UG S1 BCA, Cyber law and security, Second internal examination, November 2024
Section-A
Very
short answer questions (Answer all, each carry 2 marks)
1.
Define cyber law
Cyber law encompasses the legal issues related to the use of
information technology, including the internet, and covers areas such as data
protection, privacy, and digital rights.
2.
Write short note on Cyber
Bullying
Cyber bullying involves using digital platforms like social media,
emails, and messaging to harass, threaten, or intimidate individuals, often
anonymously, causing emotional distress.
3.
Explain scope of Cyber law
Cyber law covers various aspects, including data protection,
e-commerce, digital contracts, cybercrimes, privacy issues, intellectual
property rights, and the legal framework governing IT.
4.
Illustrate different types of
cyber bullying
Types include harassment, impersonation, denigration (spreading
false rumors), outing (public sharing of private information), and
cyberstalking.
5.
What is Phishing?
Phishing is a cyber-attack where attackers impersonate legitimate
organizations via email, SMS, or fake websites to steal sensitive information
such as usernames, passwords, and credit card details.
6.
What is the significance of using
strong passwords?
Strong passwords help protect accounts from unauthorized access,
reduce vulnerability to cyber-attacks, and safeguard personal and sensitive
information.
7.
How can you identify a secure
website when browsing?
A secure website typically has a URL starting with
"https://," displays a padlock symbol in the address bar, and may
have a valid security certificate.
8.
What are the three key principles
of security?
The three key principles are Confidentiality, Integrity, and
Availability (CIA Triad).
9.
What is a cipher?
A cipher is an algorithm used to encrypt and decrypt information,
ensuring data security by transforming readable data into an unreadable format
and vice versa.
10.
What is cyber forensics?
Cyber forensics is the process of collecting, preserving, and
analysing digital evidence from computer systems to investigate and solve
cybercrimes.
Section-B
Short
answer questions (Answer any 6, each carry 5 marks)
11.
Briefly explain different types
of cyber crimes
Cybercrimes include hacking, identity theft, online fraud,
cyberstalking, phishing, ransomware attacks, and intellectual property theft.
12.
Explain IT ACT 2000
The Information Technology Act, 2000, is a law in India aimed at
regulating electronic commerce and cybercrime, providing legal recognition to
electronic records and digital signatures.
13.
Describe IT Act 2000 Amendments
The amendments to the IT Act in 2008 expanded the scope to include
cyber terrorism, data protection, and penalties for data breaches, enhancing
cyber security regulations.
14.
What is the importance of using
multi-factor authentication in protecting sensitive accounts?
Multi-factor authentication (MFA) enhances security by requiring
users to present multiple forms of identification, reducing the risk of
unauthorized access even if passwords are compromised.
15.
How does biometric authentication
work? What are the advantages and disadvantages of using it?
Biometric authentication uses unique biological traits like
fingerprints, facial recognition, or iris scans to verify identity. Advantages
include convenience and increased security, while disadvantages include
potential privacy concerns and susceptibility to spoofing in some cases.
16.
What are the different types of
system-based attacks, and how do they exploit weakness in computer systems or
networks?
Types of attacks include malware, denial of service (DoS), and SQL
injection. These attacks exploit system vulnerabilities by overloading
resources, injecting malicious code, or bypassing authentication.
17.
Explain working of substitution
cipher.
A substitution cipher works by replacing each letter in the
plaintext with a corresponding letter from a fixed substitution pattern,
transforming the original message into a coded format.
18.
What are the primary
responsibilities of an ethical hacker when hired by an organization?
An ethical hacker’s responsibilities include identifying system
vulnerabilities, testing network defences, ensuring security compliance, and
helping organizations strengthen cybersecurity measures.
Comments
Post a Comment