You are on page 1of 2

MODULE-I

PART-1

1. a) Define Cyber-Security and illustrate some categories in it?(7M)


b) What is the importance of Cyber Security?(7M)
2. a) Discuss common methods uses to threaten Cyber-Security?(10M)
b) Explain in detail about Air India data breach?(4M)
3. a) Define End-User Protection in detail?(6M)
b) List all cyber safety tips to protect from Cyber-Attacks?(8M)
4. Explain in detail about Layers of Security with a neat diagram?(14M)

PART-2

5. a) Define Internet Governance?(4M)


b) Analyze Internet Governance with few challenges and constraints?(10M)
6. a) Explain in detail about types of computer criminals?(7M)
b) List few motives of attackers?(7M)
7. a) Explain briefly about types of Active Attacks?(7M)
b) List all the Software Attacks?(7M)
8. Describe comprehensive cyber security policy?(14M)

MODULE-II

PART-1

1. Discuss in detail about Cyber Security Regulations?(14M)


2. a) Define International Law and mention some laws in it?(7M)
b) What are the roles of International Law?(7M)
3. Explain about National Cyber Security Policy?(14M)
4. a) Describe historical background of Cyber Forensics?(7M)
b) Discuss about types of Computer Forensics?(7M)

PART-2

5. a) Define Computer Forensics?(4M)


b) Explain challenges in Computer Forensics?(10M)
6. Illustrate forensic analysis of E-Mail?(14M)
7. a) Define Cyber Forensics?(4M)
b) Describe types of investigations in Forensics?(10M)
8. Explain the special techniques for Forensic Auditing?(14M)

MODULE-III

PART-1

1. a) Explain Trends in Mobility with a neat diagram?(6M)


b) Write briefly about Popular types of attacks against 4G mobile networks?(8M)
2. a) Summarize Proliferation of Mobile and Wireless Devices with a neat diagram?(7M)
b) List types of Mobile Computers?(7M)
3. Describe the credit card frauds in mobile and wireless computing era with neat diagram?(14M)

PART-2

4. a) What are the Security Challenges Posed by Mobile Devices?(9M)


b) Discuss in detail about Registry Settings for Mobile Devices?(5M)
5. Describe the attacks on Mobile/Cell Phones?(14M)
6. Explain Operating Guidelines for Implementing Mobile Device Security Policies?(14M)

MODULE-IV

PART-1

1. Define Cost of Cybercrimes and IPR issues?(14M)


2. Discuss Web Threats for Organizations?(14M)
3. a) List the reasons why organizations use social media marketing?(7M)
b) Write about tools used by organizations for social media marketing?(7M)
4. a) Define Social Computing?(4M)
b) List the Challenges for Organizations?(10M)

PART-2

5. a) Describe Cyber Crime and Cyber Terrorism?(7M)


b) Summarize Intellectual Property in the Cyberspace?(7M)
6. Discuss the Ethical Dimension of Cybercrimes?(14M)
7. a) Describe the Mindset of Hackers?(4M)
b) List the Skills of Cyber Criminals?(10M)

MODULE-IV

PART-1

1. Analyze the five fundamental concepts of Data Privacy?(14M)


2. a) Define Data Privacy?(5M)
b) List some Data Privacy Challenges or Attacks?(9M)
3. a) What is Data Linking and Profiling?(6M)
b) Illustrate Privacy Policies and their Specifications?(8M)
4. a) Define Privacy Policy Language?(3M)
b) List all Privacy Policy Languages that you know?(11M)

PART-2

5. a) Discuss Privacy in different Domains?(10M)


b) Explain in detail about Sim Swap Fraud?(4M)
6. a) List any three E-Mail spoofing instances?(10M)
b) Explain Screen Sharing or Remote Access Fraud?(4M)
7. a) Explain about any intellectual property crime that you know?(10M)
b) Discuss about QR Code Scams?(4M)

You might also like