Explain the following the terms: 1. Buffer Overflow 2. Internet Time Theft 3. Chain of custody 4. Phishing 5. Cyber Defamation 6. Hacking 7. Password Sniffing
[7 marks]Explain classification of cybercrimes with example.
[7 marks]Explain RAS security for mobile devices in detail.
[7 marks]Explain attack vector and cloud computing.
[7 marks]What kind of cyber security measures an organization should have to take in case of portable storage devices? Prepare security guidelines for organization.
[7 marks]Explain Virus and worms, Trojan Horses and Backdoors.
[7 marks]List and explain traditional techniques of attacks on wireless networks.
[7 marks]Explain most frequent methods used by the phishers.
[7 marks]Explain the need for cyber laws in India.
[7 marks]Explain weak Areas of the ITA 2000.
[7 marks]Explain the punishments given with respect to cybercrime in India.
[7 marks]What are different types of Identify Theft?
[7 marks]Explain proxy servers and anonymizer
[7 marks]Explain the following terms: a. Cell Seizure b. Forensics Card Reader
[7 marks]Explain Forensics Auditing and Anti forensics.
[7 marks]What is computer Forensics? Discuss challenges in Computer Forensics.
[7 marks]Compare digital forensics and Network forensics.
[7 marks]