0% found this document useful (0 votes)
2 views

Assignment 3 BCC-401

This document outlines an assignment for the B.Tech AIML program at Galgotias College, focusing on Cyber Security for the 4th semester. It includes a list of problems related to various cyber security topics such as Steganography, computer viruses, phishing, and SQL injection. Each problem is mapped to specific course outcomes and Bloom's Knowledge Levels for assessment purposes.

Uploaded by

gamerpurrple.1
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
2 views

Assignment 3 BCC-401

This document outlines an assignment for the B.Tech AIML program at Galgotias College, focusing on Cyber Security for the 4th semester. It includes a list of problems related to various cyber security topics such as Steganography, computer viruses, phishing, and SQL injection. Each problem is mapped to specific course outcomes and Bloom's Knowledge Levels for assessment purposes.

Uploaded by

gamerpurrple.1
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 1

GCET/IQAC/QN-01

Galgotias College of Engineering & Technology, Greater Noida


Department of AIML
Assignment-3 (Unit 3)
(Even Semester, 2024-25)

Programme: B.Tech AIML Semester: 4th Section: AIML

Course Code: BCC-401 Course Title: Cyber Security


Date: 28-05-25 Date of Submission: 2-06-25

S.N. Problem CO, KL Mapping

1. Write about Steganography with applications. CO3, K2

2. Differentiate between computer Virus and Worms with two examples each. CO3, K1

3. Explain Phishing, Vishing and Smishing in detail. CO3, K2

4. Explain about Trojan Horses and Backdoors in detail with examples. CO3, K2

5. What is SQL injection. How to prevent SQL Injection Attacks? CO3, K2

6. What is buffer overflow? Discuss how to minimize Buffer Overflow? CO3, K1

7. Discuss in detail about identity theft (ID theft). What are the different types
of identity thefts?
CO3, K2

8. Write short notes on CO3, K2

Proxy Servers and Anonymizers

Password Cracking, Key loggers

Spyware

DoS and DDoS Attacks

CO – Course outcomes mapped with respective question.


KL- Bloom’s Knowledge Level (K1, K2, K3, K4, K5, K6)
K1 – Remember K2 – Understand K3 – Apply K4 – Analyze K5 – Evaluate K6– Create

You might also like