What is Cyber Security? Discuss Internet and Cyberspace.
[7 marks]Discuss following Term: 1. Cyberbullying. 2. Cryptocurrency.
[7 marks]Discuss Advantages of Antivirus Software.
[7 marks]Explain phishing Technique with Mobile phone example.
[7 marks]Explain Mobile Malicious Code.
[7 marks]Discuss Techniques to Gain a Foothold – Shellcode.
[7 marks]Explain Stack-Based Buffer Overflows.
[7 marks]Explain SQL Injection for Cyber Security.
[7 marks]Give the detail of Self-Replicating Malicious Code.
[7 marks]What is Digital Forensics? Goals of Forensic Analysis.
[7 marks]Explain Disk and File System Analysis using windows.
[7 marks]Discuss Partitioning and Disk Layouts.
[7 marks]Discuss following Techniques: 1. Hashing. 2. Event Logs.
[7 marks]Discuss darknets and Botnets.
[7 marks]Explain Elevating Privileges and Registry of Windows.
[7 marks]Explain Dark Web and Fast-Flux.
[7 marks]Short note on: 1. Brute Force. 2. Windows File Systems.
[7 marks]