B.Tech./B.Tech. (Working Professional) IV Semester
Examination, June 2025
Grading System (GS)/Working Professional
Max Marks: 70 | Time: 3 Hours
Note:
i) Answer any five questions.
ii) All questions carry equal marks.
a) What is cybercrime and how has the rise of the internet and mobile devices influenced its growth? (Unit 1)
b) How do differences in cyber laws and lack of international cooperation affect enforcement? (Unit 3)
a) Define Spamming. How does spamming affect individuals and organizations? Describe types of spam (email, SMS, social media). (Unit 1)
b) Discuss the implications of web jacking on individuals and organizations, and suggest counter measures to prevent such attacks. (Unit 2)
a) Explain the concept of software piracy. Discuss its various forms, including softlifting, counterlifting and online piracy. (Unit 2)
b) What is password sniffing? Describe the techniques used in sniffing attacks and how they can compromise user data. (Unit 2)
a) How does the Information Technology Act, 2000 address various cyber crimes in India? (Unit 3)
b) Who are teenage web vandals, what motivates them and what psychological and social factors contribute to their behavior? (Unit 3)
a) Discuss the monetary penalties and adjudication mechanisms provided under the IT Act, 2000 for cyber offences. (Unit 3)
b) Discuss the evolution of India's legal framework for evidence, comparing the Indian Evidence Act, 1872 and the Information Technology Act, 2000. (Unit 4)
a) How do courts assess whether electronic evidence can be accepted and relied upon in criminal and civil cases? (Unit 4)
b) Explain electronic agreements under Indian law, their validation, and provisions in the IT Act and Indian Contract Act ensuring enforceability. (Unit 4)
a) What are DoS and DDoS attacks? Explain their mechanism, objectives and impact on online services and infrastructure. (Unit 5)
b) Discuss types of attacks on wireless networks, including Wi-Fi sniffing, rogue access points and man-in-the-middle attacks. (Unit 5)
Write a short note on any Two:
i) The E-mail Spoofing in cyber crime (Unit 1)
ii) Web Servers Hacking (Unit 2)
iii) Strategies to Tackle Cyber Crime (Unit 3)
iv) Proxy Servers and Anonymizers (Unit 5)