Explain the followings: 1. Malware 2. Ransom ware 3. Phishing 4. DOS Attack 5. Antivirus 6. Trojan 7. Spyware
[7 marks]What is attack? Explain different types of attacks in detail.
[7 marks]What is Social Engineering? How it’s done explain with example.
[7 marks]Write a short note on: I2P and TOR network.
[7 marks]Explain VPN and Proxy server with diagram.
[7 marks]What is Web browser privacy configuration? Explain with example.
[7 marks]What is Cryptography? Explain different cryptographic functions.
[7 marks]Write a note on cryptography key pair generation using gpg4win along with the step of installation.
[7 marks]Explain Cryptographic Systems Trust Models in details.
[7 marks]What is Digital Forensics? Write down different phases of digital forensics.
[7 marks]Explain Blocking and Non-Blocking Socket I/O
[7 marks]Write a short note on Mobile Forensics.
[7 marks]Explain Brute Force FTP.
[7 marks]Write a short note on EDRM Model.
[7 marks]Explain E-Mail Investigation and E-Mail Recovery
[7 marks]Write a short note on Digital Signature.
[7 marks]Explain the following: 1) White collar crimes 2) Mail Bombs 3) Software Piracy
[7 marks]