Final CSL
Final CSL
Definition Any illegal activity carried out using A type of cybercrime where cheating or
computers, networks, or the internet. deception is done mainly for financial
gain.
Objective Can be stealing data, damaging systems, Always focused on money, property, or
harassment, spreading fear, or harming personal financial data.
national security.
Examples Hacking government websites, spreading Online banking fraud, credit card fraud,
viruses, cyber terrorism, identity theft. fake shopping websites, phishing
scams.
3. Explain the objectives and features of IT Act 2000 . Dec 2022, Jan 2024, June 2025
Ans : - The Information Technology (IT) Act 2000 is the first law in India to deal with
cybercrimes and electronic commerce. It gives legal recognition to online activities and also
defines punishments for cyber offences.
4. How cybercrimes differs from most terrestrial crimes ? June 2023,June 2025 , Nov 2024
Ans : - Cybercrimes are crimes done using computers, the internet, or mobile networks, while
terrestrial crimes are traditional crimes like theft, robbery, or murder that happen in the real
world. The main difference is that cybercrimes do not need the criminal to be physically present.
A person sitting in one country can attack computer systems in another country, but terrestrial
crimes usually happen in one local place.
In terrestrial crimes, the proof is mostly physical such as fingerprints, weapons, or CCTV videos.
In cybercrimes, the proof is digital like emails, IP addresses, log files, or online payment records.
Cybercrimes can harm thousands or even millions of people at the same time, for example by
sending a virus or doing phishing scams, but terrestrial crimes normally affect only a few people
at one place.
Cybercrimes also happen very quickly, like transferring money illegally within seconds, while
terrestrial crimes usually take more time to plan and commit. Cybercriminals are also harder to
catch because they hide their identity using fake accounts, VPNs, and anonymous tools, while
terrestrial criminals can be identified more easily with witnesses and physical evidence.
Thus, cybercrimes are different from terrestrial crimes because they are global, very fast,
difficult to trace, and can affect many people at once, which makes them more difficult to
control.
5. What is Cybercrime ? Who are Cybercriminals ? Explain . June 2023 ,June 2025 , Nov
2024
Ans : - What is Cybercrime?
1. Cybercrime is any illegal activity carried out using computers, mobile devices, the
internet, or digital networks.
2. It can involve stealing data, damaging systems, cheating people, or disturbing society.
3. Common examples are hacking, phishing, spreading viruses, online banking fraud,
identity theft, and cyberbullying.
4. Cybercrime may target individuals, organizations, or even governments.
5. The main goals are money gain, data theft, revenge, harassment, or terrorism.
4. Cybercriminals often hide their identity using fake names, VPNs, or anonymous accounts.
5. They may work alone, in small groups, or in large organized gangs.
6. What are different security risks for organizations? Dec 2024 , Dec 2025
Ans :- Organizations today face many security risks due to heavy use of computers, networks,
and the internet. The main security risks are:
1. Malware Attacks
● Malicious software like viruses, worms, trojans, and ransomware.
● Can damage files, steal data, or lock systems until ransom is paid.
3. Insider Threats
● Risks caused by employees or ex-employees.
● They may misuse access rights, leak sensitive data, or cause harm intentionally.
4. Data Breaches
● Unauthorized access to confidential data like customer records, financial info, or
intellectual property.
● Can damage reputation and lead to legal issues.
7. Outline the challenges for securing data from a business perspective . Dec 2024
Ans : - In today’s digital world, businesses depend heavily on data. Protecting this data is very
challenging due to the following reasons:
2. Insider Threats
● Employees or ex-employees may misuse their access rights.
● Data leaks or intentional misuse from inside the company are hard to detect.
3. Data Breaches
● Unauthorized access to customer or company information.
● Can damage reputation, cause financial loss, and legal problems.
7. Cost of Security
● Strong security systems need high investment.
● Small businesses may not afford advanced protection.
8. Explain how an Appeal can be made under the IT Act 2000. Term Test
Ans :- The IT Act 2000 provides a system to resolve disputes and punish cyber offences.
If a person is not satisfied with the decision of the Adjudicating Officer, they can file an
appeal. The process is as follows:
● If someone is unhappy with the order of the Adjudicating Officer (for example, in a case
of hacking, data theft, or fraud), they can file an appeal to the Cyber Appellate Tribunal.
● The appeal must be made within 45 days from the date of the order.
2. Time Extension
● If the person is unable to appeal within 45 days due to valid reasons, the Tribunal may
allow extra time.
3. Tribunal’s Role
● The Cyber Appellate Tribunal reviews the case, hears both parties, and then gives a final
decision.
● The Tribunal has the same powers as a civil court.
● If still not satisfied with the Tribunal’s decision, the person can appeal to the High Court
within 60 days from the Tribunal’s order.
5. Final Authority
● The decision of the High Court is final and binding, unless taken further to the
Supreme Court in rare cases.
9. Explain key features of Indian Information Technology Act 2000. Term Test
Ans : - The Information Technology (IT) Act 2000 is India’s first cyber law, created to handle
electronic transactions, cybercrimes, and online security. Its key features are:
Key Features:
4. Cybercrimes Defined
● Clearly defines crimes like hacking, identity theft, cyberstalking, publishing obscene
content, and fraud.
7. Appellate Tribunal
● A Cyber Appellate Tribunal is set up for resolving disputes and appeals under the Act.
9. Jurisdiction
● The Act applies to offences committed in India as well as abroad if the system affected is
in India.
Module - 2
1. Explain various threats associated with cloud computing . Dec 2022
Ans :- Cloud computing is storing and accessing data or applications over the internet instead of
a personal computer. Though it is useful, it has some threats:
1. Data Breach
● Sensitive data (bank details, personal info) can be stolen by hackers.
● Example: A hacker breaking into cloud storage to steal customer records.
2. Data Loss
● Data may get deleted due to accidental deletion, cyberattacks, or server crashes.
● Example: Losing important company files stored on the cloud.
3. Account Hijacking
● Cybercriminals can steal usernames and passwords to access cloud accounts.
● Example: Using phishing emails to hack into a user’s Gmail or cloud account.
4. Insecure Interfaces & APIs
● Cloud services use APIs for communication. If they are weak, hackers can misuse them.
● Example: Exploiting weak APIs to gain unauthorized access.
5. Insider Threats
● Employees or service providers may misuse access to steal or leak data.
● Example: A staff member downloading confidential company data.
6. Denial of Service (DoS) Attacks
● Hackers overload the cloud servers with traffic, making services slow or unavailable.
● Example: An e-commerce site becoming inaccessible during a DoS attack.
7. Lack of Control
● Users depend on the cloud provider. If the provider fails, users lose services.
● Example: Outage in cloud service affecting business operations.
3. Social Engineering
● Manipulating people to share confidential information.
● Example: A caller pretending to be from IT support and asking for login details.
6. Password Attacks
● Hackers try to crack or steal weak passwords using brute force, guessing, or stealing.
● Example: Trying thousands of combinations until the correct password is found.
7. Insider Threats
● Employees or trusted users misuse access for personal gain or revenge.
● Example: A staff member leaking company data.
8. SQL Injection
● Inserting malicious code into a website’s database through input fields.
● Example: Stealing usernames and passwords from a database.
3. Skimming Fraud
● Criminals use a skimming device at ATMs or shops to copy credit card information from
the magnetic strip.
● Example: Fake card readers at fuel stations.
4. Phishing Fraud
● Fake emails, SMS, or websites trick people into sharing credit card details.
● Example: A fake bank email asking to “verify card details.”
5. Application Fraud
● Criminals use stolen personal documents to apply for a new credit card in someone
else’s name.
● Example: Using fake ID proofs to get a card.
4. What are botnets ? How it is exploit by attacker to cause cyber attack ? / Short note on
Botnets . Dec 2022, Jan 2024 / Nov 2024
Ans :- A Botnet is a network of computers, laptops, or devices that are infected with malware
and controlled by a hacker without the owner’s knowledge.
● Each infected device is called a bot or zombie because it follows the hacker’s
instructions secretly.
● Hackers control all these bots together using a Command-and-Control (C&C) server.
● Botnets can include thousands or even millions of devices worldwide.
3. Data Theft
○ Hackers use botnets to steal sensitive information like credit card details, login
IDs, and passwords from infected systems.
4. Click Fraud
○ Botnets generate fake clicks on online advertisements to make illegal money for
attackers.
5. Spreading Malware
○ Botnets are used to spread viruses, ransomware, or spyware to more computers.
5. Explain how criminals plan the attack / Discuss steps involved in planning of
cyberattacks by criminal . Jan 2024, June 2023 , June 2025
Ans :- Steps Involved in Planning of Cyberattacks by Criminals
Cybercriminals do not attack directly. They usually plan their attacks step by step to make sure
they are successful and remain hidden. The main steps are:
4. Maintaining Access:
○ Once inside, attackers install backdoors or hidden programs so they can return
anytime.
○ Example: Installing a Trojan to control the computer remotely.
6. Execution of Attack:
○ Finally, they perform the main attack, such as stealing data, transferring money,
or crashing the system.
Mobile devices like smartphones and tablets are widely used for banking, shopping, social
media, and business. But they face many security challenges:
2. Insecure Applications
○ Many apps ask for unnecessary permissions (like access to contacts, camera, or
location).
○ Malicious apps can steal sensitive information.
5. Malware Attacks
○ Mobile malware such as spyware, Trojans, and adware can be installed through
fake apps or links.
○ These can steal passwords, banking info, or track user activity.
6. Data Leakage
○ Many apps collect and share user’s personal data without consent.
○ Example: Location tracking by apps.
Guidelines:
1. Minimum Length
○ Passwords should be at least 8–12 characters long.
○ Longer passwords are harder to guess.
Meaning:
Mobile vulnerabilities are weak points or security flaws in smartphones and tablets that
attackers can use to steal data, spy on users, or damage the device. Since mobiles store personal,
financial, and business information, these vulnerabilities are very risky.
1. Insecure Apps
○ Some apps are poorly designed and have weak security.
○ Hackers can use these apps to steal data like contacts, photos, or banking details.
4. Weak or No Passwords
○ Many users don’t set strong passwords or use no lock at all, making it easy for
attackers to access data.
6. Phishing Attacks
○ Fake SMS, emails, or links trick users into giving personal details or downloading
harmful files.
8. Data Leakage
○ Some apps secretly send user data (like location, messages, or photos) to third
parties without permission.
9. What is vishing attack ? how it works ? how to protect from vishing attack ? June 2023 ,
June 2025 , Nov 2024
Ans :- Vishing stands for Voice Phishing.
It is a type of cyber attack where criminals use phone calls or voice messages to trick people
into sharing personal details like bank account numbers, OTP, credit card PIN, or
passwords.
Example: A fraudster pretending to be from a bank calls and asks for your OTP saying, “Your
account will be blocked if you don’t give it now.”
The stolen information is then misused for fraud, money theft, or identity theft.
How Vishing Attack Works?
1. Never share personal info like PIN, OTP, CVV, or passwords on phone calls.
2. Banks never ask OTP/PIN on calls – always remember this.
3. Verify caller identity by calling the official customer care number.
4. Don’t trust unknown calls claiming rewards, loans, or job offers.
5. Report suspicious calls to the bank or cybercrime helpline.
10. What are basic security precautions to be taken to safeguard Laptops and Wireless
devices ? Explain ? June 2023 ,June 2025 , Nov 2024
Ans :- Basic Security Precautions to Safeguard Laptops and Wireless Devices
1. Use Strong Passwords – Always set a strong password or PIN for login. Avoid
easy passwords like 1234 or your name.
2. Enable Antivirus and Firewall – Install trusted antivirus software and keep the
firewall turned ON to block attacks.
3. Keep Software Updated – Regularly update operating system, antivirus, and
applications to fix security holes.
4. Encrypt Data – Use encryption tools so that even if the laptop is stolen, data
cannot be easily read.
5. Secure Wi-Fi Connection – Use WPA2/WPA3 security for Wi-Fi and avoid
using open public Wi-Fi for sensitive work.
6. Disable Bluetooth/Wi-Fi when not in use – Attackers can misuse open
connections, so turn them off when not needed.
7. Avoid Public Charging Stations – Use your own charger to prevent juice
jacking (data theft through USB charging).
8. Backup Important Data – Store data in cloud or external drive, so even if device
is lost, data is safe.
9. Physical Safety – Do not leave laptop or device unattended in public places. Use
locks if possible.
10. Be Alert to Phishing – Do not click on unknown links or download files from
suspicious sources.
11. What are illegal activities observed in Cyber Cafe ? What are safety and security
measures while using the computer in Cyber Cafe ? June 2023 ,June 2025
Ans :- Illegal Activities Observed in Cyber Café
Cyber cafés are public places where many people use computers and the internet. Some people
misuse them for illegal purposes such as:
To avoid risks, both users and café owners must follow safety rules:
12. Explain about the impact of Cybercrimes in Social Engineering ? June 2025
Ans :- Impact of Cybercrimes in Social Engineering
1. Loss of Money – Victims may share banking details or OTPs and lose money
through fraud transactions.
2. Identity Theft – Hackers steal personal information like name, phone number, or
Aadhar details to misuse the victim’s identity.
3. Emotional Damage – Victims feel cheated, embarrassed, and lose confidence
after being tricked.
4. Data Breach – Criminals may trick employees to reveal company login details,
causing leakage of sensitive business data.
5. Spread of Malware – Victims may be convinced to click on links or download
files, which install viruses or ransomware.
6. Damage to Reputation – If an employee shares secret data, the organization’s
image and trust may be harmed.
7. Large-Scale Attacks – Using social engineering, criminals can attack many
people at once (like phishing emails), affecting society widely.
Cybercrime means crimes done using computers, mobile phones, or the internet. These crimes
target individuals, organizations, or even governments.
Different Types:
1. Hacking
○ Unauthorized access to someone’s computer or system.
○ Example: Breaking into an email account.
2. Phishing
○ Sending fake emails/messages to trick people into sharing personal info like bank
details or passwords.
○ Example: Fake bank SMS asking for OTP.
3. Identity Theft
○ Stealing someone’s personal details (Aadhar, PAN, Credit Card info) and
misusing them.
○ Example: Opening a bank account using stolen identity.
4. Financial Frauds
○ Using online methods to cheat people for money.
○ Example: Credit card fraud, online shopping scams.
5. Cyberstalking
○ Continuous harassment or threatening someone online using emails, social media,
or chats.
6. Spreading Malware/Viruses
○ Releasing harmful software that damages files, steals data, or blocks access.
○ Example: Ransomware attacks.
8. Cyber Terrorism
○ Using the internet to attack critical infrastructure like banking, power grids, or
defense systems.
9. Child Exploitation
○ Misusing the internet to target children for illegal or harmful activities.
○ Cyberstalking means using the internet, social media, emails, or other digital
platforms to continuously follow, threaten, or harass someone online.
○ It is similar to physical stalking but happens in the virtual world.
1. Methods Used
○ Sending repeated unwanted or threatening emails/messages.
○ Tracking someone’s online activities without permission.
○ Misusing personal information, photos, or videos.
○ Creating fake accounts to spread rumors or damage reputation.
2. Impact on Victims
○ Causes fear, stress, mental trauma, and loss of privacy.
○ May lead to depression or harm to personal/professional life.
3. Example
○ A person repeatedly sending threatening messages on Instagram or WhatsApp
even after being blocked.
4. Legal Aspect
○ In India, Section 354D IPC and the IT Act 2000 deal with cyberstalking and
provide punishment.
Cyber Harassment
2. Impact on Victims
○ Causes emotional stress, fear, loss of confidence, and damage to reputation.
○ May disturb personal and professional life.
3. Example
○ A student constantly receiving insulting comments on their social media posts.
4. Legal Aspect
○ In India, IT Act 2000 and IPC Sections (like 499, 500, 509) provide protection
against online harassment.
16. What is digital Evidence ? Where can one find it? / Short note on Digital Evidence ?
June 2025/ June 2023 , Nov 2024
Ans :-
Digital Evidence means any information or data stored, transmitted, or received in
electronic form that can be used in a court of law during investigation.
It is not physical evidence like fingerprints or weapons, but electronic records that help in
proving a crime.
Examples include emails, text messages, call records, photos, videos, online transaction
logs, IP addresses, and browsing history.
It is very important in solving cybercrimes because it helps to identify criminals, trace
activities, and confirm facts.
Digital evidence can be found in any device or platform that stores or transmits data
electronically, such as:
● These bots can perform tasks like sending spam emails, launching cyberattacks, or
stealing data.
Is it Crucial in Cybersecurity?
1. Cyber Threat – Botnets are used in DDoS attacks to overload websites and make them
unavailable.
2. Spam and Phishing – They send millions of fake emails to trick users into sharing
sensitive information.
3. Malware Distribution – Botnets can spread viruses or ransomware to many computers at
once.
4. Stealing Information – Hackers use botnets to collect passwords, banking details, or
personal data.
5. Hard to Detect – Botnets operate silently, making it difficult for cybersecurity teams to
identify and stop them.
Module - 3
1. Explain methods of Password cracking . Dec 2022
Ans :- Methods of Password Cracking
Password cracking is the process used by attackers to guess or steal passwords to gain
unauthorized access to systems, accounts, or data.
Common Methods:
2. Dictionary Attack
a. Using a predefined list of common words, passwords, or phrases to guess the
password.
b. Faster than brute force if the password is a common word.
3. Phishing
a. Tricking users into revealing their passwords via fake emails, websites, or
messages.
4. Keylogging
a. Installing software or hardware that records the keystrokes typed by a user to
capture passwords.
5. Social Engineering
a. Manipulating or tricking people to reveal passwords by exploiting trust or human
behavior.
b. Example: Pretending to be IT support and asking for login credentials.
7. Credential Stuffing
a. Using leaked usernames and passwords from other breaches to try logging
into multiple accounts.
8. What do you understand by DOS and DDOS attack ? Explain in detail. Dec 2022, Jan
2024
Ans :- DoS and DDoS Attacks
● Meaning: A DoS attack occurs when a hacker floods a server, website, or network
with excessive requests to make it unavailable to legitimate users.
● Goal: To disrupt normal functioning and prevent access to services.
● Example: Sending too many requests to a website so it crashes or becomes very slow.
● Characteristics:
○ Usually launched from a single computer or network.
○ Targets availability of services rather than stealing data.
Preventive Measures:
9. Explain SQL Injection attack . State different counter measure to prevent the attack . Dec
2022, Jan 2024
Ans :-
● SQL Injection is a cyberattack where attackers insert malicious SQL code into input
fields (like login forms, search boxes, or URLs) to manipulate the database.
● It allows attackers to access, steal, modify, or delete sensitive data without
authorization.
How it Works:
● Phishing is a type of cyberattack where attackers trick people into revealing sensitive
information like usernames, passwords, bank account details, or credit card numbers.
● Attackers usually use fake emails, messages, websites, or phone calls that look genuine.
1. The attacker sends a fake email, message, or link appearing as if it’s from a legitimate
organization.
2. The victim clicks the link or provides personal information.
3. The attacker captures the information and uses it for fraud, identity theft, or
unauthorized access.
Types of Phishing:
Identity Theft
● Identity theft is when someone steals another person’s personal information and
misuses it for illegal purposes like opening bank accounts, taking loans, or committing
fraud.
How Identity Theft Happens:
1. Attackers collect personal data like name, date of birth, PAN, Aadhar, or credit
card numbers.
2. They use this information to commit fraud, create fake accounts, or access
sensitive services.
11. Explain different buffer overflow attacks and also explain how to mitigate buffer
overflow attack . Dec 2022 / Short note on Buffer Overflow attack . June 2023 , June
2025 , Nov 2024
Ans :-
● A buffer overflow attack happens when a program tries to store more data in a memory
buffer than it can hold.
● This can overwrite adjacent memory, leading to unexpected behavior, crashes, or
allowing attackers to execute malicious code.
1. Input Validation
a. Always check the size of user input before storing it in a buffer.
2. Use Safe Functions
3. Stack Canaries
c. Special security values placed on the stack to detect buffer overflows before
execution.
12. Difference between virus and worm . June 2023 ,June 2025
Ans :-
Feature Virus Worm
Activation Activated when the infected file or Can act automatically without user
program is run. intervention.
Damage Can corrupt files, delete data, or Can consume bandwidth, slow down
slow down systems. networks, and sometimes carry
payloads to damage systems.
● Unlike cryptography, which scrambles the content, steganography hides the existence
of the content itself.
How it Works:
● Secret data can be hidden in images, audio files, video files, or text files.
● Example: Changing the least significant bits (LSB) of an image to store hidden text or
message.
● The receiver uses a specific method to extract the hidden information.
Types of Steganography:
Uses / Applications:
● DDOS attack
Ans :-
How it Works:
1. The attacker infects multiple computers or devices with malware to form a botnet.
2. These devices send a huge number of requests to the target system simultaneously.
3. The target system gets overloaded and may crash or become very slow.
Impact:
Prevention / Mitigation:
● A Trojan Horse is a malicious program that appears legitimate but contains harmful
code.
● It tricks users into downloading or running it, thinking it is safe software.
Characteristics:
Example:
● A fake antivirus program that, when installed, steals passwords or personal data.
Backdoor
● A Backdoor is a hidden method or entry point in a program or system that allows
unauthorized access without normal authentication.
Characteristics:
Example:
● A hacker installs a backdoor in a web server to access sensitive files anytime.
14. Explain steps for SQL Injection attack . How to prevent SQL Injection attacks ? June
2025, Nov 2024 / What is SQL Injection and how can it be prevented? Term test
Ans :- SQL Injection Attack:
● SQL Injection is a cyberattack where an attacker inserts malicious SQL code into input
fields of a website or application to access, steal, or manipulate database information.
1. Input Validation
a. Ensure only valid data (letters, numbers) is accepted in input fields.
b. Use queries that separate code from data, preventing execution of malicious
commands.
3. Stored Procedures
Key Points:
1. The attacker identifies a vulnerable input field in a website, like a comment box or search
bar.
3. When other users view the page, the malicious script runs on their browser.
4. The attacker can steal cookies, session tokens, or personal information, or redirect users
to malicious sites.
1. Stored XSS – Malicious script is stored on the server and executed whenever users
access the page.
2. Reflected XSS – Script is reflected from the server via URL or input field and executed
immediately.
3. DOM-based XSS – Script manipulates the web page DOM on the client side without
involving the server.
Impact:
Prevention Measures:
1. Input Validation – Validate and sanitize all user inputs to remove malicious
code.
2. Output Encoding – Encode output before displaying it on the web page.
3. Use Secure Libraries/Frameworks – Use frameworks that automatically
prevent XSS.
4. Content Security Policy (CSP) – Restrict which scripts can run on a webpage.
5. Regular Security Testing – Scan web applications for XSS vulnerabilities.
1. The attacker searches for Bluetooth-enabled devices within range (usually 10 meters
for standard Bluetooth).
2. They exploit weak security settings or vulnerabilities to connect without permission.
3. Once connected, the attacker can:
○ Access contacts, messages, or files.
○ Intercept data transmissions.
○ Install malware or spy on device activity.
1. Bluesnarfer – Steals data such as contacts and messages from Bluetooth devices.
2. Bluebugger – Takes control of mobile phones to make calls, send messages, or access
data.
3. BlueSmack – Performs Denial of Service (DoS) attacks on Bluetooth-enabled devices.
4. BTScanner – Scans for discoverable Bluetooth devices to find vulnerable targets.
5. BlueBorne Exploit Toolkit – Exploits Bluetooth protocol vulnerabilities to gain full
device control.
● A firewall is a network security device or software that monitors and controls incoming
and outgoing network traffic based on predetermined security rules.
● It acts as a barrier between a trusted internal network and untrusted external networks,
such as the internet.
Functions of a Firewall:
Types of Firewalls:
1. Hardware Firewall – Physical device installed between a network and the internet.
2. Software Firewall – Installed on a computer to monitor traffic on that device.
3. Next-Generation Firewall (NGFW) – Advanced firewall with intrusion detection, deep
packet inspection, and application control.
Module - 4
1. Write a note on Intellectual Property Aspects in cyber law . Term Test
Module -5
Module - 6