See Old Question Paper
See Old Question Paper
1
P'aqe
U.S.N
The
CO:Students
Course Oteomes
will be able lo:
Explan the
CO2: Describe (vbervbercrime teandrminologies,
(O3: Ilusirate Tools offenses
nd Botnets.
C04: Expluin Phishing and Metbods sed on Cvbercrime.
CO3: JUstifv the need of ldentity Thef.
coputer
Note: ) PART- A is compulsory. forensics.
Tw0 marks for each queslon.
) AKT- B: Answer ay Two sub aupstiong (foma bc) for uMuxium of 18 marks fromeach iml!.
Q. No. Marks BLs COs POs
Questions
I: PART - A 10
la. Whoare cyber criminals? LI CO| PO1
b. Define Botnet and attack vectors. LI CO2 PO1
c. List the different ways of password cracking attacks. 2 LI CO3 PO1
d. Differentiate between spam and hoax E-mails. 2 L2 CO4 PO1
e. What is the need for computer forensics? 2 LI CO5 PO1
II: PART -B 90
UNIT - I 18
2a. Briefly explain the classification of cyber crime. L2 CO1 POI
b. Write a note on industrial spying or industrial espionage, hacking and
9 LI CO1 PO4
online frauds.
Write a note on global perspective on cyber crime. LI CO1 POS
UNIT - II 18
3a. Explain how criminals plan the attacks? L2 CO2 POI
Contd...2
P22ETC1057
UNIT- V
18
cyber forensics,
6a. Describe the historicalbackground of 9
12 Co,
b Explain the various phases and activities involved in the lifecycle of a
forensics investigation process with examples. L2. CO5 w
c. Explain the process model for understanding aseizure and handling of
forensic evidence legal framework. L2
COS
ge N
P.E.S. COLLEGE OF ENGINEERING
MANDYA - 571401, KARNATAKA
PO (An Autonomous Institution Affliated to VTU, Belagavi)
Scheme and
Solution Scrutinizer Name :
Signature:
Vina
Course Title: TntsoduCtion to Cyter Secuotty Course Code: PaaETCIO5 7
Question Marks
Number
Solution |Allocated
PABT - A
Cybescot me in volves SUCh activities a6 Child
4) )
Ponegraphyi coedet card graud; Cyberstalhing:
dezaming anotBer onlioe iganing unautooiged acceas
to conpites yatems: ignoarog oyrgbl, soae
kcenbing trade rask proYection ; OVeviding enaYPhioy
to make
iltegal copiee : scgtuaoe przay stealing
anotteo'% idertity to Pergosm coiminal acts.
CybesCoiminals qre those who conduct Buch acts.
They ae catyidintothree frops.
9 Type I :ybeocoiminals - byngry 2o ecognition.
2) TYPe :Cybescoiminala - not inteoEsted in oecegpition BM
) TYPe I: Cyber (oiminas- the insideos.
Question
Question
Solution N u m b e r
Number Al.
PAST B
Unrt -I
a) a) (ybeocoimeK
) ybesC3:me against individual -> Fonall spoogig.
Phishing Spamming yberdegomaton. yber otaltig-3
Conputer sabotage, passcod soi29ing. prnogaphic
BIenAe. Explanation
) ybes caime aginst Paqpesty Coedit casd gaaud
Iotellectual propesty Csimes Ioternet tine
tezt.
3) Cybesco ime against ganigation passnord
Soiig. Unauthoonged accesing gcorputer,
Visus attack. Data didding, LogiC bomb SIN pizay
H)
Cybeocaime aqinst soGety forgy, web -
Course Code:
Coursc Title: tion
S m b e r
Question Solution %.
Number
Cybeoc amen -
|&) c) A Glcbal peospective on
tn ausbalia, CybeoCaime har anarsOW statutooy
as u6ed in Cybes oime Act gOo1, whic
meanin9
detacls 38enses against omput er datag yotems
To the Counil ag Furpe% (CoES) Cyber (oime
treaty» CyberCoine rs use as an umbel la tesm
to degeo to an array og corminal actvity includin
Henses againt computer datag aytems,Conpuet
selated ozens%, Content genses g Copyoig6t
Bzen6eg .
Explanaion g sgnigcant developnea
Unit I
eDvolved fn
3) a) The 2oltowing phanes planning
cybescime :
y Beconal ssane (rngormation gatheoin9) iG the
34t phase g toeated as pasSAre atacka
-Eaplanatior
a) SeanNng g Scoutini3tn9 the gathered
gor the Valtdzy
ingormatron
g fnzormation as to BM
tdent3y the eaistrnq Valne abilities
-Faplanation
) Launhinq an attacK
System access) Aetire atacks. 3M
Fxplanatten
Marks
estion
Marks Mumber
Question | Numb
Number
Solution
4)
Marks Question,
Number
Solution
Marks
Allocated
) b)
1) Boot sectos
) Poogram Vrouses
) Muutipastte yiouses
) stealth rouses
5) peyoophic Viu6es
9Macoo YiTu&es
I) Acive x g Tara contool.
above -
- Eaplanatton ealch o3
2)
spoogng
3) Denial o Service ( Dos)
4) Man -in- the- middle -attack (MITM)
) Encayphen Coachn9
Eapein each oz the abore
qM
Unit -1V
Countermeasuses fonclude :
5)) phihing
I) 7eep astiviou6 up to cate 9) Do not Click on
hypeoliks in E- mals a) Tase advantage aoti
Kpam ó1 4) Veoi24 htps (554) 5) Vee ati-spyaE
Soztwaoe 6) 6et educated ) Use the MicoO 6ot
baseline secuoity analyges (MESA) s) Freall
4) Use backup 6ystem images. l) Do not enter Bensitie
grnanCial in20 înto pop-up indows. w) secur host
ile. i) footect agAinst DwS. -Fxplain g woite
ron aboy
PES COMege of Engitcerig Nencajya-571-i01
auestio
Numb
Course Title: Coursc Code:
Question
Number Solution Marks
5) b) 19Pes g Allocated
) Deceptire phiatsing
phicbing Cams
) Malwae based
)
5) Ir teylog3gess
csion
sien bijacting
4) Se8Si0n
T)
phavming phiahing 5) Web Toojans
$) Syótem veconzguTation attaks
) Data thezt
i)ontent fngetion phitiching
) Man.- 5n- middle
de -phishing ) Seasch ehgine
) SSL phsshin,
ceoticate
Explatn any phishing above
qM
Mtaerksd Question
Number Solution
Marks
Allocated
UnitI
6)a) lstostcal bacsqound o; cybeagooen stC6
Compute (6 ec theo the subject tool object
to Conmit
Cybescoímes Od i8 Used as a
a cybeoCoime, The ea iest gecosded computeo
when Studeot
Coimes occused
at Various UniveTsifid.
pootestos buoned Computess
ATound 6ame time, people ace6& to
methods zo gaining unauthoiged intouBid
lazge time shared Coputeos. Computer
& aud comnited ith belp oz ComputeE Neae
as a neu
Ziost Coimes to be
idely recog"zed
type o3 Coine.
Eaplantion-Ern detacl -
Question
Solution Matks
Number Allocated
6) ) Diqital 20enkic3 zocEKS
1. TAerti?ication |
Ppazntion
" 7ecgnige incideot Y
9. Seasch nd
6. Heporting Toolh techniqueg
Summazije
1rantate
" Sea ch WaDDants
" Autor zatton *Pecogni evderce
" Collect evidene
" Explaln
-ConclusionA
Digital eviderce
docummentation
5. Aratyais 3. poesesvation
"Setes mine
Secuse evidence -5M
Signigicance
"Beconstruct pootect the
graments
C data h Eaam: ntion fregrity
evrdence.
Doaw
Concusions
"Qupkrate
evidence