Cyber Security Course File Aditi Goel
Cyber Security Course File Aditi Goel
30 CO Attainment Process
31 Attainment Sheet
32 Indirect Attainment (Course Exit Survey)
Institute Vision and Mission
Institute Vision:
To produce quality Engineers, Pharmacists, Scholars and Technocrats useful for the society
and having problem solving abilities towards the society and humanities..
Institute Mission:
1. To provide quality education and enhance skills of the students to make them
useful for the society and industries.
3. To enhance values and ethics among the students to produce socially responsible
Scholars and Technocrats.
Department Vision and Mission
Department Mission:
To promote technical proficiency by adopting effective teaching learning processes.
To provide environment & opportunity for students to bring out their inherent talents
for all round development.
To promote the latest technologies in Computer Science & Applications and across
disciplines in order to serve the needs of Industry, Government, Society, and the
Scientific community.
To educate students to be successful, ethical , effective problem-solvers and life-long
learners who will contribute positively to the society.
Program Outcomes (POs)
POs Statement
Engineering knowledge: Apply the knowledge of mathematics, science, engineering fundamentals, and an
PO1 engineering specialization to the solution of complex computer engineering problems.
Problem analysis: Identify, formulate, review research literature, and analyse complex computer engineering
PO2 problems reaching substantiated conclusions using first principles of mathematics, natural sciences, and
engineering sciences.
Design/development of solutions: Design solutions for complex computer engineering problems and design
PO3 system components or processes that meet the specific needs with appropriate considerations for the public
health and safety, and the cultural, societal, and environmental considerations.
Conduct investigations of complex problems: Use research-based knowledge and research methods including
PO4 design of experiments, analysis and interpretation of data, and synthesis of the information to provide
conclusions
Modern tool usage: Create, select, and apply appropriate techniques, resources, and modern engineering and IT
PO5 tools including prediction and modelling to complex engineering activities with an understanding of the
limitations
The engineer and society: Apply reasoning informed by the contextual knowledge to assess societal, health,
PO6 safety, legal and cultural issues and the consequent relevant to the professional engineering practices
Environment and sustainability: Understand the impact of the professional engineering solutions in societal
PO7 and environmental contexts, and demonstrate the knowledge of, and need for sustainable development
Ethics: Apply ethical principles and commit to professional ethics and responsibilities and norm of the
PO8 engineering practices
Individual and team work: Function effectively as an individual, and as a member or leader in diverse
PO9 teams, and in multidisciplinary settings
Communications: Communicate effectively on complex engineering activities with the engineering community
PO10 and with society at large, such as, being able to comprehend and write effective reports and design
documentation, make effective presentations, and give and receive clear instructions
Project management and finance: Demonstrate knowledge and understanding of the engineering and
PO11 management principles and apply these to one’s own work, as a member and leader in a team, to manage
projects and in multidisciplinary environments.
Life-long learning: Recognize the need for, and have the preparation and ability to engage in independent and
PO12 life learning in the broadest context of technological change.
Program Educational Objectives (PEOs)
Design applications for any desired needs with appropriate considerations for any specific need on
PSO1
societal and environmental aspects.
The students can select the suitable data model, appropriate architecture and platform to implement a
PSO2 system with good performance.
The students can design and integrate various system based components to provide user interactive
PS03 solutions for various challenges.
Target
Assumption of target
Percentage Pass: 100% Percentage I class: 100% Attainment level: ( 1 to 3)
Target achieved
Percentage Pass: Percentage I class: Attainment level: (1 to 3)
Remarks:
Signature of
Date: HOD-CSE
Proposed Course Completion Report (Before start of semester)
Sr. Completion
Unit Title Start Date
No. Date
1 I Introduction To Cybercrime
2 II Cyber Crime
Supplementary Provided
Types Yes/No Number of sheets
Tutorials YES 5
Assignment YES 5
Question Bank YES 100
Others(Surprise Test/Unit
YES 5
Test)
Remarks:
Signature of
Date: HOD-CSE
Syllabus
Topic Proposed
Unit Lecture
1. Weak students are identified based on previous semester result and all lateral
students added
2. This list further modified based on followings.
a. Class performance observed by faculty
b. Sessional performance CT-1
c. Sessional performance CT-II
3. The final weak students list created
Identify students
learning capability
based on previous
Semester Results,
Sessional Examinations,
and Laboratory
Performance
Extra classes
Remedial Classes
S.N
Roll No. Name
o.
1
2
3
External Marks
S. No. Roll No Name CGPA
(out of 100)
1
2
3
Impact Analysis of Weak Students
Write in detail about the marks scored by the students.
Course Plan (Unit-I)
Instructional Objectives:
On completion of this lesson the student shall be able to understand followings.
Cybercrime- Definition
Origins of the word Cybercrime
Information Security
Who are Cybercriminals?
Teaching Aids: White Board, LCD
TEACHING POINTS:
Cybercrime- Definition
Origins of the word Cybercrime
Information Security
Who are Cybercriminals?
Assignment / Questions
1. Define cybercrime. How did the term originate?
2. How is cybercrime different from traditional crime?
3. Explain the importance of information security in the digital age.
4. What are the key goals of information security (CIA Triad)?
5. How does cybercrime impact individuals, organizations, and nations?
6. Who can be considered a cybercriminal?
7. Explain the motivations behind cybercriminal activities.
8. Differentiate between hackers, crackers, and ethical hackers.
9. What roles do insiders and outsiders play in cybercrime?
Signature of Faculty
Subject : Cyber Security Subject Code :BCC-301
Unit No. : 1 Lecture No. : 2
Date : Title : Introduction
Instructional Objectives:
On completion of this lesson the student shall be able to understand followings.
Classifications of Cybercrimes
A Global Perspective on Cybercrimes
Cybercrime Era: Survival Mantra for the Netizens.
Teaching Aids: White Board, LCD
TEACHING POINTS:
Classifications of Cybercrimes
A Global Perspective on Cybercrimes
Cybercrime Era: Survival Mantra for the Netizens.
Assignment / Questions
1. Classify cybercrimes based on the target of the crime.
2. What is the difference between cyber-dependent and cyber-enabled crimes?
3. Explain the major categories of cybercrime with examples.
4. Write short notes on:
Cyber fraud
Identity theft
Cyberterrorism
Online defamation
5. Discuss how cybercrime is a global issue.
6. Explain how different countries are addressing cybercrime legislations.
7. What are some major international organizations fighting cybercrime?
8. Describe the challenges in cross-border cybercrime investigation.
9. What precautions should netizens take to avoid being victims of cybercrime?
10. Explain the concept of “digital hygiene” and its importance.
11. What is the role of awareness and education in combating cybercrime?
12. Suggest 5 practices every internet user should follow to stay safe online.
Signature of Faculty
Subject : Cyber Security Subject Code :BCC-301
Unit No. : 1 Lecture No. : 3
Date : Title : Introduction
Instructional Objectives:
On completion of this lesson the student shall be able to understand followings.
Cyber offenses: How Criminals Plan the Attacks
Social Engineering
Cyber stalking
Cybercafe
Cybercrimes
Teaching Aids: White Board, LCD
TEACHING POINTS:
Cyber offenses: How Criminals Plan the Attacks
Social Engineering
Cyber stalking
Cybercafe
Cybercrimes
Assignment / Questions
1. Describe the typical stages of a cyberattack.
2. What tools and techniques are used by cybercriminals to plan attacks?
3. Explain the role of reconnaissance in cyber offenses.
4. How does a criminal exploit vulnerabilities in systems?
5. What is social engineering? Provide real-life examples.
6. How do attackers use psychology in social engineering attacks?
7. Compare phishing, pretexting, baiting, and tailgating.
8. How can organizations defend against social engineering?
9. Define cyberstalking and its types.
10. What are the legal implications of cyberstalking?
11. What are the signs of being a victim of cyberstalking?
12. Discuss preventive and defensive measures against cyberstalking.
13. Why are cybercafés considered vulnerable spots for cybercrimes?
14. What regulations exist (or should exist) for cybercafés?
15. Give examples of crimes committed using cybercafés.
16. What steps can cybercafé owners take to prevent criminal misuse?
Signature of Faculty
Subject : Cyber Security Subject Code :BCC-301
Unit No. : 1 Lecture No. : 4
Date : Title : Introduction
Instructional Objectives:
On completion of this lesson the student shall be able to understand followings.
Botnets: The Fuel for Cybercrime
Attack Vector.
TEACHING POINTS:
Botnets: The Fuel for Cybercrime
Attack Vector.
Assignment / Questions
1. What is a botnet? How is it formed?
2. Explain how botnets are used in cyberattacks.
3. What are some famous botnet attacks in history?
4. How can systems be protected from becoming part of a botnet?
5. Define the term "attack vector."
6. Differentiate between threat, vulnerability, and attack vector.
7. What are common attack vectors used by cybercriminals?
8. How can attack vectors be identified and minimized?
Signature of Faculty
Subject : Cyber Security Subject Code :BCC-301
Unit No. : 2 Lecture No. : 5
Date : Title : Cyber crime
Instructional Objectives:
On completion of this lesson the student shall be able to understand followings.
Mobile and Wireless Devices-Introduction
Proliferation of Mobile
Wireless Devices
Trends in Mobility
TEACHING POINTS:
Mobile and Wireless Devices-Introduction
Proliferation of Mobile
Wireless Devices
Trends in Mobility
Assignment / Questions
1. What are mobile and wireless devices? Give examples.
2. Differentiate between mobile computing and wireless communication.
3. Explain the role of mobile devices in modern computing environments.
4. What are the reasons behind the rapid proliferation of mobile and wireless devices?
5. Discuss the impact of widespread mobile device adoption on personal and business communication.
6. How has the proliferation of mobile devices changed the way organizations function?
7. What are the current and emerging trends in mobility and mobile computing?
8. Explain the concept of BYOD (Bring Your Own Device) and its implications.
9. How is the Internet of Things (IoT) influencing trends in mobile computing?
Signature of Faculty
Subject : Cyber Security Subject Code :BCC-301
Unit No. : 2 Lecture No. : 6
Date : Title : Cyber Crime
Instructional Objectives:
On completion of this lesson the student shall be able to understand followings.
Credit Card Frauds in Mobile
Wireless Computing Era
Security Challenges Posed by Mobile Devices
TEACHING POINTS:
Credit Card Frauds in Mobile
Wireless Computing Era
Security Challenges Posed by Mobile Devices
Assignment / Questions
1. How are credit card frauds conducted using mobile and wireless platforms?
2. What are the common methods used by attackers to commit credit card fraud through mobile devices?
3. Discuss preventive measures against credit card fraud in mobile transactions.
4. What are the key security challenges associated with mobile devices?
5. How do mobile devices increase the attack surface for organizations?
6. Discuss the challenges in securing data on lost or stolen mobile devices.
Signature of Faculty
Subject : Cyber Security Subject Code :BCC-301
Unit No. : 2 Lecture No. : 7
Date : Title : Cyber Crime
Instructional Objectives:
On completion of this lesson the student shall be able to understand followings.
Registry Settings for Mobile Devices
Authentication Service Security
Attacks on Mobile/Cell Phones
TEACHING POINTS:
Registry Settings for Mobile Devices
Authentication Service Security
Attacks on Mobile/Cell Phones
Assignment / Questions
1. What are registry settings in mobile devices, and how do they impact security?
2. Explain how unauthorized modification of registry settings can be a security threat.
3. How can proper registry configurations enhance device security?
4. What are the different types of authentication methods used in mobile devices?
5. How does multi-factor authentication enhance mobile device security?
6. What are the limitations of biometric authentication in mobile environments?
7. What are the common types of attacks on mobile phones?
8. Explain how mobile malware and spyware function.
9. What is SIM swapping, and how does it compromise mobile security?
Signature of Faculty
Subject : Cyber Security Subject Code :BCC-301
Unit No. : 2 Lecture No. : 8
Date : Title : Cyber Crime
Instructional Objectives:
On completion of this lesson the student shall be able to understand followings.
Mobile Devices: Security Implications for organizations
Organizational Measures for Handling Mobile
Organizational Security Policies
Measures in Mobile Computing Era.
TEACHING POINTS:
Mobile Devices: Security Implications for organizations
Organizational Measures for Handling Mobile
Organizational Security Policies
Measures in Mobile Computing Era.
Assignment / Questions
1. How do mobile devices pose a risk to organizational information systems?
2. Discuss the security implications of employees accessing company data on personal mobile devices.
3. How can mobile devices be exploited to conduct corporate espionage?
4. What measures can organizations take to manage mobile device usage securely?
5. Explain the role of Mobile Device Management (MDM) systems.
6. How can organizations educate employees about secure mobile usage?
7. What should be included in an organizational mobile security policy?
8. How do mobile usage policies help prevent data breaches?
9. Discuss best practices for implementing a secure mobile computing strategy in an organization.
Signature of Faculty
Subject : Cyber Security Subject Code :BCC-301
Unit No. : 3 Lecture No. : 9
Date : Title : Cyber Crime
Instructional Objectives:
On completion of this lesson the student shall be able to understand followings.
TEACHING POINTS:
Requirement Engineering Process:
Introduction, Proxy Servers and Anonymizers
Phishing
Password Cracking
Assignment / Questions
1. What are the commonly used tools and methods in cybercrime?
2. How do cybercriminals exploit system vulnerabilities?
3. Why is it important to understand cybercrime tools for information security?
4. What is a proxy server? How is it used in cybercrime?
5. Explain the role of anonymizers in hiding cybercriminal identities.
6. How do proxy chains and VPNs aid in anonymous attacks?
7. What is phishing? Describe its working mechanism.
8. What are the types of phishing attacks (e.g., spear phishing, whaling)?
9. How can phishing attacks be identified and prevented?
10. What are the different password cracking techniques?
11. Compare dictionary attack vs brute-force attack.
12. What tools are commonly used for password cracking?
Signature of Faculty
Subject : Cyber Security Subject Code :BCC-301
Unit No. : 3 Lecture No. : 10
Date : Title : Cyber Crime
Instructional Objectives:
On completion of this lesson the student shall be able to understand followings.
TEACHING POINTS:
Requirement Engineering Process:
Keyloggers and Spywares
Virus and Worms
Trojan-horses and Backdoors
Steganography
Assignment / Questions
1. What is a keylogger and how does it operate?
2. How does spyware affect system confidentiality and integrity?
3. What are the methods for detecting and removing keyloggers?
4. Differentiate between a computer virus and a worm.
5. How do viruses spread across systems and networks?
6. What are the preventive strategies against worms and viruses?
7. What is a Trojan horse in cybercrime?
8. How do backdoors provide unauthorized access?
9. Explain with examples how Trojan horses are used in cyberattacks.
10. What is steganography and how is it different from cryptography?
11. How can images or audio files be used to hide data?
12. How is steganography used maliciously in cybercrime?
Signature of Faculty
Subject : Cyber Security Subject Code :BCC-301
Unit No. : 3 Lecture No. : 11
Date : Title : Cyber Crime
Instructional Objectives:
On completion of this lesson the student shall be able to understand followings.
DoS and DDoS At-tacks
SQL Injection
Buffer Overflow
Attacks on Wireless Networks
TEACHING POINTS:
DoS and DDoS At-tacks
SQL Injection
Buffer Overflow
Attacks on Wireless Networks
Assignment / Questions
1. What is the difference between DoS and DDoS attacks?
2. What are the symptoms of a DoS/DDoS attack on a server?
3. How can organizations mitigate the impact of DDoS attacks?
4. What is SQL injection? How does it compromise databases?
5. Provide examples of SQL injection statements.
6. What are the preventive measures against SQL injection?
7. What is a buffer overflow attack? Explain with an example.
8. How can buffer overflow lead to privilege escalation?
9. What programming practices help prevent buffer overflows?
10. What are the common threats to wireless networks (e.g., eavesdropping, MITM)?
11. Explain the concept of wardriving and WEP/WPA cracking.
12. How can wireless network security be enhanced?
Signature of Faculty
Subject : Cyber Security Subject Code :BCC-301
Unit No. : 3 Lecture No. : 12
Date : Title : Cyber Crime
Instructional Objectives:
On completion of this lesson the student shall be able to understand followings.
Phishing and Identity Theft
Introduction to Phishing
Identity Theft (ID Theft).
TEACHING POINTS:
Phishing and Identity Theft
Introduction to Phishing
Identity Theft (ID Theft).
Assignment / Questions
1. What are the psychological techniques used in phishing?
2. Why is phishing considered a social engineering attack?
3. How has phishing evolved in the mobile computing era?
4. What is identity theft and how does it occur?
5. What are the types of identity theft (e.g., financial, medical, criminal)?
6. How can individuals and organizations protect against identity theft?
7. How do tools like Trojans and keyloggers contribute to identity theft?
8. Compare phishing and spoofing in terms of technique and impact.
9. Why is user awareness important in preventing phishing and spyware attacks?
Signature of Faculty
Subject : Cyber Security Subject Code :BCC-301
Unit No. : 4 Lecture No. : 13
Date : Title : Cyber Crime
Instructional Objectives:
On completion of this lesson the student shall be able to understand followings.
Introduction
Digital Forensics Science
The Need for Computer Forensics
TEACHING POINTS:
Introduction
Digital Forensics Science
The Need for Computer Forensics
Assignment / Questions
1. What is digital forensics? How is it different from traditional forensics?
2. Explain the objectives and scope of digital forensics.
3. Why has digital forensics become essential in the modern era?
4. Define digital forensic science and its relevance in criminal investigations.
5. What are the branches or subfields of digital forensics?
6. Explain the scientific principles applied in digital forensics.
7. Why is computer forensics important in cybersecurity and legal investigations?
8. List and explain scenarios where computer forensics is required.
9. How does computer forensics help in incident response and threat analysis?
Signature of Faculty
Subject : Cyber Security Subject Code :BCC-301
Unit No. : 4 Lecture No. : 14
Date : Title : Cyber Crime
Instructional Objectives:
On completion of this lesson the student shall be able to understand followings.
Cyber forensics and Digital Evidence
Forensics Analysis of E-Mail
Digital Forensics Life Cycle
TEACHING POINTS:
Cyber forensics and Digital Evidence
Forensics Analysis of E-Mail
Digital Forensics Life Cycle
Assignment / Questions
1. What is cyber forensics, and how does it relate to digital evidence?
2. Define digital evidence. What are its types and sources?
3. What are the legal considerations and admissibility of digital evidence?
4. What is email forensics? What kind of crimes involve email as evidence?
5. Describe the process of analyzing email headers and metadata.
6. How can forged or spoofed emails be detected in forensics?
7. What are the phases of the digital forensics lifecycle?
8. Explain each phase: identification, acquisition, preservation, examination, analysis, reporting.
9. Why is proper documentation important at every stage?
Signature of Faculty
Subject : Cyber Security Subject Code :BCC-301
Unit No. : 4 Lecture No. : 15
Date : Title : Cyber Crime
Instructional Objectives:
On completion of this lesson the student shall be able to understand followings.
Network Forensics
TEACHING POINTS:
Chain of Custody Concept
Network Forensics
Assignment / Questions
1. What is the chain of custody in digital forensics?
2. Why is maintaining a proper chain of custody crucial for legal admissibility?
3. List the steps to maintain the integrity of evidence during its transfer.
4. Define network forensics and its applications.
5. What are the common tools and techniques used in network forensics?
6. How can network forensics help in detecting intrusions and malware activity?
7. What is the general approach to conducting a computer forensics investigation?
8. What steps are taken to preserve, examine, and analyze digital data?
9. What precautions must be taken to ensure evidence is not altered or destroyed?
Signature of Faculty
Subject : Cyber Security Subject Code :BCC-301
Unit No. : 4 Lecture No. : 16
Date : Title : Cyber Crime
Instructional Objectives:
On completion of this lesson the student shall be able to understand followings.
Forensics and Social Networking Sites
The Security/Privacy Threats
Challenges in Computer Forensics.
TEACHING POINTS:
Forensics and Social Networking Sites
The Security/Privacy Threats
Challenges in Computer Forensics.
Assignment / Questions
1. How do social networking sites pose challenges in digital forensics?
2. What types of digital evidence can be extracted from social media platforms?
3. Explain the privacy issues and legal implications of collecting data from social networks.
4. What are the technical challenges in modern computer forensics?
5. Discuss the legal and ethical issues involved in digital evidence collection.
6. How do encryption, cloud storage, and anti-forensics techniques complicate forensic investigations?
Signature of Faculty
Subject : Cyber Security Subject Code :BCC-301
Unit No. : 5 Lecture No. : 17
Date : Title : Cyber Crime
Instructional Objectives:
On completion of this lesson the student shall be able to understand followings.
Need for An Information Security Policy
Introduction to Indian Cyber Law
TEACHING POINTS:
Need for An Information Security Policy
Introduction to Indian Cyber Law
Assignment / Questions
1. Why is an Information Security Policy necessary in an organization?
2. What are the main components of a good information security policy?
3. Explain how a security policy helps prevent internal and external threats.
4. What are the challenges in implementing a security policy in large organizations?
5. What is cyber law and why is it important in the digital age?
6. Explain the origin and evolution of Indian Cyber Law.
7. What is the role of the Information Technology (IT) Act, 2000 in Indian cyber law?
8. List and explain the key provisions of the IT Act, 2000.
Signature of Faculty
Subject : Cyber Security Subject Code :BCC-301
Unit No. : 5 Lecture No. : 18
Date : Title : Cyber Crime
Instructional Objectives:
Objective and Scope of the Digital Personal Data Protection Act 2023
TEACHING POINTS:
Objective and Scope of the Digital Personal Data Protection Act 2023
Assignment / Questions
1. What is the main objective of the Digital Personal Data Protection (DPDP) Act, 2023?
3. Who are Data Principals and Data Fiduciaries under this Act?
4. What rights are given to individuals under the DPDP Act, 2023?
5. How does the DPDP Act align with global data protection standards like GDPR?
Signature of Faculty
Subject : Cyber Security Subject Code :BCC-301
Unit No. : 5 Lecture No. : 19
Date : Title : Cyber Crime
Instructional Objectives:
Intellectual Property Issues
Overview of Intellectual Property Related Legislation in India
TEACHING POINTS:
Intellectual Property Issues
Overview of Intellectual Property Related Legislation in India
Assignment / Questions
1. What is Intellectual Property (IP) and why is it important in the digital world?
2. Discuss the major challenges of IP protection in cyberspace.
3. How does digital piracy affect intellectual property rights?
4. Explain how cybercrime relates to IP theft and software piracy.
5. What are the key IPR-related laws in India?
6. Provide a brief overview of the following:
Signature of Faculty
Subject : Cyber Security Subject Code :BCC-301
Unit No. : 5 Lecture No. : 20
Date : Title : Cyber Crime
Instructional Objectives:
On completion of this lesson the student shall be able to understand followings.
Patent
Copyright
Trademarks
TEACHING POINTS:
Patent
Copyright
Trademarks
Assignment / Questions
1. What is a patent and what are the criteria for patentability?
2. What is the procedure to file a patent in India?
3. Give examples of software or technology patents (if applicable).
4. How long does a patent remain valid in India?
5. Define copyright. What types of works are protected?
6. What is the duration of copyright protection in India?
7. What are the exceptions to copyright, such as fair use?
8. What remedies are available for copyright infringement?
9. What is a trademark? How is it different from a patent or copyright?
10. What is the registration process for a trademark in India?
11. What are infringement and passing off in the context of trademarks?
12. Explain with examples how brands protect their trademarks digitally.
Signature of Faculty
Tutorial Sheets
Tutorial Sheet No.1
Subject Name: Cyber Security Subject Code:BCC-301
Semester: 3 Maximum Marks:
Given Date: Submission Date:
Attempt all questions and each question carries equal marks based on Course Outcome number......
Question
1
Define cybercrime. How did the term originate?
.
2
Explain the relationship between cybercrime and information security.
.
3
What are the key differences between traditional crime and cybercrime?
.
4 Why is information security critical in today’s digital world?
.
5
Who can be classified as a cybercriminal? Explain with examples.
.
6 Explain the different types of cybercriminals based on intent and skill level (e.g., script kiddies,
. hacktivists, insiders).
7
What are the major categories of cybercrime? Give examples of each category of cybercrime.
.
8 How is cybercrime evolving globally? Discuss cybercrime trends in developed vs. developing
. countries.
9
What are some international efforts to combat cybercrime?
.
What is meant by "Survival Mantra for the Netizens" in the cybercrime era?
Suggest some preventive measures and safety tips for internet users.
Describe the general process followed by cybercriminals in planning attacks. What are the common
tools and techniques used to gather information for attacks?
Explain the concept of attack lifecycle in cybercrime.
What is social engineering? Why is it effective?
Describe the different types of social engineering attacks (e.g., phishing, pretexting).
What is cyberstalking and how does it differ from physical stalking? What are the
legal implications and penalties for cyberstalking in India or globally? Suggest ways
to detect and report cyberstalking.
Why are cybercafés considered vulnerable spots for cybercrime? What precautions should be taken
by cybercafé owners and users?
Explain with a case study or example where a cybercafé was used for criminal activity.
What is a botnet? How is it created? How do cybercriminals use botnets for large-scale attacks?
Explain the role of botnets in DDoS and spam attacks.
Tutorial Sheet No.1
What is an attack vector in cybersecurity? List and explain common attack vectors
(e.g., email, network, USB drives).
Tutorial Sheet No.2
Subject Name: Cyber Security Subject Code: BCC-301
Semester: 3 Maximum Marks:
Given Date: Submission Date:
Attempt all questions and each question carries equal marks based on Course Outcome number......
Q. No. Question
Define mobile and wireless devices with suitable examples. What are the key differences
1.
between mobile computing and traditional computing?
2. What factors have led to the proliferation of mobile and wireless devices in recent years?
3. How does this proliferation impact cybersecurity?
Explain the major trends in mobile and wireless technology (e.g., 5G, IoT, BYOD). How
4.
do these trends create new opportunities and challenges for organizations?
What are the common techniques used to commit credit card fraud through mobile
5. platforms? How can users and businesses protect themselves from mobile-based payment
fraud?
6. List and explain at least four major security threats faced by mobile devices.
7. How do such policies help in reducing the risk of data breaches and misuse?
8. What are registry settings in mobile devices and how can they affect security?
9. How can registry manipulation be used in mobile cyberattacks?
10. What are the different types of authentication methods used in mobile devices?
11. Explain the role of multi-factor authentication (MFA) in securing mobile services.
Describe at least three common mobile-specific attacks (e.g., smishing, SIM swapping,
12.
mobile malware). What are the consequences of these attacks on individual users?
How do mobile devices create security risks for organizations? Explain how data leakage
13.
can occur through mobile use in companies.
14. What are Mobile Device Management (MDM) tools and how do they enhance security?
15. How can organizations control and monitor mobile device usage within the workplace?
16. What are the key elements of an organizational mobile security policy?
17. How do such policies help in reducing the risk of data breaches and misuse?
Tutorial Sheet No.3
Subject Name: Cyber Security Subject Code: BCC 301
Semester: 3 Maximum Marks:
Given Date: Submission Date:
Attempt all questions and each question carries equal marks based on Course Outcome number......
Q. No. Question
3. What is SQL Injection? How is it performed and what damage can it cause?
5. Explain how password cracking is done using brute-force and dictionary attacks.
7. What are keyloggers? How do they operate and what information do they steal?
9. What are proxy servers and anonymizers? How do cybercriminals misuse them?
10. What are the common types of phishing attacks? (e.g., spear phishing, vishing, whaling)
11. What is buffer overflow? How can attackers exploit this vulnerability?
12. Explain the role of spyware in cyberattacks. How does it differ from viruses?
14. How can email be used as a tool for identity theft or phishing?
15. What are the methods to prevent SQL injection attacks in web applications?
16. List and explain common attacks on wireless networks.
18. What are the security threats associated with phishing emails and fake websites?
20. How can individuals and organizations protect themselves from phishing and identity theft?
Tutorial Sheet No.4
Subject Name: Subject Code:
Semester: Maximum Marks:
Given Date: Submission Date:
Attempt all questions and each question carries equal marks based on Course Outcome number......
Q. No. Question
4. What do you understand by digital evidence? Compare physical evidence and digital
evidence.
5. Explain Digital forensics life cycle. What is the need of Information Security policy?
6. What are the various activities involved in the life cycle of a forensic investigation process?
Attempt all questions and each question carries equal marks based on Course Outcome number......
Q. No. Question
4. What is digital personal data protection act 2023 what are its main objectives?
5. What is intellectual property what are the different type of intellectual property?
Attempt all questions and each question carries equal marks based on Course Outcome number......
Question
Attempt all questions and each question carries equal marks based on Course Outcome number......
Q. No. Question
2 Explain the different types of credit card frauds prevalent in the mobile and wireless
computing era.
3 Identify and explain the major security challenges posed by mobile devices.
4 What are the common types of attacks on mobile and cell phones?
Attempt all questions and each question carries equal marks based on Course Outcome number......
Q. No. Question
Attempt all questions and each question carries equal marks based on Course Outcome number......
Q. Question
No.
5 Evaluate the privacy and security threats posed by social networking sites.
Assignment No.5
Subject Name: Cyber Security Subject Code: BCC-301
Semester: 3 Maximum Marks: 50
Given Date: Submission Date:
Attempt all questions and each question carries equal marks based on Course Outcome number......
Q. Question
No.
2 What is Indian Cyber Law and how does it address modern digital threats?
3 Explain the objectives and scope of the Digital Personal Data Protection Act (DPDP),
2023.
Discuss the major intellectual property issues in cyberspace.
4
Video Link
https://archive.nptel.ac.in/courses/106/101/1061010
2 SRS 61/
https://archive.nptel.ac.in/courses/106/101/1061010
3 Software Design 61/
https://archive.nptel.ac.in/courses/106/101/1061010
4 Software Testing 61/
Course
Assessment % Total Result
Outcomes
CO1 CAE-I, CAE-II, Univ. Exam, Assignment, attendance A
CO2 CAE-I & CAE-II, Univ. Exam, Assignment, attendance B
CO3 CAE-I & CAE-II, Univ. Exam, Assignment, attendance C
CO4 CAE-I & CAE-II, Univ. Exam, Assignment, attendance D
CO5 CAE-I & CAE-II, Univ. Exam, Assignment, attendance E
Course attainment levels for internal assessment of all courses are as follows.
Course attainment levels for external assessment (Univ. exam) of all courses are as follows.