Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
45 views2 pages

ICS Assignment 1

The document outlines an assignment for B.Tech. students in the Introduction to Cyber Security course, detailing various topics related to cybercrime, information security, and mobile security. It includes questions on the impact of cybercrime, insider threats, identity theft, legal consequences, and the significance of penetration testing. Additionally, it addresses mobile security challenges and the role of emerging technologies like AI in cybersecurity.

Uploaded by

d24amtics082
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
45 views2 pages

ICS Assignment 1

The document outlines an assignment for B.Tech. students in the Introduction to Cyber Security course, detailing various topics related to cybercrime, information security, and mobile security. It includes questions on the impact of cybercrime, insider threats, identity theft, legal consequences, and the significance of penetration testing. Additionally, it addresses mobile security challenges and the role of emerging technologies like AI in cybersecurity.

Uploaded by

d24amtics082
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

Asha M.

Tarsadia Institute of Computer Science and Technology


Computer Science & Engineering Department
B.Tech. 2nd Year 4th Sem

Subject Name with Code: Introduction to Cyber Security (CY4002)


Subject Teacher: Dipesh Shahane
Academic Year: 2025 - 26
Assignment 1 Date:
1 Define cybercrime and explain its impact on individuals, businesses, and
governments.
2 What are the major threats to information security in the modern digital
world?
3 Explain how insider threats contribute to cybercrimes. Provide examples.
4 Differentiate between hackers, crackers, and script kiddies in the context
of cybercrime.
5 What is identity theft? Discuss various techniques used in identity theft
and their impact.
6 What are financial frauds in cyberspace? Discuss online banking frauds
and credit card frauds.
7 Discuss the legal consequences of hacking and data breaches under
international cyber laws.
8 What are the challenges in enforcing cyber laws globally?
9 Compare India’s cyber laws with those of the USA and European Union.
10 What steps should governments take to strengthen global cybersecurity?
11 Differentiate between cyber offences and cybercrimes with examples.
12 What are the key stages in the planning of a cyber attack?
13 Discuss the significance of penetration testing in identifying attack
vulnerabilities.
14 Define social engineering and explain how it is used in cyber attacks.
15 What is cyberstalking, and how does it differ from traditional stalking?
16 What is an attack vector, and why is it crucial in cybersecurity?
17 Define cybercrime and categorize it based on the nature of the offence.
18 Explain the importance of encryption in cloud security.
19 Discuss the role of ethical hacking in preventing cybercrimes.
20 Discuss the significance of penetration testing in identifying attack
vulnerabilities.
21 Discuss the factors contributing to the rapid proliferation of mobile and
wireless devices in recent years.
22 Explain the concept of mobile edge computing and its significance in
modern computing.
23 Discuss the role of artificial intelligence and machine learning in detecting
and preventing mobile-based credit card fraud.
Asha M. Tarsadia Institute of Computer Science and Technology
Computer Science & Engineering Department
B.Tech. 2nd Year 4th Sem

24 What are the primary security threats associated with mobile devices?
25 Discuss the security challenges of Bring Your Own Device (BYOD)
policies in organizations.
26 Compare different mobile authentication methods and their security
implications.
27 Discuss various types of cyberattacks targeting mobile phones.
28 How do mobile security threats affect organizations and their data?
29 Explain the importance of Mobile Device Management (MDM) solutions
in securing organizational mobile infrastructure.
30 Discuss the key components of an effective organizational mobile security
policy.

NOTE: Submit Assignment before Submission date.


Submission Date:

You might also like