-crime, its laws and punishments does section 66 of the Indian IT
Act holds?
a) Cracking or illegally hack into any system b) Putting antivirus into the victim
c) Stealing data d) Stealing hardware components
10. Sending offensive message to someone comes under _____________ of the Indian IT
Act ______
a) section 66-A, 2000 b) section 66-B, 2008 c) section 67, 2000 d) section 66-
A, 2008
11. Misuse of digital signatures for fraudulent purposes comes under __________ of IT
Act.
a) section 65 b) section 66 c) section 71 d) section 72
12. Using of spy cameras in malls and shops to capture private parts of any person comes
under section 67 of IT Act, 2008 and is punished with imprisonment of ___________
a) 2 years b) 3 years c) 4 years d) 5 years
13. Using spy cameras in malls and shops to capture private parts of any person comes
under _______ of IT Act, 2008.
a) Section 66 b) Section 67 c) Section 68 d) Section 69
14. If anyone publishes sexually explicit type digital content, it will cost that person
imprisonment of _________ years.
a) 2 b) 3 c) 4 d) 5
15. T Act 2008 make cyber-crime details more precise where it mentioned if anyone
publishes sexually explicit digital content then under ___________ of IT Act, 2008
he/she has to pay a legitimate amount of fine.
a) section 67-A b) section 67-B c) section 67-C d) section 67-D
16. Any digital content which any individual creates and is not acceptable to the society,
it’s a cyber-crime that comes under _________ of IT Act.
a) Section 66 b) Section 67 c) Section 68 d) Section 69
17. How many years of imprisonment can an accused person face, if he/she comes under
any cyber-crime listed in section 66 of the Indian IT Act, 2000?
a) 1 year b) 2 years c) 3 years d) 4 years
18. Any cyber-crime that comes under section 66 of IT Act, the accused person gets fined
of around Rs ________
a) 2 lacs b) 3 lacs c) 4 lacs d) 5 lacs
19. Cracking digital identity of any individual or doing identity theft, comes under
__________ of IT Act.
a) Section 65 b) Section 66 c) Section 68 d) Section 70
20. Accessing computer without prior authorization is a cyber-crimes that come under
_______
a) Section 65 b) Section 66 c) Section 68 d) Section 70
UNIT-IV
1. Performing hacking activities with the intent on gaining visibility for an unfair situation
is called ________.
a) Cracking b) Analysis c) Hacktivism d) Exploitation
2. Intellectual Property Rights (IPR) protect the use of information and ideas
that are of
a) Ethical value b) Moral value c) Social value d) Commercial value
3. Which of the following will allow foot printing to be conducted without
detection?
a) PingSwee b) Tracerout c) War d) ARIN
8. If the Internet History file has been deleted, ____________ may still provide
Information about what Web sites the user has visited.
a) Cookies b) Metadata c) User profiles d) Sessions
11. What is the best statement for taking advantage of a weakness in the security
of an IT system?
A. Threat B. Attack C. Exploit D. Vulnerability
12. Which of the following is not a factor in securing the environment against an
attack on security?
A. The education of the attacker
B. The network architecture
C. The business strategy of the company
D. The level of access provided to employees
15. Which word best fits with this definition - officials set up a perimeter around a
crime scene?
a. Civilian b. Police Officer c. Law Enforcement d. math
18. What is the best statement for taking advantage of a weakness in the security of an
IT system?
a. Threat b. Attack c. Exploit d. Vulnerability
19. The area that begins at the end of the last sector that contains logical data and
terminates at the end of the cluster is known as
a. File slack b. ROM slack c. HDD slack d. RAM slack
20. Areas of files and disks that are not apparent to the user, and sometimes not even
to the operating system, is termed:
a. Missing data b. latent data c. exceptional data d. hidden data
UNIT-V
2. ------- are often delivered to a PC through an email attachment and are often designed to do
harm.
A. Spam B. Email C. Portals D. Virus
9. Whitch of the following is not an information source over the internet for target attackers?
A. Archive sites B. whois C. You Tube D. Nslookup
10. There are __types of scanning in ethical hacking and cyber –security
A. 2 B. 3 C. 4 D. 6
A. Null Scan B. Cloud scan C. SYN Stealth scan D. Xmas Tree Scan
12. Which of the following is the most important activity in system hacking?
A. Covering Tracks B. Escalating privileges C. cracking passwords D. information
gathering
19. ------- is attempts by individuals to obtain confidential information from you to falsifying
their identity.
a) Computer viruses b) Phishing scams c) Phishing trips d) Spyware scams
20. Which of the following describes programs that can run independently travel from system to
system and disrupt computer communication?
a)Viruses b)Trojans c) Droppers d)Worm