What is Cyber Security? Discuss Vulnerabilities of the Internet.
[7 marks]Discuss following Term: 1. World Wide Web. 2. Cybercrime.
[7 marks]Discuss Types of Antivirus Software and Deep Web.
[7 marks]Explain how Attackers used Tunnelling Techniques and Fraud Techniques for Attack.
[7 marks]Explain Smashing and Vishing Attackers Techniques also discuss Differences between them.
[7 marks]Discuss short note on Botnets.
Explain Integer Overflow Vulnerabilities.
[7 marks]Explain Malicious PDF Files also Discuss how Creating Malicious PDF Files.
[7 marks]What is Race Conditions? Explain the Examples of Race Conditions.
[7 marks]Give the details of: Web Exploit Tools.
[7 marks]Explain Worms and Viruses for Malicious Code.
[7 marks]Discuss Dark Web Presence by Terrorist.
[7 marks]What is Digital Forensics? Goals of Digital Forensic Analysis.
[7 marks]Discuss how host windows for forensics Platform.
[7 marks]Explain file System Abstraction Model.
[7 marks]Explain Redundant Array of Inexpensive Disks.
[7 marks]Short note on following Windows file System: 1. FAT 2. NTFS
[7 marks]