Define E-mail spoofing and Password Sniffing.
[3 marks]Explain Darknet and Dark Markets in detail.
[4 marks]Explain Indian ITA 2000 in detail.
[7 marks]Define Software piracy.
[3 marks]What can be the survival mantra for Netizens?
[4 marks]Explain network-based firewalls in detail.
[7 marks]Explain IP-Table in detail.
Explain Mobile OS security and privacy issues in brief.
[7 marks]Explain Icefloor in brief.
[3 marks]Discuss advantages and disadvantages of firewall.
[4 marks]Differentiate Host based and Network based firewall in detail.
[7 marks]Define vulnerabilities in OS.
[3 marks]What is penetration testing?
[4 marks]Define cybercrime and extended enterprise.
[3 marks]Explain about Network Isolation.
[4 marks]Explain about Network attacks in detail.
[7 marks]Define Wi-Fi weaknesses.
[3 marks]Differentiate Authentication and Authorization.
[4 marks]List and explain Authentication methods in brief.
[7 marks]Define social engineering in context with cybercrime.
[3 marks]Explain types of security attacks.
[4 marks]Explain Symmetric and Asymmetric encryption and decryption.
[7 marks]What should be the requirements of next generation antivirus.
[3 marks]What do you mean by cyber criminals?
[4 marks]Explain program threats and system threats in brief.
[7 marks]