0% found this document useful (0 votes)
100 views5 pages

Cyber Security All Unit Important

cyber security

Uploaded by

singhnutan16nov
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
100 views5 pages

Cyber Security All Unit Important

cyber security

Uploaded by

singhnutan16nov
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 5

Cyber Security Important Question 2023-24

(RRSIMT CLASSES)
Unit 1 – Introduction to Cyber Crime
1. What is definition of cyber crime. Prevention & Challenges of cyber
crime.(V.IMP)
2. Explain Origin of word “cyber crime”.
3. What is information Security. Discuss Security mechanism used to
provide security.(V.IMP)
4. Who are cybercriminals ? Explain their types.
5. What are different classification of cybercrime With diagram.(V.IMP)
6. Write a short note on : A global Perspective on Cyber Crime.
7. Discuss the survival mantra for Netizens Explain All 5P in details.
8. What do you understand by Cyber Offense ? Explain hackers, Crackers
& Phreakers.
9. Explain the term “Social Engineering” in Cyber Crime.
10.What do you understand by Cyber Stalking & its types.(V.IMP)
11.Write a short note on : Botnets. Discuss Fuel of cyber crime.(V.IMP)
12.What do you mean by Attack vector. Write some common attack
vectors.
13.Write a short note on :(VV.IMP)
(i) Cyber Terrorism
(ii) Cyber Warfare
(iii) Cyber Stalking
(iv) Cyber vandalism
(v) Cyber Squatting
(vi) IPR Crime
(vii) Phishing
(viii) Spoofing
(ix) Hacking & Types of hackers
14.What is Malware. Explain different types of malware
Cyber Security Important Question 2023-24

(RRSIMT CLASSES)

Unit – 2 Cyber Crime

1. Explain the rising importance of mobile and wireless device.


2. Write short note on :
(i) Wireless Computing
(ii) Mobile Computing
(iii) PDAs(Personal Digital Assistants
(iv) Hand – Held Devices
3. Discuss the present trends in mobility. What are mobility types and it’s implications?
4. Discuss the popular types of attacks against 3G Mobile network?
5. Discuss Credit card Frauds in mobile and wireless Computing era. Give some tips to prevent
Credit card Frauds.
6. What are different types and techniques of credit card Frauds ?
7. Explain the security challenges posed by Mobile Devices to cyber security?
8. What is the registry settings ?
9. Write a short note on registry settings for wireless mobile powdered device.
10. What do you understand by Authentication service policy ? Discuss the types of attacks to
which mobile devices are subjected to.
11. Discuss Cryptography Security challenges for mobile devices.
12. Describe the various types of attacks against mobile cell phones.
13. What are the various security implications (Problem) for organization related to mobile
devices?
14. Discuss what organization can do towards safeguarding their information in the mobile
computing Paradigm(illustrate).
15. Discuss the importance of security policy relating to mobile computing devices.
16. What are different ways to create policy for mobile devices?
Cyber Security Important Question 2023-24

(RRSIMT CLASSES)

Unit – 3 Tools and Methods used in cyber crime

1. Explain Briefly “Proxy Server”.


2. Explain Briefly “Anonymizer”.
3. What is Phishing. How Phishing Works explain?
4. What do you understand by Password Cracking & Explain it’s types & Purposes.
5. What do you understand by Keyloggers.
6. What do you mean by Spyware
7. Difference between Keyloggers and Spyware.
8. What is Computer Virus and List various types of virus.
9. Difference between Worms and Viruses.
10. What do you mean by Trojen Explain in detail.
11. What do you mean by “Backdoors” give its function.
12. Difference between Trojen horse and Backdoors.
13. Write a short note on : “Steganography and Steganalysis.
14. Difference between Steganography and Cryptography
15. What do you understand by DoS Attack and Write its types.
16. What is Distributed Denial of service (DDoS) attack.
17. Difference between DoS and DDoS attack.
18. What is SQL injection how attacker planned for it.
19. What is Blind SQL injection.
20. What is buffer overflow attack? How to minimize buffer overflow attack.
21. What are different components of Wireless network
22. Discuss some traditional technique of attacks on wireless network.
23. What is identity (ID) theft and types of identity theft .
24. Write a short note on :
(i) Proxy Server
(ii) Anonymizer
(iii) DoS Attack
(iv) DDoS attack
Cyber Security important Question 2023-24
(RRSIMT CLASSES)
Unit – 4
Understanding Computer Forensics
1. What do you understand by Cyber Forensic/Digital
forensic/Computer forensic ?
2. What is digital forensic ? Explain the role of digital forensics ?
3. Difference between Cyber forensic and digital forensic.
4. What is the need of Computer forensic ?
5. What is “Chain of custody” Concept. Explain its importance.
6. What do you understand by Digital evidence? Compare
Physical evidence and digital evidence.
7. Write a short note on Cryptography(Unit 3)
8. Write a short note on ‘Rule of evidence’.
9. What do you understand by Forensic analysis of email ?
Discuss Various approaches are used in analysis of email.
10. Write a short note on Digital forensic process/Digital
forensic life cycle.
11. Write a short note on Network forensic.
12. What are the things to be avoided during a computer
forensic investigation ? What are the things can’t be avoided ?
13. What is a “Social networking sites” ? what are the
security threats that can emenate from social network site ?
14. What are technical challenges associated with computer
forensic ?
Cyber Security Important Question 2023-24

(RRSIMT CLASSES)

Unit – 5 Introduction to Security Policy and Cyber Law

1. What is information security policy ? Why Policy important?.


2. What is indian cyber law and it’s primary objectives?
3. What are the rights of individuals and organization Under Indian cyber law?
4. What are the latest developments in Indian cyber law ?
5. What is DPDP(Digital personal data protection) Act 2023 ? Discuss its main objectives ?
6. What are the rights given to individuals by DPDP act ? Also mention the obligations imposed
on organization by DPDP Act?
7. What is Intellectual Property (IP)? What are the different types of Intellectual Property?
8. Provide example of common intellectual property issue that individuals and organization may
face.
9. What is Patent (2 Mark)
10. What is Copyright (2 Mark)
11. What is Trademark? What are the requirements for registering a trademark?
12. What is Patent? What are the requirements for obtaining a patent?
13. What is Copyright ? What are the requirements for obtaining a copyright ?

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy