SEE
SEE
USN 1 M S
(Autonomous Institute, Affiliated to VTU)
UNIT - I
1. a) How do we classify cybercrimes? Explain each one briefly. CO1 (08)
b) Explain in your own words what you understand about the global CO2 (06)
cooperation required in fighting against cybercrime.
c) How do viruses get disseminated? Also differentiate cyber fraud and CO1 (06)
cyber crime.
2. a) Differentiate between Techno crime and techno Vandalism with example CO2 (06)
for each.
b) Write a short note on Indian legal perspective on cybercrime. CO1 (06)
c) Illustrate the following cybercrimes with example for each: CO1 (08)
i. Cyber defamation
ii. Internet time theft
iii. Data diddling
iv. Industrial Espionage.
UNIT - II
3. a) Discuss patriot hacking? CO2 (06)
b) With the help of example explain Cyberstalking, Social Engineering and (06)
CO2
Cybercafe.
c) Define a Passive and Active attacks? Discuss how Criminals Plan the (08)
CO2
Attacks.
4. a) Describe the social engineering crime along with an example. CO2 (06)
b) Define Botnet and attack vector. CO2 (06)
c) Discuss how criminals plan the attacks explain briefly. CO2 (08)
UNIT - III
5. a) With an example explain based on attacks of Trojan Horses. CO3 (10)
b) Discuss DoS attack and DDos attack with example. CO3 (10)
UNIT- IV
7. a) Illustrate the following phishing scams with example for each: CO4 (08)
i. Man-in-the-middle Phishing
ii. Search engine Phishing
iii. Pharming
iv. Malware-based Phishing
b) Describe Personally Identifiable Information (PII). Also list the elements CO5 (06)
fraudster would attempt to steal.
c) What can an organisation do to protect against phishing emails? Explain. CO4 (06)
Page 2 of 2
ETC146/ETC246
8. a) Discuss different types of Identity thefts with example for each. CO5 (08)
UNIT-V
9. a) Discuss computer forensics of email. CO5 (06)
b) Explain the different phases in computer forensics. CO5 (10)
c) Discuss the importance of chain of custody. CO5 (04)
********************************
Page 2 of 2