CY-402 – Fundamental of Cyber Security

Rajiv Gandhi Proudyogiki Vishwavidyalaya, Bhopal
New Scheme Based On AICTE Flexible Curricula
CSE-Cyber Security | IV-Semester

Syllabus Content & Previous Year Questions

Unit 1


Introduction of Cyber Crime, Challenges of cyber crime, Classifications of Cybercrimes: E-Mail Spoofing, Spamming, Internet Time Theft, Salami attack/Salami Technique,



Previous Years questions appears in RGPV exam.

Q.1) What is cybercrime and how has the rise of the internet and mobile devices influenced its growth? (June-2025)


Q.2) Define Spamming. How does spamming affect individuals and organizations? Describe types of spam (email, SMS, social media). (June-2025)


Q.3) Write a short note on any Two:
i) The E-mail Spoofing in cyber crime (June-2025)


Q.4) Define Cyber-crime. What are the challenges of the Cyber Crimes. (June-2024)


Q.5) Write short notes on the E-mail Spoofing and Spamming. (June-2024)


Q.6) Explain in detail about the Salami Technique. (June-2024)


Q.7) Write short notes on any two of the following.
i) Internet Time Theft (June-2024)


Q.8) Explain cyber crime. Mention some important cyber crime and explain each of them. (Nov-2023)


Q.9) Explain E-mail spoofing, spamming. (Nov-2023)


Q.10) What do you mean by 'Salami attack'? What are the adverse effect on economic structure of society. Explain with example. (Nov-2023)


Q.11) Give difference between spoofing and phishing. (June-2022)


Q.12) Explain spamming with suitable example. (June-2022)


Q.13) What is Salami attack explain with example? (June-2022)



UNIT 2


Web jacking, Online Frauds, Software Piracy, Computer Network Intrusions, Password Sniffing, Identity Theft, cyber terrorism, Virtual Crime, Perception of cyber criminals: hackers, insurgents and extremist group etc. Web servers were hacking, session hijacking.



Previous Years questions appears in RGPV exam.

Q.1) Discuss the implications of web jacking on individuals and organizations, and suggest counter measures to prevent such attacks. (June-2025)


Q.2) Explain the concept of software piracy. Discuss its various forms, including softlifting, counterlifting and online piracy. (June-2025)


Q.3) What is password sniffing? Describe the techniques used in sniffing attacks and how they can compromise user data. (June-2025)


Q.4) Write a short note on any Two:
ii) Web Servers Hacking (June-2025)


Q.5) Compare and contrast hackers and insurgents. (June-2024)


Q.6) What is meant by software piracy? What are the major factors contributing to its persistence? (June-2024)


Q.7) What are the most prevalent tactics and techniques utilized by cybercriminals in perpetrating online fraud, and how can individuals and organizations effectively safeguard themselves against such threats? (June-2024)


Q.8) Write short notes on any two of the following.
ii) Web Jacking (June-2024)


Q.9) Explain web jacking along with the prevention measure of online fraud and software piracy. (Nov-2023)


Q.10) What is theft in cyber terrorism also explain web server hacking? (Nov-2023)


Q.11) What do you understand by attack on web server? Explain the steps taken to avoid web server hacking. (Nov-2023)


Q.12) Explain "Software Piracy" write down various activities that constitutes software piracy. (Nov-2023)


Q.13) Explain Session Hijacking with the method of initiating session hijacking. (Nov-2023)


Q.14) How do you prevent network intrusions? (June-2022)


Q.15) What is password sniffing in cyber security? (June-2022)


Q.16) What are the characteristics of cyber criminals? (June-2022)


Q.17) What is World Wide Web? Explain (June-2022)


Q.18) Explain the following terms according to IT Act 2000:
iv) Software Piracy (June-2022)



UNIT 3


Cyber Crime and Criminal justice: Concept of Cyber Crime and the IT Act, 2000, Hacking, Teenage Web Vandals, Cyber Fraud and Cheating, Defamation, Harassment and E-mail Abuse, Other IT Act Offences, Monetary Penalties, jurisdiction and Cyber Crimes, Nature of Criminality, Strategies to tackle Cyber Crime and Trends.



Previous Years questions appears in RGPV exam.

Q.1) How do differences in cyber laws and lack of international cooperation affect enforcement? (June-2025)


Q.2) How does the Information Technology Act, 2000 address various cyber crimes in India? (June-2025)


Q.3) Who are teenage web vandals, what motivates them and what psychological and social factors contribute to their behavior? (June-2025)


Q.4) Discuss the monetary penalties and adjudication mechanisms provided under the IT Act, 2000 for cyber offences. (June-2025)


Q.5) Write a short note on any Two:
iii) Strategies to Tackle Cyber Crime (June-2025)


Q.6) What are the major elements of the Cyber Crime and IT Act 2000? (June-2024)


Q.7) Discuss about the monetary penalties applied for the different types of Cyber Crimes. (June-2024)


Q.8) Differentiate Defamation and E-mail Abuse. (June-2024)


Q.9) How the nature of criminality effects the Cyber Crime? Provide necessary examples. (June-2024)


Q.10) Write short notes on any two of the following.
iii) Trends of Cyber Crime (June-2024)


Q.11) Explain criminal justice with some of the main provisions of cyber crime in IT Act 2000. (Nov-2023)


Q.12) What is the meaning of cyber criminality? (Nov-2023)


Q.13) List down some of the strategies to tackle cyber crime. (Nov-2023)


Q.14) Explain the term 'Hacking'. What are the various classification of hacker? Mention them. (Nov-2023)


Q.15) Explain defamation in the context of cyber crime. Mention the provision of cyber defamation. (Nov-2023)


Q.16) What are the positive aspects of the ITA 2000? Explain. (June-2022)


Q.17) What is cyber defamation and harassment? (June-2022)



UNIT 4


The Indian Evidence Act of 1872 v. Information Technology Act, 2000: Status of Electronic Records as Evidence, Proof and Management of Electronic Records; Relevancy, Admissibility and Probative Value of E-Evidence, Proving Digital Signatures, Proof of Electronic Agreements, Proving Electronic Messages.



Previous Years questions appears in RGPV exam.

Q.1) Discuss the evolution of India's legal framework for evidence, comparing the Indian Evidence Act, 1872 and the Information Technology Act, 2000. (June-2025)


Q.2) How do courts assess whether electronic evidence can be accepted and relied upon in criminal and civil cases? (June-2025)


Q.3) Explain electronic agreements under Indian law, their validation, and provisions in the IT Act and Indian Contract Act ensuring enforceability. (June-2025)


Q.4) How do management strategies address the unique challenges posed by electronic records in the investigation and prosecution of Cyber Crimes. (June-2024)


Q.5) Compare and contrast The Indian Evidence Act of 1872 v/s Information Technology Act, 2000. (June-2024)


Q.6) Write short notes on the probative value of e-signatures. (June-2024)


Q.7) Explain in briefly about the status of the electronic records as evidence. (June-2024)


Q.8) Explain Indian Evidence Act 1872. What are the provisions mention in it. (Nov-2023)


Q.9) How to find record as evidence to proof and management of electronic record for relevancy. (Nov-2023)


Q.10) Discuss the impact of Digital signatures in ITA 2000. (June-2022)


Q.11) What is the Chain of Custody concept? How it is related to forensics? (June-2022)


Q.12) What is the role of digital signature in digital evidence? (June-2022)


Q.13) What do you mean by proof and management of electronic records? (June-2022)


Q.14) Explain the following terms according to IT Act 2000:
i) Records as evidence
ii) Proof of electronic agreements
iii) Status of electronic (June-2022)



UNIT 5


Tools and Methods in Cybercrime: Proxy Servers and Anonymizers, Password Cracking, Key loggers and Spyware, virus and worms, Trojan Horses, Backdoors, DoS and DDoS Attacks , Buffer and Overflow, Attack on Wireless Networks, Phishing : Method of Phishing, Phishing Techniques.



Previous Years questions appears in RGPV exam.

Q.1) What are DoS and DDoS attacks? Explain their mechanism, objectives and impact on online services and infrastructure. (June-2025)


Q.2) Discuss types of attacks on wireless networks, including Wi-Fi sniffing, rogue access points and man-in-the-middle attacks. (June-2025)


Q.3) Write a short note on any Two:
iv) Proxy Servers and Anonymizers (June-2025)


Q.4) How do proxy servers and anonymizers function to enhance online privacy and security and what are the distinguishing features between the two in terms of their operation and effectiveness in safeguarding users' identities and data? (June-2024)


Q.5) What are the primary differences between keyloggers and spyware in terms of functionality, potential impact on computer systems? (June-2024)


Q.6) Write short notes on any two of the following.
iv) Phishing (June-2024)


Q.7) Explain Dos and DDos attacks in brief. What are the techniques behind such attacks? (Nov-2023)


Q.8) What are the methods and tools of cyber crime? (Nov-2023)


Q.9) How are proxy servers different from Anonymizes? (Nov-2023)


Q.10) What do you understand by the term VIRUS and WORMS along with their types in details. (Nov-2023)


Q.11) Write a short note on Network Forensics. (June-2022)


Q.12) What are some examples of password attack techniques? (June-2022)


Q.13) How does viruses and worms works in cyber-attacks? (June-2022)


Q.14) What are the most common attacks on wireless networks? (June-2022)


Q.15) What is spyware and key loggers? (June-2022)