UG S1 BCA, Cyber law and security, Second internal examination, November 2024

 

Section-A

 

Very short answer questions (Answer all, each carry 2 marks)

 

1.      Define cyber law

Cyber law encompasses the legal issues related to the use of information technology, including the internet, and covers areas such as data protection, privacy, and digital rights.

 

2.      Write short note on Cyber Bullying

Cyber bullying involves using digital platforms like social media, emails, and messaging to harass, threaten, or intimidate individuals, often anonymously, causing emotional distress.

 

3.      Explain scope of Cyber law

Cyber law covers various aspects, including data protection, e-commerce, digital contracts, cybercrimes, privacy issues, intellectual property rights, and the legal framework governing IT.

 

4.      Illustrate different types of cyber bullying

Types include harassment, impersonation, denigration (spreading false rumors), outing (public sharing of private information), and cyberstalking.

 

5.      What is Phishing?

Phishing is a cyber-attack where attackers impersonate legitimate organizations via email, SMS, or fake websites to steal sensitive information such as usernames, passwords, and credit card details.

 

6.      What is the significance of using strong passwords?

Strong passwords help protect accounts from unauthorized access, reduce vulnerability to cyber-attacks, and safeguard personal and sensitive information.

 

7.      How can you identify a secure website when browsing?

A secure website typically has a URL starting with "https://," displays a padlock symbol in the address bar, and may have a valid security certificate.

 

8.      What are the three key principles of security?

The three key principles are Confidentiality, Integrity, and Availability (CIA Triad).

 

9.      What is a cipher?

A cipher is an algorithm used to encrypt and decrypt information, ensuring data security by transforming readable data into an unreadable format and vice versa.

 

10.   What is cyber forensics?

Cyber forensics is the process of collecting, preserving, and analysing digital evidence from computer systems to investigate and solve cybercrimes.

 

 

Section-B

Short answer questions (Answer any 6, each carry 5 marks)

 

 

11.   Briefly explain different types of cyber crimes

Cybercrimes include hacking, identity theft, online fraud, cyberstalking, phishing, ransomware attacks, and intellectual property theft.

 

12.   Explain IT ACT 2000

The Information Technology Act, 2000, is a law in India aimed at regulating electronic commerce and cybercrime, providing legal recognition to electronic records and digital signatures.

 

13.   Describe IT Act 2000 Amendments

The amendments to the IT Act in 2008 expanded the scope to include cyber terrorism, data protection, and penalties for data breaches, enhancing cyber security regulations.

 

14.   What is the importance of using multi-factor authentication in protecting sensitive accounts?

Multi-factor authentication (MFA) enhances security by requiring users to present multiple forms of identification, reducing the risk of unauthorized access even if passwords are compromised.

 

15.   How does biometric authentication work? What are the advantages and disadvantages of using it?

Biometric authentication uses unique biological traits like fingerprints, facial recognition, or iris scans to verify identity. Advantages include convenience and increased security, while disadvantages include potential privacy concerns and susceptibility to spoofing in some cases.

 

16.   What are the different types of system-based attacks, and how do they exploit weakness in computer systems or networks?

Types of attacks include malware, denial of service (DoS), and SQL injection. These attacks exploit system vulnerabilities by overloading resources, injecting malicious code, or bypassing authentication.

 

17.   Explain working of substitution cipher.

A substitution cipher works by replacing each letter in the plaintext with a corresponding letter from a fixed substitution pattern, transforming the original message into a coded format.

 

18.   What are the primary responsibilities of an ethical hacker when hired by an organization?

An ethical hacker’s responsibilities include identifying system vulnerabilities, testing network defences, ensuring security compliance, and helping organizations strengthen cybersecurity measures.

Comments

Popular posts from this blog

UG, S1 BCA, First internal examination, Introduction to Problem Solving and Web Designing, September 2024