The document outlines two assignments for the course 'Introduction to Cyber Security' at Don Bosco Institute of Technology, detailing questions related to various cybercrime concepts and security measures. Each assignment includes a list of questions that students must answer, covering topics such as cybercrime terminologies, phishing, malware, and network attacks. The assignments aim to enhance students' understanding of cyber offenses, tools, and methods used in cybercrime.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0 ratings0% found this document useful (0 votes)
9 views
Assignments-I & II
The document outlines two assignments for the course 'Introduction to Cyber Security' at Don Bosco Institute of Technology, detailing questions related to various cybercrime concepts and security measures. Each assignment includes a list of questions that students must answer, covering topics such as cybercrime terminologies, phishing, malware, and network attacks. The assignments aim to enhance students' understanding of cyber offenses, tools, and methods used in cybercrime.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 2
Wayanamac Education Trust ®
DON BOSCO INSTITUTE OF TECHNOLOGY
Kumbalagodu, Mysore Road, Bengaluru – 560074 www.dbit.co.in Ph:+91-80-28437028/29/30 Fax:+91-80-28437031 Department of Electronics and Communication Engineering ASSIGNMENT –I
Course Name: Introduction to Cyber Security Course Code: BETCK205I
Semester: I, ‘C’sec Max marks: 25 Date of Given: 15/11/23 Date of Submission: 22/11/23
Note:- Answer all the questions.
Sl. Questions CO RBTL
No 1. Define Cybersquatting, Cyberpunk, Cyberwarfare, Cyberterrorism, Techno-crime, 1 1 Techno-vandalism and Web jacking. 2. What is Child Pornography? Describe how pedophiles operate. Mention the 1 2 precautions that can be taken to prevent child pornography. 3. How do you think Cybercrime has relevance in the extended enterprise context? 1 2 Explain. 4. Explain briefly about Ports and Ports Scanning in planning the criminal attacks. 2 2 5. Define Attack Vector. Describe how attack vectors are launched. Also explain Zero 2 2 day attack. 6. Define and discuss the following terms: 3 2 i) Scareware ii) Malvertising iii) Clickjacking iv) Ransomware. 7. List and describe the tools used to cover tracks. 3 2 8. Define Malware. Briefly describe the classifications of Malware. 3 2 9. What is P2P network? Describe the different levels of P2P network. Mention the 3 2 advantages and drawbacks of P2P networks. 10. Describe 3 P’s of Cybercrime, SPAMBOTS & CAN-SPAM ACT. 3 2 11. What is Geotagging? Describe the risks associated with Geotagging and how to 4 2 protect from Geotagging.
Students will be able to:
CO1: Explain the cybercrime terminologies. CO2: Describe Cyber offenses and Botnets. CO3: Illustrate Tools and Methods used on Cybercrime CO4: Explain Phishing and Identity Theft. Wayanamac Education Trust ® DON BOSCO INSTITUTE OF TECHNOLOGY Kumbalagodu, Mysore Road, Bengaluru – 560074 www.dbit.co.in Ph:+91-80-28437028/29/30 Fax:+91-80-28437031 Department of Electronics and Communication Engineering ASSIGNMENT –II
Course Name: Introduction to Cyber Security Course Code: BETCK105I
Semester: I, ‘C’sec Max marks: 25 Date of Given: 15/12/23 Date of Submission: 22/12/23
Note:- Answer all the questions.
Sl. Questions CO RBTL
No 1. Explain the basic stages of network attack? 3 2 2. What is Phishing? Explain how Phishing works. 3 2 3. Describe the classifications of Password Cracking. Also write a brief note on weak 3 2 password, strong password and random password. 4. Define Computer Virus. Explain how it spreads. Also mention the differences between 3 2 Computer Virus and Worm. 5. Write a brief note on Steganography and Steganalysis. 3 2 6. What is DoS attack? Explain the classifications of DoS attack. Also describe the tools 3 2 used to launch the DoS attack. 7. What is DDoS attack? Describe the tools used to launch DDoS attack. Explain how to 3 2 protect from DoS / DDoS attack. Also describe the tools available for detecting DoS/DDoS attacks. 8. Explain the different types of Mobile Workers. Define Wardriving, Warwalking, 3 2 Warbiking, Warkitting, WAPkitting, WAPjacking. 9. Explain briefly the components of Wireless Network and also traditional techniques of 3 2 attack on Wireless Network. 10. Describe how to secure the Wireless Networks. Also describe the tools available to 3 2 protect the Wireless Network.
Students will be able to:
CO3: Illustrate Tools and Methods used on Cybercrime.