0% found this document useful (0 votes)
209 views12 pages

See Old Question Paper

1) Cybercriminals involve those conducting illegal online activities such as hacking, identity theft, and copyright infringement. They are categorized as type I criminals seeking recognition, type II not interested in recognition, and type III insiders. 2) A botnet is a network of infected computers controlled remotely by cybercriminals without the computer users' knowledge. Attack vectors are paths that allow attackers access to deliver malicious payloads through means like browsers, email attachments, and infected devices. 3) Password cracking attacks can be online attacks, offline attacks, or non-electronic social engineering attacks. Spam emails involve identical unsolicited messages sent in large volumes using botnets and infected devices, while ho

Uploaded by

editzworld777
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
209 views12 pages

See Old Question Paper

1) Cybercriminals involve those conducting illegal online activities such as hacking, identity theft, and copyright infringement. They are categorized as type I criminals seeking recognition, type II not interested in recognition, and type III insiders. 2) A botnet is a network of infected computers controlled remotely by cybercriminals without the computer users' knowledge. Attack vectors are paths that allow attackers access to deliver malicious payloads through means like browsers, email attachments, and infected devices. 3) Password cracking attacks can be online attacks, offline attacks, or non-electronic social engineering attacks. Spam emails involve identical unsolicited messages sent in large volumes using botnets and infected devices, while ho

Uploaded by

editzworld777
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 12

No...

1
P'aqe

U.S.N

P.E.S.(An Autononous Mandya - 571 401


College Institution affiliated to VTU, Belugavi)May-2023
of Engineering,
First Semester, IB.E. - Semester End Examination; April /
Introduction toCyber Security
Time: hrs (E&C) Max. Marks: 100

The
CO:Students
Course Oteomes
will be able lo:
Explan the
CO2: Describe (vbervbercrime teandrminologies,
(O3: Ilusirate Tools offenses
nd Botnets.
C04: Expluin Phishing and Metbods sed on Cvbercrime.
CO3: JUstifv the need of ldentity Thef.
coputer
Note: ) PART- A is compulsory. forensics.
Tw0 marks for each queslon.
) AKT- B: Answer ay Two sub aupstiong (foma bc) for uMuxium of 18 marks fromeach iml!.
Q. No. Marks BLs COs POs
Questions
I: PART - A 10
la. Whoare cyber criminals? LI CO| PO1
b. Define Botnet and attack vectors. LI CO2 PO1
c. List the different ways of password cracking attacks. 2 LI CO3 PO1
d. Differentiate between spam and hoax E-mails. 2 L2 CO4 PO1
e. What is the need for computer forensics? 2 LI CO5 PO1
II: PART -B 90
UNIT - I 18
2a. Briefly explain the classification of cyber crime. L2 CO1 POI
b. Write a note on industrial spying or industrial espionage, hacking and
9 LI CO1 PO4
online frauds.
Write a note on global perspective on cyber crime. LI CO1 POS
UNIT - II 18
3a. Explain how criminals plan the attacks? L2 CO2 POI

b. What is social engineering? Explain the classification. L2 CO2 PO3


C. Write a short note on cybercafe and cybercrime. LI CO2 POS
UNIT - I|I 18
4 a. Briefly explain steganography, DOS and DDOS attacks. 9 L2 CO3 PO3
b. What are the types of viruses and explain cach. 9 LI CO3 PO3
e Explainthe traditional techniques of attacks on wireless networks. 9 L2 CO3 POS
UNIT - 1IV 18
5a. Briefly explain the different phishing countermeasures. 9 L2 CO4 PO1
b. Explain the types of phishing scams. L2 CO4 POI
c. Briefly explain the different types of ID theft. 9 L2 CO4 PO5

Contd...2
P22ETC1057
UNIT- V
18
cyber forensics,
6a. Describe the historicalbackground of 9
12 Co,
b Explain the various phases and activities involved in the lifecycle of a
forensics investigation process with examples. L2. CO5 w
c. Explain the process model for understanding aseizure and handling of
forensic evidence legal framework. L2
COS
ge N
P.E.S. COLLEGE OF ENGINEERING
MANDYA - 571401, KARNATAKA
PO (An Autonomous Institution Affliated to VTU, Belagavi)

Scheme and
Solution Scrutinizer Name :

Signature:
Vina
Course Title: TntsoduCtion to Cyter Secuotty Course Code: PaaETCIO5 7
Question Marks
Number
Solution |Allocated

PABT - A
Cybescot me in volves SUCh activities a6 Child
4) )
Ponegraphyi coedet card graud; Cyberstalhing:
dezaming anotBer onlioe iganing unautooiged acceas
to conpites yatems: ignoarog oyrgbl, soae
kcenbing trade rask proYection ; OVeviding enaYPhioy
to make
iltegal copiee : scgtuaoe przay stealing
anotteo'% idertity to Pergosm coiminal acts.
CybesCoiminals qre those who conduct Buch acts.
They ae catyidintothree frops.
9 Type I :ybeocoiminals - byngry 2o ecognition.
2) TYPe :Cybescoiminala - not inteoEsted in oecegpition BM
) TYPe I: Cyber (oiminas- the insideos.

Botnet a tesom uied gor Collection 0 8ogtuaoe


) b) that Jun autonohousy g automatallu,
0obot6 , OoBots
The term oqten asociate itH akcious sogtade
to metwoak
but Can also ezeo
drstoibuteg Computing 6°2twoe. A Botnet is a
a Compnteos ingected With 79alictous poogram ttat
los Cybeocoiminals to confeol ingected nyachines senrole
Without usess %nontedge.
Atac% vectoa t6 a path or eans by which arn
atackes Can un alcess to a Computes or to a h|w
to delires a payload 07 mali Cious outcome.
AtacK yectoss ¿0clude Yrouse8, E- mail attachmeots.
webpages , poP- y windows , inztant rgessages,
Chat ooms and deception. M

PES College of Engineering-Mandya-571401


0 u r S
Tei t l e

Course Title: Course Code:

Question

Question
Solution N u m b e r

Number Al.

) c) PasshOTt q atack& can be classigted


coacking
undes thsee Cattgooies
-’
Zoilow< :
M ITM attacs
Onie att a k s
) 032ine att actss
3) Non- electsooiC attaks (e-9» so c al engheCoig
AM
Shoulder suaging g dumpateo dering):
also kmown Junk E- mails"they
) d) Spam E- maila t
tnvolve MesBages sent to numeTous
fdenti Cal
Decepients. span E-)ails hare steadily grows since
easy 4406. Botnets , netwost5a og visus ingected
CeputeTa. , are used to send about 8o7. g pam.
Types o span f- natls aTe Unsoli ce ted buls Eroo:
(UBE) unoicited Comercca E-mal.
tloaz E-matls the8e ase deibesate attempt
to de v¢ce 7 torck a uea ioto believng oo accepting
that Bomethi ng i8 oeal , when tbe hoazes knows rt
C6 3alse. tHoat E-mails may or may ot be Spa
E-mals.
the Convesgence B Iogomation and Communicattons
advances g the pes Vasive use o
TechnologY[1CT2
Computers wosldide together have boought about man
to mankind. AtSame time, thi3 bigh
advantages
technical apality_og moden Cmputeos Provdes
avenues as weli ac OPpotunites T
Commi Hina Coime, This has lead to
Computes ukeD8 and also ncseaked Oppootunities
bar,
Bor Socal The widesprea g use % Comuter
goren 8iC8 the esut C3 two Bactoss the
oCoeaking dependence law engercement
digrtal evidenCe g the ubiguity Conputeos
that oltowed grom micooCoomputeo zevolution.

PES College of Engineering-Mandya-571401


Course Title:
Course Code:

Mcate arks Question


Number Solution
Marks
Allocated

PAST B
Unrt -I
a) a) (ybeocoimeK
) ybesC3:me against individual -> Fonall spoogig.
Phishing Spamming yberdegomaton. yber otaltig-3
Conputer sabotage, passcod soi29ing. prnogaphic
BIenAe. Explanation
) ybes caime aginst Paqpesty Coedit casd gaaud
Iotellectual propesty Csimes Ioternet tine
tezt.
3) Cybesco ime against ganigation passnord
Soiig. Unauthoonged accesing gcorputer,
Visus attack. Data didding, LogiC bomb SIN pizay
H)
Cybeocaime aqinst soGety forgy, web -

Jackin9: Cybeo teroorikn


5) Coimes emanatin9 foom uKenet newsgroup
qM
abore
Eaplain
8) b) Lndustrtal get
Spyin9 LIrdustral Eopionage
Spres Can ingoTmatioro about pooduct ginanes,
rescaTch g development g maoketing stategie<.-3
an ahVity known as Industreal SPying
Eaplanati0)
The
tacsing puzposes g hacking
5eed, po wer, pubkccty> rerenge -3
adventuoe destructive mindset. fzptanation
Onkne 2rauds -> Thee are gew majo types
cainex unde Catege uy
Website e E-mail
haching i spoagng
Becusity alest , hoaz mails
about Vrous thoeats, lotey 2rauds S Spgin9
fzplanaton

PES College of Engineering-Mandya-571401


e T i t l e :

Course Code:
Coursc Title: tion

S m b e r

Question Solution %.
Number

Cybeoc amen -
|&) c) A Glcbal peospective on
tn ausbalia, CybeoCaime har anarsOW statutooy
as u6ed in Cybes oime Act gOo1, whic
meanin9
detacls 38enses against omput er datag yotems
To the Counil ag Furpe% (CoES) Cyber (oime
treaty» CyberCoine rs use as an umbel la tesm
to degeo to an array og corminal actvity includin
Henses againt computer datag aytems,Conpuet
selated ozens%, Content genses g Copyoig6t
Bzen6eg .
Explanaion g sgnigcant developnea
Unit I
eDvolved fn
3) a) The 2oltowing phanes planning
cybescime :
y Beconal ssane (rngormation gatheoin9) iG the
34t phase g toeated as pasSAre atacka

-Eaplanatior
a) SeanNng g Scoutini3tn9 the gathered
gor the Valtdzy
ingormatron
g fnzormation as to BM
tdent3y the eaistrnq Valne abilities
-Faplanation
) Launhinq an attacK
System access) Aetire atacks. 3M
Fxplanatten

PES College of Engineering-Mandya-571401


fse Title: Course Code:

Marks
estion

Marks Mumber

)SoCcal enginee oin


Solution

Fs the technie to inguuence


Allocated

and * Pessuasion to deCetve" People to obtatn


the tn2Tmatton os pesgon some actton.
Classrzication sSoccal
cal Engineeoiog i
Humarn based socal Engneering to

Pesson-to -pes40n fnteraction to get oequused


Jngemation. Explanation with example.
Computeo based Sotal Ergneeing-t oego to
atempt ade to get the gequted fdest oed
in goomatton by ustng confuteo sogtware) Ioteonet.
Ezplanatiorn with exple.

Cybes cage and Cybescoines


3))
feb Q004, Nrelsern Susrey on the pogile 3
fo Lndia, it as tthat AD.
Cyber cages zound
audience acso8A erghbt CCtes g35OO Cagek
Were gale
ttough alonost ovet
Nese graduates g Post graduates
S07. Nese tudento. Hence eatoermy important 3
IT
to undestant
Keuorty gorernane Practiced
Cyber Cages.
CyberCoimes such as
ubseauent 3auddent stealiog bank pA 88NOTds
withdacist 3 money have
also bappened tsouugh yberages. Iodian
tozormation teahnolegy Act (ITA)soo0 does not
degine ybeocages inteopsets ybescages as 6
l" netwodk ervice Provrdes 8" Degersed to undes
esst Nbile Section 14, Which imposed on them a
espon &i bilkty gor "due diligence" giig
Eaplanation
PES College of Engineering-Mandya-571401
i t i e :

Course Title: Course Code:


Question

Question | Numb

Number
Solution
4)

4) 4) Steganogvapby + It ts a that meang


Sheltesed Woibing". tt is a method thal atempta
to hide existence O a message or Conmunication.
The wosd Comes grom & Geek WOds
stegano6 meaning "Coresed"
grapheln yeaning "to Noite"Ahal means "loncealed
|stege Media Explanatorn

SRgkey 1Cover edia Mesage


pasNord lcanes to hide

Cover medium +fnbedded


message +Steqokey- stego yediung
tig h a) tHow
DOS att ack6 Stganograpsy
In thi8 CoTminal
act, the attackey
Aoodo the bandirdtb ViCtims netwosk 0 gills
bis E-Mail box with Spam mail depivin
Beorices he is entttled tO
o access poovide,
The attakes8
typcaly taaget sites or seVIces
hosted on
hrgh pooile web serress sulh as bank<
Coedt casd payment gateNayo, mobile phone nNs,
Fzlanaien -
DDos attabs - Io DDOs
attack, an attacker ay
use yous computer to attack anothe Compute.
4 DDOS attacK
distoibuted tos wherern a
large umbes Zombie 3
to attack a pgotiudao &yste
Iaplantion -

PES College of Engineering-Mandya-571407


rurse
Titla: Course (ode:

Marks Question,
Number
Solution
Marks
Allocated

) b)
1) Boot sectos
) Poogram Vrouses
) Muutipastte yiouses
) stealth rouses
5) peyoophic Viu6es
9Macoo YiTu&es
I) Acive x g Tara contool.
above -
- Eaplanatton ealch o3

the tradtronal techniques o Attacss


4) ) Nireleg& netnoaks

2)

spoogng
3) Denial o Service ( Dos)
4) Man -in- the- middle -attack (MITM)
) Encayphen Coachn9
Eapein each oz the abore
qM

Unit -1V
Countermeasuses fonclude :
5)) phihing
I) 7eep astiviou6 up to cate 9) Do not Click on
hypeoliks in E- mals a) Tase advantage aoti
Kpam ó1 4) Veoi24 htps (554) 5) Vee ati-spyaE
Soztwaoe 6) 6et educated ) Use the MicoO 6ot
baseline secuoity analyges (MESA) s) Freall
4) Use backup 6ystem images. l) Do not enter Bensitie
grnanCial in20 înto pop-up indows. w) secur host
ile. i) footect agAinst DwS. -Fxplain g woite
ron aboy
PES COMege of Engitcerig Nencajya-571-i01
auestio
Numb
Course Title: Coursc Code:

Question
Number Solution Marks
5) b) 19Pes g Allocated
) Deceptire phiatsing
phicbing Cams
) Malwae based
)
5) Ir teylog3gess
csion
sien bijacting
4) Se8Si0n

T)
phavming phiahing 5) Web Toojans
$) Syótem veconzguTation attaks
) Data thezt
i)ontent fngetion phitiching
) Man.- 5n- middle
de -phishing ) Seasch ehgine
) SSL phsshin,
ceoticate
Explatn any phishing above

5) )| Types g Tdertity thegt s


9 Finant l rdentrty the2t
2) Coinnin
al fdentity thegt
s)
4)
tdenttty clong
Busi ness tdentity tegt
s) medical tdentity the3t
) Synayetc zdentity t9egt
4) Child pdentity
Hezt.
-Fzplanation

qM

PES College of Engineering-Mandya-571401


Course Title: Course Code:

Mtaerksd Question
Number Solution
Marks
Allocated

UnitI
6)a) lstostcal bacsqound o; cybeagooen stC6
Compute (6 ec theo the subject tool object
to Conmit
Cybescoímes Od i8 Used as a
a cybeoCoime, The ea iest gecosded computeo
when Studeot
Coimes occused
at Various UniveTsifid.
pootestos buoned Computess
ATound 6ame time, people ace6& to
methods zo gaining unauthoiged intouBid
lazge time shared Coputeos. Computer
& aud comnited ith belp oz ComputeE Neae
as a neu
Ziost Coimes to be
idely recog"zed
type o3 Coine.
Eaplantion-Ern detacl -

6) 5)|The zoen&ics kge ceycle torolres the


Phases : geltowrng
) Poepasation & Tdertizicatton
2) Colection g Recosdig
9 Storig toan spooting
9 Examination | nvesti getion
) Anaysis, intespoetation f attribution
Reposting ) testi2ying
The pocena iyolves actiyities:
goltooing
1> prepaoe : Caoe boiegingqs, enggeent tesms
) Beosd:Dotve (maging. indeaing
poogilng
Tavestigate: Toiage toages, data decovey,iteaate
4) Repoot: oral ghuoittern, Case log
5)
oottng.
Te«tizy Testimony pepaation, testi hony.
:
Eplain above airities !

PES College of Engineering-Mandya-571401


(ourse (ode:
Course Titte:

Question
Solution Matks
Number Allocated
6) ) Diqital 20enkic3 zocEKS

1. TAerti?ication |
Ppazntion
" 7ecgnige incideot Y
9. Seasch nd
6. Heporting Toolh techniqueg
Summazije
1rantate
" Sea ch WaDDants
" Autor zatton *Pecogni evderce
" Collect evidene
" Explaln
-ConclusionA

Digital eviderce
docummentation
5. Aratyais 3. poesesvation
"Setes mine
Secuse evidence -5M
Signigicance
"Beconstruct pootect the
graments
C data h Eaam: ntion fregrity
evrdence.
Doaw
Concusions
"Qupkrate
evidence

" RecoYo data

g6) fooces yodet go undessetanding a Seugure


and
handkng Zoven BiCa eydence egal fsamtnok
Fxplanation

PES College of Engineering Mandya-571401

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy