Define following:-
[7 marks]Piracy
[ marks]Hactivism
[ marks]Anonymity
[ marks]Trade Secret
[ marks]Script Kiddies
[ marks]Masquerade
[ marks]vulnerabilities
[ marks](i) Explain Difference between Anonymity and Multiple Identities and Pseudonymity (ii) Explain difference between Interception and Interruption
[4 marks]What do you mean by Hackers? Explain Methodology of Hackers.
[7 marks]What is Information Security? Explain Security Goals in detail.
[7 marks](i)Explain Packet sniffer with example. (ii) Explain Classification of Hackers.
[3 marks]List out Security Policies. Explain any one in detail.
[7 marks]Explain SQL Injection in detail.
[7 marks]Explain Military Security Policy. Explain Chinese Wall Security Policy.
[7 marks]Explain Website Vulnerabilities.
[7 marks]Explain Characteristics of a Good Security Policy.
[7 marks](i) Explain Session Hijacking with example. (ii) Explain Computer related Privacy Problems.
[3 marks](i) Explain Man-in-the-Middle Attack. (ii) List Out Program Flaws.
[3 marks]Explain U.S.Privacy Laws
[7 marks]Compare Copyright, Patent and Trade Secret Protection.
[7 marks]What are the steps to Protect against Privacy Loss?
[7 marks]Explain Non-U.S.Piracy Principles.
[7 marks](i) Difference between active v/s passive attacks. (ii) Explain Trusted System.
[3 marks]