Betck105i QB
Betck105i QB
CREDITS - 03
Course outcomes
CO1: Interpret the cybercrime terminologies
CO2: Analyze Cyber offenses and Botnets
CO3: Illustrate Tools and Methods used on Cybercrime
CO4: Analyze Phishing and Identity Theft
CO5: Justify the need of computer forensics
1. Sunit Belapure and Nina Godbole, “Cyber Security: Understanding Cyber Crimes, Computer Forensics And Legal
Perspectives”, Wiley India Pvt Ltd, ISBN: 978-81- 265-21791, 2011, First Edition (Reprinted 2018)
Module-1 Cybercrime: Definition and Origins of the Word, Cybercrime and Information Security, Who are
Cybercriminals? Classifications of Cybercrimes, An Indian Perspective, Hacking and Indian Laws., Global Perspectives
Textbook:1 Chapter 1 (1.1 to 1.5, 1.7-1.9)
Topic: Introduction
13. Explain the following crimes against property with examples 06M Model CO1 L2
Software Piracy Question
Computer Network Intrusion Online
Fraud
Internet Time Theft
IP crimes
14. Explain the following crimes against Society 06M Model CO1 L2
Forgery Question
Cyberterrorism
Web Jacking
15. Discuss the concept of pornography offences and child 08M Model CO2 L2
pornography and explain the steps involved Question
in pedophiles operations.
16. What is the main purpose of hacking, explain hacking with 09M Model CO1 L2
examples Question
20. Explain cybercrime and the Indian ITA 2000 08M Model C01 L2
Question
21. Discuss a global perspective on cyber crime 08M Model CO1 L2
Question
22. Write a short note on cybercrime and the extended Enterprise 08M Model CO1 L2
Question
23. Write the difference between Crime and Fraud 08M Model CO1 L2
Question
Sl. No Questions Marks Year of CO BT
appearin g
Module 2: Cyber Offenses: How Criminals Plan them Introduction, How criminals plan the attacks, Social
Engineering, Cyber Stalking, Cybercafe & cybercrimes, Botnets: The fuel for cybercrime,
Attack Vector. Chapter 2 (2.1 to 2.7)
3. Explain the Four different hat concept in cyber security? 06M Model CO2 L2
Question
5. Explain the difference between passive and active attacks. 10M Model CO2 L2
Provide examples. Question
6. Explain in details Ports and Ports scanning in cyber offenses. 06M Model CO2 L2
Question
13. How cybercafes are creating the paths for 08M Model C02 L2
cybercrimes? Question
14. Discuss the safety and security measures while using the computer 08M Model C02 L2
in a cybercafe? Question
Topic: 2.6. Botnets: The fuel for cybercrime, 08M Model CO2 L2
2.7. Attack Vector Question
15. Explain how Botnets can be used as fuel to 08M Model CO2 L2
cybercrime. Question
16. Explain with neat diagram how Botnets create 08M Model CO2 L2
business and used for gainful purpose. Question
17. What are the different attacks launched with attack vector. 08M Model CO2 L2
Explain Question
Module 3:
Tools and Methods used in Cybercrime: Introduction, Proxy Servers, Anonymizers, Phishing, Password Cracking, Key
Loggers and Spy wares, Virus and Worms, Trozen Horses and Backdoors,
Steganography, DoS and DDOS Attacks, Attacks on Wireless networks.
Topic: 3.1. Introduction,
1. Discuss the different forms of attacks through which attacker target 08M Model CO3 L2
the computer system. Question
2. Explain the following i) Scareware, ii) Malvertising, iii). 08M Model CO3 L2
Clickjacking, iv). Ransomware Question
4. List the difference between proxy server and 06M Model CO3 L2
anonymizer? Question
Module 4
Phishing and Identity Theft: Introduction, methods of phishing, phishing, phishing techniques, spear phishing, types of
phishing scams, phishing toolkits and spy phishing, counter measures,
Identity Theft Textbook:1 Chapter 5 (5.1. to 5.3)
Topic: 4.1. Introduction,
2. Is there a difference between computer security and computer forensics? 06M Model CO5 L2
Explain Question
Topic: Digital Forensics Investigation and E-Discovery
3. List various Computer Forensics services available, explain any two 06M Model CO5 L2
of them. Question
Topic: 5.4 Need for Computer Forensics
4. Discuss the need for concept of Computer Forensics 06M Model CO5 L2
Question
Topic: 5.5 Cyber Forensics and Digital Evidence
5. Discuss the Cyber Forensics and Digital Evidence 10M Model CO5 L2
Question
6. Explain the rules of evidence. 10M Model CO5 L2
Question
Topic: 5.6 Forensic Analysis of Email
7. Briefly explain RFC2822 04M Model CO5 L2
Question
Topic: 5.7 Digital Forensic Life cycle,
5.7.1 The Digital Forensic Process
8. With neat diagram explain process model for 10M Model CO5 L2
understanding a seizure and handling of forensics Question
evidence legal framework.
5.7.2 The Phases in computer Forensics/Digital Forensics
9. Discuss the following phases of Forensics life cycles 10M Model CO5 L2
i) Preparation and Identification Question
ii) Collection and Recording
10. Discuss the following phases of Forensics life cycle 10M Model CO5 L2
i) Storing and Transporting Question
ii) Examination/Investigation
11. Discuss the precautions to be taken when collecting electronic evidence. 10M Model CO5 L2
Question
5.8 Chain of Custody Concepts,
12. Explain the importance of chain of custody concept. Provide 08M Model CO5 L2
illustrations to support the answer Question
Topic: 5.9 network forensics
13. Briefly explain Network Forensics 04M Model CO5 L2
Question