Discuss the legal implications of Hacking under the IT Act, 2000.
[3 marks]Explain various types of attack on computer system?
[4 marks]Explain the potential pieces of evidence that exists in cell phone along with the methodology to collect and handle them with suitable example.
[7 marks]Explain Digital Signatures with example.
[3 marks]Explain Ethical issues in AI and core principles.
[4 marks]What is the need of Cyber Regulation and also explain Ethics in Information society.
[7 marks]List and explain E – Commerce threats with example.
[7 marks]How can encryption be used to enhance the security of mobile devices?
[3 marks]What are the common types of threats that antivirus software should be able to detect and mitigate?
[4 marks]Explain the concept of Encryption and Decryption in the context of cryptographic algorithms.
[7 marks]What is multi–factor authentication (MFA), and why it is important for mobile device security.
[3 marks]Explain a Man-in-the-Middle attack and how it can impact online transaction.
[4 marks]List and explain Digital payments related common frauds and also discuss the preventive measures for the same.
[7 marks]Explain following term: 1) Confidentiality 2) Integrity 3) Availability
[3 marks]Explain Digital Forensics? Mention the nature of special properties of digital evidence in comparison to physical evidence.
[4 marks]Describe the best practices for performing data backups on mobile devices.
[7 marks]Explain following term: 1) Anti-virus 2) Firewall 3) Unified Payment Interface (UPI)
[3 marks]What are the common security vulnerabilities associated with Wi-Fi networks, and how can they be mitigated?
[4 marks]How often security patches be should applies to mobile phones, and why is patch management important.
[7 marks]Explain following term: 1) Attack Vectors 2) Cyberspace 3) Criminal Behavior
[3 marks]Define and explain Hacking and its types.
[4 marks]What are the risks associated with third-party software on mobile phones, and how can be managed?
[7 marks]What are the best practices for setting up a secure Wi-Fi network at home or in an office?
[3 marks]How can users ensure their mobile devices are protected from unauthorized access and malware?
[4 marks]Discuss the security features commonly associated with banking cards. -------
[7 marks]