Explain the followings: 1. Malware 2. Root kits 3. Juice Jacking 4. Adware and Spyware 5. Antivirus 6. Trojan 7. Anonymous Networks
[7 marks]What is Social Engineering? Explain it in detail
[7 marks]Explain Types of Attacks
[7 marks]Explain virus, worms and Trojan Horses in detail
[7 marks]Explain types of computer security risks.
[7 marks]1. What is Digital forensics? 2. Digital Signature
What is Tor Network? Explain I2P Network, Freenet and Darknet
[7 marks]Explain Cloud storage security and IOT security
[7 marks]Explain Anonymous OS in detail
[7 marks]Give Difference Between Digital Signatures and Electronic Signatures
[7 marks]Explain Cryptographic Functions, Cryptographic Types.
[7 marks]Explain VPN, Proxy Server in detail
[7 marks]Explain term :1. Network Forensics 2. Mobile Forensics
[7 marks]Explain Multitask Encryption Tools
[7 marks]Discuss Digital Forensic Advanced Tools
[7 marks]Explain Hacking and Cracking in detail with example
[7 marks]Discuss Cyber Crime Investigation Tools
[7 marks]