Answer all the questions below. 1. Who can be a Cyber criminal? List down their categories. [1] 2. What is the functionality of an anonymizer? [1] 3. Differentiate Steganography and Cryptography. [2] 4. Define Spyware and keylogger. [1] 5. What is backdoor attack? Give two examples of backdoor Trojans.[2]
[7 marks]Define Cyber crime. What are the various types of Cyber crimes? Write about Cyber defamation, Pornographic offenses and Industrial espionage.
[7 marks]What are the phases of cybercrime planning? Differentiate Passive and Active attacks.
[7 marks]Write a short note on mobile/cell phone attacks.
[7 marks]What do you mean by Botnet? What are the various ways through which one can ensure for a secured system? Discuss.
[7 marks]Define virus. How are they different from worms? Explain different types of viruses.
[7 marks]What is identity theft? Explain different types of ID theft.
[7 marks]What do you mean by Phishing? What are the common ways, techniques to launch Phishing attacks? Explain.
[7 marks]Describe Social engineering and its classification.
[7 marks]Define digital forensics science. Explain the process model of Digital Forensics in the legal context.
[7 marks]What is the necessity of Cyber laws? Write about Indian IT Act and the few amendments in it.
[7 marks]Explain the steps taken by attackers for hacking networks with reference to OSI model.
[7 marks]Write short note on Forensics Auditing.
[7 marks]List down and explain the security issues associated with social networking sites.
[7 marks]Write about printer and scanner Forensics.
[7 marks]Briefly discuss about toolkits for hand-held device forensics.
[7 marks]Explain the challenges in Forensics of digital images and still camera?
[7 marks]