PS 1
1. What is Cyber Security?
Cyber Security is the practice of protecting computers, networks, programs, and data from
unauthorized access, cyber-attacks, or damage. It includes tools, technologies, policies, and practices
used to defend against threats.
2. What is Cybercrime?
Cybercrime refers to illegal activities carried out using computers or the internet. Examples include
hacking, identity theft, online fraud, cyberbullying, and spreading viruses.
3. Explain Various Software Attacks
Software attacks are malicious actions targeting applications or operating systems:
Malware – Harmful software like viruses, worms, Trojans.
Phishing – Fake emails/websites to steal data.
Ransomware – Locks data and demands payment.
Spyware – Secretly gathers user information.
Adware – Unwanted ads; may track user activity.
Rootkits – Gives attackers control without detection.
Keyloggers – Record keystrokes to steal passwords.
4. Explain the Layers of Security
Security in IT is implemented in layers for better protection:
1. Physical Security – Locks, guards, and cameras.
2. Network Security – Firewalls, intrusion detection/prevention systems.
3. Application Security – Secure coding, patching software.
4. Endpoint Security – Antivirus, endpoint protection for devices.
5. Data Security – Encryption, access controls.
6. User Security – Password policies, user education.
7. Operational Security – Policies/procedures to handle and protect data.
5. What are Cyber Attacks and Cyber Threats?
Cyber Attack: A deliberate attempt to breach the security of an IT system (e.g., hacking,
DDoS).
Cyber Threat: A potential danger or vulnerability that could lead to a cyber attack (e.g.,
unpatched software).
6. Explain the Active Attacks
Active attacks involve altering data or system operations. Types include:
Masquerade – Pretending to be someone else.
Replay – Reusing data transmissions to gain access.
Modification – Changing messages/data.
Denial of Service (DoS) – Making systems unavailable.
Man-in-the-Middle (MITM) – Intercepting communication between two parties.
7. List Some Harmful Acts in Cyber Security
Hacking
Identity theft
Phishing
Spreading malware
Cyberstalking
Data breaches
Website defacement
Cyberbullying
8. List Some Advanced Cybercrimes in India
Ransomware attacks (e.g., WannaCry, Locky)
Banking frauds via fake apps
Deepfake videos
Cyber terrorism using social media
Dark web-based trafficking
Cryptojacking (using someone’s device to mine cryptocurrency)
9. Discuss About Cyber Terrorism
Cyber terrorism refers to the use of the internet to conduct violent acts that threaten or cause fear
for political, religious, or ideological goals. Examples:
Attacking critical infrastructure (e.g., power grids)
Spreading extremist propaganda
Disrupting government services
10. What is Cyber Warfare? Explain.
Cyber warfare is the use of cyber attacks by nations to damage or disrupt another nation’s computer
systems or infrastructure. It is often state-sponsored and involves:
Cyber espionage
Sabotage of defense systems
Attacks on power plants, satellites, or military networks
11. Explain: Distributed Denial of Service (DDoS)
A DDoS attack floods a server or network with traffic from multiple sources (infected devices called
"botnets"), making the service slow or completely unavailable to real users. It is used to disrupt
business or services.
12. SQL Injection
SQL Injection is a code injection technique where malicious SQL statements are inserted into a web
form or URL to manipulate a database. It can allow attackers to:
Bypass login authentication
View, modify, or delete data
Gain administrative access
Example:
Input: ' OR '1'='1
This always returns true in a login form and may allow unauthorized access.
PS 2
1. Explain in Detail About the CIA Triad with Neat Diagram
The CIA Triad is a foundational concept in Cyber Security representing the core principles that
protect information:
1. Confidentiality: Ensures that information is only accessible to those authorized to view it.
o Example: Encrypting sensitive data.
2. Integrity: Ensures the accuracy and reliability of data, preventing unauthorized
modifications.
o Example: Using checksums to verify data integrity.
3. Availability: Ensures that information is accessible when needed by authorized users.
o Example: Ensuring a website remains online by employing DDoS protection.
Diagram:
+-----------------+
| Confidentiality |
+-----------------+
+------------------+ +----------------+
| Integrity | ----> | Availability |
+------------------+ +----------------+
2. Explain the Comprehensive Cyber Security Policy
A Comprehensive Cyber Security Policy outlines the rules, guidelines, and practices that an
organization must follow to protect its IT assets. Key components:
1. Governance: Defines roles, responsibilities, and authority.
2. Risk Management: Identifies risks and implements measures to mitigate them.
3. Access Control: Defines who has access to what data/systems.
4. Incident Response: Describes how to react to a security breach.
5. Compliance: Ensures alignment with legal and regulatory requirements.
6. Employee Training: Educates employees on best security practices.
7. Monitoring & Reporting: Tracks security events and reports vulnerabilities.
3. Discuss in Detail About the Cyber Criminals
Cyber Criminals are individuals or groups that use the internet to commit illegal activities. Types of
cyber criminals:
1. Hackers: Gain unauthorized access to systems for theft, espionage, or destruction.
2. Phishers: Use fraudulent communications (like emails) to trick victims into revealing personal
information.
3. Scammers: Perform fraud by deceiving individuals into giving money or data.
4. Cyber Terrorists: Use cyber-attacks to harm national security or cause fear.
5. Script Kiddies: Use pre-written hacking tools without deep technical knowledge to attack
systems.
6. Insider Threats: Employees or trusted individuals who misuse access to systems for malicious
purposes.
4. What is an Attack? Explain Cyber Warfare
An Attack is any action meant to compromise the confidentiality, integrity, or availability of a
computer system or network.
Cyber Warfare refers to state-sponsored or organized attacks aimed at damaging or disrupting
another nation’s critical systems. Key components of cyber warfare:
Cyber Espionage: Spying on government or corporate systems.
Cyber Attacks on Infrastructure: Targeting vital systems like power grids, military
communication, etc.
Examples: Stuxnet, an attack on Iran’s nuclear program.
5. What is Indian Cyberspace?
Indian Cyberspace refers to the digital space and internet infrastructure that operates within India or
is accessed by Indian citizens. It includes:
Websites, networks, and social media platforms that are based in or operate in India.
Regulations like IT Act 2000 govern the conduct and usage of cyberspace in India.
6. Explain the Role of International Laws
International laws provide a framework for regulating activities across borders in cyberspace. These
laws:
1. Facilitate international cooperation in dealing with cybercrimes.
2. Establish jurisdiction over cross-border offenses.
3. Treaties and Agreements like the Budapest Convention help standardize cybercrime laws
internationally.
4. Promote data protection (e.g., GDPR in Europe) and ensure privacy rights are respected.
7. What is Cyber Forensics?
Cyber Forensics refers to the investigation and analysis of digital evidence related to cybercrimes. It
includes:
Data Recovery: Recovering deleted or corrupted data.
Evidence Gathering: Collecting information from hard drives, servers, mobile devices, etc.
Analyzing Logs: Examining system and network logs to trace actions of cybercriminals.
8. What is the Need for Computer Forensics?
Computer Forensics is essential for:
1. Legal Evidence: Providing digital evidence for court cases.
2. Incident Response: Helping investigators understand the nature of a cyber-attack.
3. Data Recovery: Restoring lost or damaged files.
4. Preventing Future Attacks: Understanding vulnerabilities and improving defenses.
5. Accountability: Tracing the actions of suspects in cybercrimes.
9. List Various Email Forensics Tools
Email forensics helps investigate and analyze email communication for evidence. Tools include:
1. EnCase: Used for email investigation and recovery.
2. X1 Social Discovery: For email and social media evidence collection.
3. MailXaminer: Specialized for email analysis.
4. Forensic Toolkit (FTK): Includes email forensic capabilities.
5. Elcomsoft Email Password Recovery: Recovers passwords from email files.
10. What are the Challenges in Computer Forensics?
Challenges in Computer Forensics include:
1. Encryption: Prevents access to data.
2. Data Volume: Large amounts of data make analysis difficult.
3. File Integrity: Ensuring data hasn’t been altered during the investigation.
4. Legal Issues: Obtaining permission for investigations, especially internationally.
5. Rapid Technological Changes: New technologies and platforms complicate the forensics
process.
11. List Various Legal Challenges in Cyber Security
Legal challenges in Cyber Security include:
1. Jurisdiction Issues: Difficulty in determining which country’s laws apply.
2. Privacy vs. Security: Balancing individual privacy with national security.
3. Cybercrime Legislation: Gaps in laws to address modern cybercrimes.
4. Data Protection: Compliance with regulations like GDPR and CCPA.
5. Intellectual Property: Protecting digital content from piracy and unauthorized distribution.
12. Explain Analysis in Digital Forensics Lifecycle
The Digital Forensics Lifecycle involves stages that investigators follow when handling digital
evidence:
1. Identification: Recognizing potential sources of digital evidence.
2. Collection: Gathering data in a legally compliant manner.
3. Examination: Analyzing the collected evidence for relevant information.
4. Analysis: Correlating and interpreting evidence to identify key findings.
5. Presentation: Presenting the findings in a clear, concise, and legally acceptable format.
6. Preservation: Ensuring that evidence is stored in a secure manner for future reference or
court use.
PS 3
1. What is Copyright Law? Also Explain Patent Law
Copyright Law:
Copyright grants exclusive rights to creators of original works (e.g., music, literature,
software, art) to reproduce, distribute, perform, or display their work.
Duration: In most countries, copyright lasts for the lifetime of the creator + 50-70 years.
Protection: Copyright protects the expression of ideas, not the ideas themselves.
Examples: A software program, book, song, or artwork can be copyrighted.
Patent Law:
Patent grants an inventor exclusive rights to make, use, and sell an invention for a limited
period (usually 20 years).
Protection: Protects inventions or new processes that provide a new way of doing something
or offer a new technical solution to a problem.
Examples: New technologies, machines, pharmaceuticals, or manufacturing processes can
be patented.
2. Describe the Information Technology Act 2000-4 (Sec 43, Sec 45, Sec 65 & Sec 68)
Section 43: Penalties for damage to computer systems and data, including hacking, spreading
viruses, and causing loss of data. It specifies fines up to ₹1 crore for various offenses.
Section 45: Prescribes the procedure for adjudication of cybercrimes under the IT Act. It
defines the powers of adjudicating officers to impose penalties.
Section 65: Criminalizes the act of tampering with computer source code with intent to
cause damage. This involves altering, deleting, or concealing data.
Section 68: Deals with the responsibilities of the government in securing the nation's
information systems and setting guidelines for the proper use of cyber technology in the
public sector.
3. Describe Domain Name and Related Issues
Domain Name is a human-readable address used to access websites (e.g.,
www.example.com).
Issues:
o Trademark Conflicts: Domain names that are similar to registered trademarks may
lead to legal disputes.
o Cyber Squatting: Registering domain names with the intent to sell them for profit,
especially when the names are similar to famous brands.
o ICANN: The Internet Corporation for Assigned Names and Numbers manages domain
registration globally.
4. Explain the Process of Patents in Cyber World
Filing: The first step is filing a patent application for a new and innovative technology,
process, or system.
Examination: Patent offices examine the application for novelty, utility, and non-obviousness.
Grant: If the patent meets all requirements, it is granted, and the inventor gets exclusive
rights for 20 years.
Patent in Cyber World: Cyber-related patents include inventions in encryption methods,
network security protocols, software algorithms, and AI-based systems.
5. Why Do We Use Digital Signatures?
Digital Signatures ensure the authenticity, integrity, and non-repudiation of digital messages
and documents.
They use public key cryptography to verify that the signature is from the stated sender and
the data has not been altered.
Commonly used in emails, software distributions, and contracts.
6. What is the Role of the Function of Certifying Authorities?
Certifying Authorities (CAs) are trusted entities that issue Digital Certificates and manage
public keys in public key infrastructure (PKI).
Their role:
o Verify the identity of individuals and organizations before issuing certificates.
o Sign digital certificates to validate the authenticity of the signer.
o Act as a trusted third party in securing communication and transactions.
7. Describe the Offences Breach of Confidentiality and Privacy
Breach of Confidentiality occurs when confidential information is disclosed without
permission.
o Examples: Leaking trade secrets, customer data, or insider information.
Breach of Privacy refers to the unauthorized access, use, or disclosure of personal
information.
o Examples: Unauthorized surveillance, sharing of personal data without consent, or
hacking personal accounts.
8. Explain the Regulation of Publication of Information
Regulation of Information involves ensuring that content published online does not violate
laws or ethical standards.
Key aspects:
o Defamation: Prohibits false or damaging statements about others.
o Obscenity: Restricts the distribution of obscene material.
o Hate Speech: Prevents content that incites violence or discrimination.
o Copyright: Prevents the unauthorized sharing or reproduction of copyrighted
content.
9. Distinguish Between Residual Risk and Risk Appetite
Residual Risk: The remaining risk after implementing security controls or mitigation
strategies. It represents the potential threat after measures have been taken.
Risk Appetite: The level of risk an organization is willing to take after considering the costs
and benefits of mitigating that risk.
10. Differentiate Between Authentication and Authorization, Giving an Example of Each
Authentication: Verifying the identity of a user or system.
o Example: A user logs in to a system by entering a username and password.
Authorization: Determining the permissions and access levels granted to a user or system
after authentication.
o Example: After logging in, a user with "Admin" rights can access all files, while a
"User" can access only specific folders.
11. What is Intellectual Property Crime?
Intellectual Property Crime refers to crimes that involve the theft, counterfeiting, or unauthorized
use of intellectual property (IP) such as patents, trademarks, copyrights, and trade secrets.
Examples:
o Software Piracy: Unauthorized copying and distribution of software.
o Counterfeit Goods: Producing and selling fake products that infringe on trademarks.
o Patent Infringement: Unauthorized use of patented technology.
12. Describe the Information Technology Act 2000-4 (Sec 46, Sec 64, and CRAT Rules)
Section 46: Specifies the powers and functions of the Controller of Certifying Authorities
(CCA). The CCA is responsible for regulating the issuance and management of digital
certificates.
Section 64: Provides the procedures for the recognition of foreign judgments in the context
of cyber laws. It is crucial for international cyber law enforcement.
CRAT (Cyber Regulation Appellate Tribunal) Rules: Govern the procedures for filing appeals
related to decisions made under the IT Act 2000. It allows individuals or organizations to
appeal the decisions of adjudicating officers or other authorities.
PS 4
1. What is Privacy and Freedom Issues in Cyber World?
Privacy Issues in cyberspace revolve around protecting individuals’ personal information,
ensuring that sensitive data is not accessed, stolen, or misused by unauthorized parties.
o Example: The unauthorized collection of personal information by websites or apps.
Freedom Issues concern the balance between individual rights to freedom of expression and
the risks of harm (like hate speech, defamation, or cyberbullying) that might be amplified
online.
o Example: The ability to post anonymously, which may lead to online harassment or
illegal content being shared without accountability.
2. Why Does Every Country Need Strong E-Governance?
E-Governance is the use of technology by governments to provide public services and engage with
citizens.
Efficiency: E-Governance makes administrative processes faster and more transparent,
reducing bureaucracy and corruption.
Access: It improves access to government services and information, especially for people in
rural or remote areas.
Cost-Effective: Reduces operational costs for the government and its citizens.
Accountability: Enables better monitoring and tracking of government programs.
Global Competitiveness: Countries with strong e-governance frameworks tend to be more
competitive globally.
3. List the Cybercrimes and Also Explain Cyber Law Against Them
Cybercrimes include:
1. Hacking: Unauthorized access to computer systems.
o Cyber Law: Section 66 of the IT Act 2000 criminalizes hacking and provides penalties.
2. Phishing: Attempting to acquire sensitive information through deceptive means.
o Cyber Law: Section 66C and 66D of the IT Act 2000 criminalize identity theft and
fraud.
3. Cyberbullying: Using the internet to harass or intimidate others.
o Cyber Law: Section 66A criminalized sending offensive messages, although it was
later struck down.
4. Cyber Terrorism: Using the internet for terrorism, such as planning or executing attacks.
o Cyber Law: Section 66F of the IT Act 2000 criminalizes cyber terrorism.
4. What is Data Protection Law in the USA and EU?
USA:
o The USA does not have a single data protection law, but regulations like the
California Consumer Privacy Act (CCPA) and Health Insurance Portability and
Accountability Act (HIPAA) protect personal data.
o CCPA gives residents of California the right to know what personal data is being
collected and to request its deletion.
EU:
o The General Data Protection Regulation (GDPR) is a comprehensive data protection
law in the EU.
o It mandates that organizations protect the personal data and privacy of EU citizens
and offers individuals greater control over their data.
o Key Features: Right to access, right to be forgotten, and mandatory data breach
notification.
5. What is Child Abuse Protection Law in EU and USA?
EU:
o The EU has various regulations that aim to protect children from online abuse,
including the EU Directive on Child Sexual Abuse.
o It requires member states to ensure the prevention and criminalization of online
child sexual abuse and exploitation.
USA:
o The Children's Online Privacy Protection Act (COPPA) regulates the collection of
personal information from children under 13.
o The Protect Our Children Act also deals with child exploitation and abuse online,
making it illegal to distribute child pornography and providing tools to track
offenders.
6. Explain the Cyber Law of Malaysian Approach
Malaysian Cyber Law is governed by the Digital Signature Act 1997 and Computer Crimes
Act 1997, among others.
Key Features:
o Cybercrime: It criminalizes unauthorized access to computer systems, damage to
data, and the use of illegal devices to commit crimes.
o Digital Signatures: It supports the legal use of digital signatures for secure
transactions.
o Privacy: Protects personal data under the Personal Data Protection Act (PDPA).
7. How Does E-Business Follow Cyber Law?
E-business must comply with various cyber laws to ensure legality, protect customer data, and
prevent fraud. Common practices include:
1. Data Protection: Ensuring customer information is protected through encryption and secure
storage.
2. Digital Contracts: Using legally recognized digital signatures for contracts.
3. Intellectual Property: Respecting copyrights, trademarks, and patents in products and
services.
4. Consumer Protection: Ensuring transparency and preventing fraudulent activities through
secure payment systems.
8. Describe Cyber Evidence Management
Cyber Evidence Management refers to the process of collecting, storing, and analyzing digital
evidence related to cybercrimes.
Steps:
o Identification: Detecting potential digital evidence such as logs, hard drives, or
emails.
o Collection: Ensuring the proper collection of evidence in a way that preserves its
integrity.
o Analysis: Examining the collected evidence to understand the nature of the crime.
o Preservation: Keeping the evidence intact for future legal proceedings.
o Presentation: Presenting the findings in court or other legal forums.
9. Why Do Organizations Want Compliance Audits?
Organizations need compliance audits to:
1. Ensure Legal Compliance: Make sure they are following relevant laws and regulations, such
as GDPR or PCI DSS.
2. Identify Risks: Find and fix vulnerabilities or gaps in their security and data protection
measures.
3. Maintain Reputation: Demonstrating commitment to privacy and security builds trust with
customers.
4. Prevent Fines and Penalties: Non-compliance can result in significant legal and financial
consequences.
5. Improve Security: Audits help identify areas of improvement in cybersecurity.
10. Information Technology Act 2000-2 (Sec 14 to 42 and Certifying Authority Rules)
Section 14 to 42 of the IT Act 2000 covers the legal framework for:
o Digital Signatures: Establishing the legal validity of digital signatures.
o Adjudicating Officers: Appointment of officers to adjudicate cyber offenses.
o Cyber Appeals: The framework for appealing decisions related to cyber offenses.
o Liability of Intermediaries: Outlining the responsibilities and protections for internet
service providers, platforms, etc.
Certifying Authority Rules:
o These rules regulate the functioning of Certifying Authorities (CAs) that issue digital
certificates.
o They define the processes for verifying identities, ensuring the security of digital
certificates, and their use in online transactions.
11. Explain the Essence of Digital Contract
A Digital Contract is an agreement made in the digital or electronic form, such as through email or
online forms. It involves:
1. Digital Signatures: Ensuring that both parties have agreed to the terms electronically.
2. Legality: Recognized under laws such as the IT Act 2000 and E-Sign Act (USA), where
electronic contracts are as enforceable as paper contracts.
3. Convenience: Allows parties to enter into contracts without needing physical signatures or
in-person meetings.
4. Security: Protects against fraud by using digital signatures and encryption.
12. Explain Cyber Jurisprudence
Cyber Jurisprudence refers to the study and application of laws related to cyberspace and the
internet.
It deals with issues like:
o Jurisdiction: Determining the legal authority over cybercrimes and disputes.
o Legal Frameworks: Analyzing international treaties and national laws that govern
cyberspace.
o Ethical Considerations: Examining how legal systems balance individual rights (e.g.,
freedom of expression, privacy) with the need to protect citizens from harm.
o Cybercrime Enforcement: Addressing challenges in prosecuting cybercrimes,
especially in the global context.