90 8F 98 AC 4A FD AB 8D A8 FD4AAC988F909152C418486181A88DAB DA 88 88 1A 1A 18 86 84 6 48 18 C4 52 5 91 90 8F 98 AC AC 9 4A 4A FD FD AB AB 8D 8D A8 61 81 61 48 18 C4 52 91 90 8F 98 AC 4A FD AB 10 10 10 48 52 91 8F 98 AC 4A 10 18 C4 52 91 90 98 FD 81 61 48 18 C4 52 91 10 10 8D A8 61 18 C4 52 91 90 8F 81 48 C4 15 AC AB 8D A8 81 61 48 18 C4 52 91 90 8F 91 90 8F 98 AC 4A FD A8 81 10 10 48 18 C4 52 91 90 8F 98 AC 4A FD AB 8D A8 81 61 18 2C 48 41 61 84 81 86 A8 18 8D 1A 86 84 41 09 F9 FD AB 8D A8 81 61 48 18 C4 52 91 90 8F 4A BF DA 88 1A 18 86 84 41 88 C9 AA D4 BF DA 88 1A 18 86 2C 18 2C 09 F9 88 C9 AB 8D A8 81 61 48 18 C4 52 91 90 8F 98 AC 4A FD AB AA D4 BF DA 88 1A 18 86 84 41 2C 15 09 F9 88 C9 AA D4 BF DA 88 15 F9 88 C9 AA D4 BF DA 88 1A 18 86 84 41 2C 15 09 F9 88 C9 AA D4 BF DA 88 1A 18 86 84 41 15 09 88 C9 AA D4 BF DA 18 86 84 41 2C 15 09 F9 88 C9 AA D4 BF DA 88 41 09 F9 2C 15 F9 88 C9 AA D4 1A 18 86 84 41 2C 15 09 F9 88 C9 AA D4 88 1A 86 41 2C 15 09 F9 88 C9 BF 1A 2C 15 09 F9 88 C9 AA D4 Write short notes on any FOUR Cyberdefamation HIPAA Buffer overflow attack Steganography DDOS attack Trojan horse and backdoor ************* 15 26426 98 18 86 84 41 2C 15 09 F9 88 C9 AA D4 BF DA 88 09 F9 DA 18 86 84 41 2C 15 09 F9 88 C9 What is digital evidence? Where one can find it. What are illegal activities observed in Cyber Cafe? What are safety and security measures while using the computer in Cyber Cafe? Q.6 a b c d e f AC 88 1A 86 84 41 2C 15 09 F9 Q.5 a b 20 What are basic security precautions to be taken to safeguard Laptops and Wireless devices? Explain. What is Cybercrime? Who are Cybercriminals? Explain. 84 41 AA D4 BF DA 88 1A 18 What is e-commerce? Discuss types of e-commerce. Explain E-contracts and its different types. AA D4 BF 1A 88 84 C4 52 91 90 8F 98 AC 4A FD AB 8D A8 81 61 48 18 C4 52 88 b C9 18 2C BF Discuss steps involved in planning of cyberattacks by criminal. What is vishing attack? How it works? How to protect from vishing attack? 91 90 8F 86 15 C9 AA DA Q.2 a b DA 88 1A 84 41 09 F9 88 D4 88 18 Attempt any FOUR of the following List General guidelines for password policies. Difference between virus and worm. How cybercrimes differs from most terrestrial crimes? What are different Security Risks for Organizations? What are Mobile Vulnerabilities? Q.3 a b AA D4 BF 18 2C 15 C9 Max. Marks: 80 Q1 a b c d e Q.4 a 98 AC 4A FD DA 88 1A 86 84 41 09 F9 AA 18 48 1A 61 88 81 DA A8 BF 8D N.B.: 1) Question No.1 is compulsory. 2) Attempt any THREE questions out of remaining FIVE questions. 3) Figures to the right indicates full marks. 4) Assume suitable data if necessary. D4 86 41 09 2C 15 F9 88 C9 AA D4 84 2C 15 09 8F 98 AC 4A FD AB 41 1T01237 - B.E.(Information Technology Engineering)(SEM-VII)(Choice Base Credit Grading System ) (R- 19) (C Scheme) / 42686 - Cyber Security Laws QP CODE: 10026426 DATE: 26/06/2023 Duration: 3 hours DA 8 18 84 86 41 2C 91 90 1A 1 8 52 Paper / Subject Code: 42686 / Cyber Security Laws 20