0% found this document useful (0 votes)
7 views9 pages

Betck105i QB

The document outlines a course titled 'Introduction to Cyber Security' with a focus on cybercrime, its definitions, classifications, and various offenses. It includes course outcomes, suggested learning resources, and a comprehensive question bank divided into modules covering topics such as cyber offenses, tools and methods used in cybercrime, phishing, and identity theft. The course aims to equip students with knowledge about cybercrime terminologies, analysis of cyber offenses, and the importance of computer forensics.

Uploaded by

shreevardhanr52
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
7 views9 pages

Betck105i QB

The document outlines a course titled 'Introduction to Cyber Security' with a focus on cybercrime, its definitions, classifications, and various offenses. It includes course outcomes, suggested learning resources, and a comprehensive question bank divided into modules covering topics such as cyber offenses, tools and methods used in cybercrime, phishing, and identity theft. The course aims to equip students with knowledge about cybercrime terminologies, analysis of cyber offenses, and the importance of computer forensics.

Uploaded by

shreevardhanr52
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 9

Course Title: Introduction to Cyber Security

Subject Code BETCK105I/205I CIE Marks 50


Teaching 3-0-0-0 SEE Marks 50
Hours/Week (L: Total Marks 100
T: P: S) Total hours of Pedagogy 40
Credits 03 Exam Hours 03

CREDITS - 03

Course outcomes
CO1: Interpret the cybercrime terminologies
CO2: Analyze Cyber offenses and Botnets
CO3: Illustrate Tools and Methods used on Cybercrime
CO4: Analyze Phishing and Identity Theft
CO5: Justify the need of computer forensics

Suggested Learning Resources-Books:

1. Sunit Belapure and Nina Godbole, “Cyber Security: Understanding Cyber Crimes, Computer Forensics And Legal
Perspectives”, Wiley India Pvt Ltd, ISBN: 978-81- 265-21791, 2011, First Edition (Reprinted 2018)

Web links and Video Lectures (e-Resources):


QUESTION BANK

Sl. Questions Marks Year of CO BT


No. appearin g

Module-1 Cybercrime: Definition and Origins of the Word, Cybercrime and Information Security, Who are
Cybercriminals? Classifications of Cybercrimes, An Indian Perspective, Hacking and Indian Laws., Global Perspectives
Textbook:1 Chapter 1 (1.1 to 1.5, 1.7-1.9)

Topic: Introduction

1. Explain the following 08M Model CO1 L2


 Cyberspace Question
 Cyberpunk
 Cyberwarfare
 Cyber squatting
 Cyber terrorism
Topic: Definition and Origins of the Word,

2. Define cybercrime, discuss the origin of 06M Model CO1 L2


Cybercrime. Question
3. Explain the two types of Attacks in Cyber security. 06M Model CO1 L2
Question

Topic: Cybercrime and Information Security,


4. Write a short note on cybercrime and information security 06M Model CO1 L2
Question
5. Explain the Botnet Menace with diagram 06M Model CO2 L2
Question
6. What are the major types of Incidents occurring in the 06M Model CO1 L2
computer environment Question
Topic: Who are Cybercriminals?
7. Who are cybercriminals? explain in detail. 06M Model C01 L3
Question

Topic: Classifications of Cybercrimes,


8. Explain the classification of cybercrime in a 06M Model CO1 L2
narrow sense and broad sense with examples. Question

9. Explain the classification of cybercrime Against 06M Model CO1 L2


Individual, property, organization, society and Question
crimes emanating from Usenet newsgroups.
10. Discuss about the classification of 08M Model CO1 L2
cybercrime. What are the different types of Question
cybercrime towards an individual?
11. Explain the following crimes with examples 06M Model CO1 L2
a) Email Spoofing Question
b) Phishing
c) Spamming
d) Cyberdefamation
e) Cyber Stalking and Harassment.
f) Computer Sabotage
g) Pornographic offenses
h) Password Sniffing
i) Identity Theft
12. Discuss the following crimes with examples 10M Model CO1 L2
a) Hacking Question
b) Industrial Espionage
c) DoS attack
d) Email Bomb
e) Virus attack and dissemination of
viruses
f) Salami Attack
g) Logic Bomb
h) Industrial Espionage (Trojan Horse)
i) Data Diddling
j) Crimes Emanating from Usenet
Newsgroups

13. Explain the following crimes against property with examples 06M Model CO1 L2
 Software Piracy Question
 Computer Network Intrusion Online
 Fraud
 Internet Time Theft
 IP crimes

14. Explain the following crimes against Society 06M Model CO1 L2
 Forgery Question
 Cyberterrorism
 Web Jacking
15. Discuss the concept of pornography offences and child 08M Model CO2 L2
pornography and explain the steps involved Question
in pedophiles operations.
16. What is the main purpose of hacking, explain hacking with 09M Model CO1 L2
examples Question

17. Explain Spamming, mention its types, 08M Model CO1 L2


Question
Topic: An Indian Perspective, Hacking and Indian Laws.,
Global Perspectives
18. Explain the Indian perspective of Cybercrime. 08M Model C01 L2
Question
19. What are the hacking and Indian laws present on 08M Model C01 L2
Question
cyber crimes

20. Explain cybercrime and the Indian ITA 2000 08M Model C01 L2
Question
21. Discuss a global perspective on cyber crime 08M Model CO1 L2
Question
22. Write a short note on cybercrime and the extended Enterprise 08M Model CO1 L2
Question
23. Write the difference between Crime and Fraud 08M Model CO1 L2
Question
Sl. No Questions Marks Year of CO BT
appearin g

Module 2: Cyber Offenses: How Criminals Plan them Introduction, How criminals plan the attacks, Social
Engineering, Cyber Stalking, Cybercafe & cybercrimes, Botnets: The fuel for cybercrime,
Attack Vector. Chapter 2 (2.1 to 2.7)

Topic: 2.1. Introduction,


1. Explain the following terminologies? 06M Model CO2 L2
I. Hacker Question
II. Brute Force Hacking
III. Cracker
IV. Cracker tools
V. Phreaking
VI. War dialer
2. With neat sample network, explain the categories of vulnerabilities 06M Model CO2 L2
that hackers typically search Question

3. Explain the Four different hat concept in cyber security? 06M Model CO2 L2
Question

Topic: 2.2. How criminals plan the attacks,


4. How are cybercrimes classified? Explain with examples.OR 06M Model CO2 L2
Explain the categories of cybercrime? Question

5. Explain the difference between passive and active attacks. 10M Model CO2 L2
Provide examples. Question

6. Explain in details Ports and Ports scanning in cyber offenses. 06M Model CO2 L2
Question

Topic: 2.3. Social Engineering,

7. What is social engineering? Explain with example. 04M Model CO2 L2


Question
8. Explain the classification of social engineering with examples. 08M Model CO2 L2
Question
Topic: 2.4. Cyber Stalking,

9. What is cyberstalking? As per your understanding is it a crime 06M Model CO2 L2


under the Indian IT act? Question

10. Explain types of Stalkers 06M Model CO2 L2


Question
11. Explain the steps of how stalking works? 08M Model CO2 L2
Question
12. Explain the Real-life Incident of Cyberstalking? 06M Model CO2 L2
Question
Topic: 2.5. Cybercafe & cybercrimes.

13. How cybercafes are creating the paths for 08M Model C02 L2
cybercrimes? Question
14. Discuss the safety and security measures while using the computer 08M Model C02 L2
in a cybercafe? Question

Topic: 2.6. Botnets: The fuel for cybercrime, 08M Model CO2 L2
2.7. Attack Vector Question

15. Explain how Botnets can be used as fuel to 08M Model CO2 L2
cybercrime. Question

16. Explain with neat diagram how Botnets create 08M Model CO2 L2
business and used for gainful purpose. Question

17. What are the different attacks launched with attack vector. 08M Model CO2 L2
Explain Question

18. Explain the Zero-Day Attack? 08M Model CO2 L2


Question

Module 3:
Tools and Methods used in Cybercrime: Introduction, Proxy Servers, Anonymizers, Phishing, Password Cracking, Key
Loggers and Spy wares, Virus and Worms, Trozen Horses and Backdoors,
Steganography, DoS and DDOS Attacks, Attacks on Wireless networks.
Topic: 3.1. Introduction,

1. Discuss the different forms of attacks through which attacker target 08M Model CO3 L2
the computer system. Question

2. Explain the following i) Scareware, ii) Malvertising, iii). 08M Model CO3 L2
Clickjacking, iv). Ransomware Question

Topic: 3.2 Proxy Servers, and Anonymizers,


3. Discuss the proxy server and Anonymizers in the cyber 06M Model CO3 L2
security Question

4. List the difference between proxy server and 06M Model CO3 L2
anonymizer? Question

5. Discuss the following: Google Cookie, Cookie, 08M


DoubleClick and G-Zapper.

Topic: 3.3. Phishing,


6. Explain the Phishing, with examples and discuss the step how it 06M Model CO3 L2
works? Question
Topic: 3.4. Password Cracking,
7. What are the different ways of password cracking? 10M Model CO3 L2
Question
Topic: 3.5 Key Loggers and Spy wares,
8. How can keyloggers can be used to commit a 08M Model CO3 L2
cybercrime? Question
OR
Explain the following i) Software keyloggers, ii)
Hardware keyloggers, iii) Antikeylogger and Spywares
Topic: 3.6 Virus and Worms,
9. Discuss the concept of Virus and worms. How 08M Model CO3 L2
criminals use these tools for the attack. Question
10. Discuss the difference between virus and a worm 08M Model CO3 L2
Question
11. Explain the concept of virus hoax? 05M Model CO3 L2
Question
Topic: 3.7 Trozen Horses and Backdoors,
12. Discuss the difference between Trozen Horses and 05M Model CO3 L2
Backdoors? Question
Topic: 3.8 Steganography,
13. Elaborate the steganography and Steganalysis? How criminals 06M Model CO3 L2
use these methods? Question

14. Discuss the steganography and Cryptography. 04M Model CO3 L2


Question
15. Are countermeasures employed against 06M Model CO3 L2
steganography? explain. Question
Topic: 3.9 DoS and DDOS Attacks,
16. Discuss the difference between DoS and DDoS attack. 06M Model CO3 L2
Question
17. Explain and list the classification of DoS attacks 07M Model CO3 L2
Question
18. Discuss Types or levels of DoS attacks 08M Model CO3 L2
Question
19. Discuss the tools used to launch DoS attack. 05M Model CO3 L2
Question
Topic: 3.10 Attacks on Wireless networks
20. Discuss the different types of mobile workers? 05M Model CO3 L2
Question
21. What are the different components of wireless 06M Model CO3 L2
network? Question
22. what is the difference between WEP and WPA2? 04M Model CO3 L2
Question
23. Discuss the traditional techniques of attacks on Wireless 07M Model CO3 L2
network? ** Question
24. What is the difference between WAPkitting and 05M Model CO3 L2
WAPjacking? Question
25. How to secure the Wireless network? 06M Model CO3 L2
Question
26. Discuss the theft Internet hours and Wi-Fi based 06M Model CO3 L2
Frauds and Misuses. Question

Module 4

Phishing and Identity Theft: Introduction, methods of phishing, phishing, phishing techniques, spear phishing, types of
phishing scams, phishing toolkits and spy phishing, counter measures,
Identity Theft Textbook:1 Chapter 5 (5.1. to 5.3)
Topic: 4.1. Introduction,

1. Explain the functions of Anti-phishing Working Group 04M Model CO4 L2


Question
2. Explain the statistics that prove phishing is a dangerous enemy 05M Model CO4 L2
among all the methods/techniques. Question

Topic: 4.2 Phishing, 4.2.1 Methods of phishing,


3. What is Phishing? Explain with examples. 06M Model CO4 L2
Question
4. a). Define the term Phishing with respect to Wikipedia, Webopedia 04M Model CO4 L2
and TechEncyclopedia. Question
b). Differentiate between Spam and Hoax mails 05M
5. i). What are the different methods of Phishing attacks? Explain in 08M Model CO4 L2
details. Question
OR
Explain four types of methods used by the phishers to reveal
personal information on Internet 10M

ii) Explain the following attack against the legitimate website.


a) Website Spoofing
b) XSS-Cross site Scripting
c) XSRF- Cross scripting Request Forgery

Topic: 4.2.2. Phishing techniques,


6. Discuss the different Phishing techniques? OR 06M Model CO4 L2
Question
Discuss the various techniques used by Phishers to launch 10M
Phishing attacks

Topic: 4.2.3 spear phishing


7. What is spear Phishing? Explain with examples. 06M Model CO4 L2
Question
8. What is Whaling? Explain the difference between Whaling and 06M Model CO4 L2
Spear Phishing. Question

Topic: 4.2.4 types of phishing scams

9. Explain the different types of Phishing scams. OR 10M Model CO4 L2


Discuss various types of Phishing Scams. Question

Topic: 4.2.5 phishing toolkits and spy phishing,

10. Explain Phishing Toolkits with examples. 06M Model CO4 L2


Question
Topic: 4.2.6 Phishing counter measures
11. What are countermeasures to prevent malicious 06M Model CO4 L2
attacks. Question
12. Explain the flowchart of Phishing attacks. 06M Model CO4 L2
Question
Topic: 4.3 Identity Theft
13. What is identity theft? Explain with examples. 08M Model CO4 L2
Question
14. How can information be classified? 06M Model CO4 L2
Question
15. What are the different techniques of Identity theft? 08M Model CO4 L2
Question
16. What are the different types of Identity theft? 08M/ Model CO4 L2
10M Question
17. How to prevent being a victim of Identity theft? 06M Model CO4 L2
Question

Module 5: Understanding Computer Forensics


• Introduction, Historical Background of Cyberforensics, Digital Forensics Science, Need for
Computer Forensics, Cyber Forensics and Digital Evidence, Digital Forensic Life cycle, Chain of Custody
Concepts, network forensics
Topic: 5.1. Introduction,

Topic: 5.2 Historical Background of Cyberforensics


1. Discuss the Historical Background of Cyberforensics 06M Model CO5 L2
Question
Topic: 5.3 Digital Forensics Science

2. Is there a difference between computer security and computer forensics? 06M Model CO5 L2
Explain Question
Topic: Digital Forensics Investigation and E-Discovery

3. List various Computer Forensics services available, explain any two 06M Model CO5 L2
of them. Question
Topic: 5.4 Need for Computer Forensics
4. Discuss the need for concept of Computer Forensics 06M Model CO5 L2
Question
Topic: 5.5 Cyber Forensics and Digital Evidence

5. Discuss the Cyber Forensics and Digital Evidence 10M Model CO5 L2
Question
6. Explain the rules of evidence. 10M Model CO5 L2
Question
Topic: 5.6 Forensic Analysis of Email
7. Briefly explain RFC2822 04M Model CO5 L2
Question
Topic: 5.7 Digital Forensic Life cycle,
5.7.1 The Digital Forensic Process

8. With neat diagram explain process model for 10M Model CO5 L2
understanding a seizure and handling of forensics Question
evidence legal framework.
5.7.2 The Phases in computer Forensics/Digital Forensics
9. Discuss the following phases of Forensics life cycles 10M Model CO5 L2
i) Preparation and Identification Question
ii) Collection and Recording
10. Discuss the following phases of Forensics life cycle 10M Model CO5 L2
i) Storing and Transporting Question
ii) Examination/Investigation
11. Discuss the precautions to be taken when collecting electronic evidence. 10M Model CO5 L2
Question
5.8 Chain of Custody Concepts,
12. Explain the importance of chain of custody concept. Provide 08M Model CO5 L2
illustrations to support the answer Question
Topic: 5.9 network forensics
13. Briefly explain Network Forensics 04M Model CO5 L2
Question

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy