(SEM III) THEORY EXAMINATION 2023-24 CYBER SECURITY
This examination assesses a student’s understanding of cybercrime, cyber laws, digital forensics, mobile security, identity theft, cyber threats, and security policies.
The paper is structured to evaluate conceptual clarity, analytical depth, real-world applicability, and technical comprehension of cyber security fundamentals.
The question paper is divided into three sections, each gradually increasing in depth and complexity.
SECTION A – Short Questions (14 Marks)
7 questions × 2 marks each
This section checks fundamental awareness of cyber security terms, threat definitions, and basic concepts required to understand digital risks.
Concepts Covered:
1. Cyber Crime Definition
Understanding unlawful activities performed using computers, networks, smartphones, or the internet.
2. Botnet Meaning
Explaining a network of infected computers controlled remotely by cyber criminals.
3. Need for Mobile Security
Focus on mobile vulnerabilities: apps, networks, data theft, device loss, and malicious software.
4. Authentication vs Authorization
Authentication → verifying identity
Authorization → granting access rights
5. Viruses and Worms
Basic definitions and differences between self-replicating malicious code.
6. Digital Evidence
Understanding electronically stored information used in investigations.
7. Need for Cyber Security
Protecting data, safeguarding critical infrastructure, preventing fraud, and ensuring digital trust.
This section tests precise definitions and core understanding.
SECTION B – Analytical/Descriptive Questions (21 Marks)
Attempt any three (7 marks each)
This segment requires explanation, analysis, and practical detailing of cyber threats, tools, and security policies.
Topics Covered:
1. Origin of Cybercrime & Examples
Historical evolution of computer misuse and examples like phishing, hacking, identity theft, ransomware, cyberstalking, DoS attacks.
2. Wireless Devices & Security Challenges
Explaining wireless technologies—Wi-Fi, Bluetooth, NFC, mobile hotspots—
and challenges like interception, weak encryption, rogue access points, battery drain attacks, eavesdropping.
3. Tools Used in Cybercrime
Seven tools such as keyloggers, RATs, malware kits, botnets, password crackers, sniffers, and exploit kits.
4. Digital Forensics Life Cycle
Stages including: Identification → Preservation → Collection → Examination → Analysis → Documentation → Presentation.
5. Need for Information Security Policy
Why organizations require a structured policy to manage data security, compliance, access controls, and risk procedures.
This section evaluates understanding of real-time cyber issues and technical processes.
SECTION C – Long Answer / Application Questions (35 Marks)
Each question has two sub-options; students must attempt ONE from each section.
3. Cyber Criminals & Cybercrime Classification (7 Marks)
Option A:
Types of cyber criminals—hackers, crackers, insiders, cyber terrorists, script kiddies.
Classification of cybercrimes: financial frauds, cyber defamation, property crimes, cyber harassment, network intrusions, etc.
Option B:
Explaining the “fuel” for cybercrime—motives like money, revenge, ideology, espionage.
How criminals plan cyber-attacks: reconnaissance, target scanning, vulnerability exploitation, execution, covering tracks.
4. Mobile Device Security (7 Marks)
Option A:
Security measures & policies—device encryption, strong authentication, MDM tools, app vetting, secure Wi-Fi usage, OS updates.
Option B:
Types of attacks—SIM swapping, malware apps, spyware, Wi-Fi sniffing, SMS phishing.
Security implications: data leak, financial loss, compromised credentials for organizations.
5. Identity Theft & Steganography (7 Marks)
Option A:
Explaining ID theft, methods (phishing, skimming, data breaches, dumpster diving) and handling measures (2FA, monitoring, alerts).
Option B:
Definition and detailed working of steganography—image/audio/text hiding, algorithms, payload, cover file, stego-key.
6. Email Forensics & Privacy Threats (7 Marks)
Option A:
Email analysis methods—header analysis, trace route, metadata, deleted mail recovery, spam examination, phishing indicators.
Option B:
Privacy threats—tracking, profiling, surveillance, data harvesting.
Challenges include lack of regulation, weak data protection, cross-border laws, shadow IT.
7. Cyber Law & IPR Legislation (7 Marks)
Option A:
Cyber Law meaning and important Indian laws—IT Act 2000, IT Amendment 2008, Section 66/67, CERT-In rules, data protection guidelines.
Option B:
Overview of Intellectual Property rights—copyrights, patents, trademarks, trade secrets—and related Indian legislation.
Purpose of This Examination
This exam ensures that students can:
Understand cyber threats, crimes, and criminal behavior
Apply digital forensics techniques and investigative procedures
Evaluate mobile security risks and organizational policies
Comprehend security tools and defensive measures
Interpret cyber laws and legal frameworks
Recognize privacy threats and identity theft mechanisms
Build foundational knowledge for careers in cyber security
The paper strengthens analytical skills, awareness of digital risks, and understanding of modern information security domains.
Related Notes
BASIC ELECTRICAL ENGINEERING
ENGINEERING PHYSICS THEORY EXAMINATION 2024-25
(SEM I) ENGINEERING CHEMISTRY THEORY EXAMINATION...
THEORY EXAMINATION 2024-25 ENGINEERING MATHEMATICS...
(SEM I) THEORY EXAMINATION 2024-25 ENGINEERING CHE...
(SEM I) THEORY EXAMINATION 2024-25 ENVIRONMENT AND...
Need more notes?
Return to the notes store to keep exploring curated study material.
Back to Notes StoreLatest Blog Posts
Best Home Tutors for Class 12 Science in Dwarka, Delhi
Top Universities in Chennai for Postgraduate Courses with Complete Guide
Best Home Tuition for Competitive Exams in Dwarka, Delhi
Best Online Tutors for Maths in Noida 2026
Best Coaching Centers for UPSC in Rajender Place, Delhi 2026
How to Apply for NEET in Gurugram, Haryana for 2026
Admission Process for BTech at NIT Warangal 2026
Best Home Tutors for JEE in Maharashtra 2026
Meet Our Exceptional Teachers
Discover passionate educators who inspire, motivate, and transform learning experiences with their expertise and dedication
Explore Tutors In Your Location
Discover expert tutors in popular areas across India
Discover Elite Educational Institutes
Connect with top-tier educational institutions offering world-class learning experiences, expert faculty, and innovative teaching methodologies