0% found this document useful (0 votes)
6 views7 pages

CSL Ques

The document outlines a comprehensive curriculum on Cyber Security and Laws, covering various modules that include the classification of cybercrimes, methods used by cybercriminals, and security challenges associated with mobile devices. It also discusses tools and techniques for cyber attacks, the importance of cyber law in India, and details on the Indian IT Act. Additionally, it addresses information security standards and compliance requirements for various regulations.

Uploaded by

MIHIR THAKUR
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
6 views7 pages

CSL Ques

The document outlines a comprehensive curriculum on Cyber Security and Laws, covering various modules that include the classification of cybercrimes, methods used by cybercriminals, and security challenges associated with mobile devices. It also discusses tools and techniques for cyber attacks, the importance of cyber law in India, and details on the Indian IT Act. Additionally, it addresses information security standards and compliance requirements for various regulations.

Uploaded by

MIHIR THAKUR
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 7

Cyber Security

& Laws
(Importance)
MODULE 1 - Introduction to Cybercrime.

-------------------------------------------------------------
• Explain classification of cybercrimes with examples.

• What is Cybercrime? Who are Cybercriminals? Explain.


MODULE 2 - Cyber offenses & Cybercrime.

-------------------------------------------------------------
• Explain how criminals plan the attack.

• Explain various security challenges posed by mobile devices.

• What are botnets? How it is exploit by attacker to cause cyber-attack?

• What are different Security Risks for organization.

• What are illegal activities observed in Cyber Cafe? What are safety and security

measures while using the computer in Cyber Cafe?


MODULE 3 - Tools and Methods Used in Cyber line.

-------------------------------------------------------------
• Explain Phishing and Identity theft in detail.
• Explain different buffer overflow attacks also explain how to migrate buffer
overflow attack.
• What do you understand by DOS and DDOS attack? Explain in detail.
• Explain SQL injection attack. State different countermeasures to prevent the
attack.
• List general guidelines for password policies.
• Difference between Virus and Worm.
• Short note on Steganography.
• Short note on Trojan horse and backdoor.
MODULE 4 – The Concept of Cyberspace.

-------------------------------------------------------------
• Explain need of Cyber law in India.
• Explain E-contracts and it's different types.
• Write a note on Intellectual Property Aspects in Cyber law.
• Explain the term evidence and different types of evidences.
• What is e-commerce? Discuss types of e-commerce.
• What is digital evidence? Where one can find it.
• What are basic security precautions to be taken to safeguard Laptops and
Wireless devices? Explain.
• Explain electronic banking in India and what are laws related to electronic
banking in India.
MODULE 5 – Indian IT Act.

-------------------------------------------------------------
• Explain the objectives and features of IT Act 2000.
MODULE 6 - Information Security Standard compliances.

-------------------------------------------------------------
• Write key IT requirements for SOX and HIPPAA.

• Short Note On - SOX, GLBA, HIPPA, ISO, FISMA, PCI.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy