Budge Budge Institute of Technology
Department of Computer Science Engineering
Subject: Cyber Law & Ethics Subject Code: OEC-CS801B
Faculty: Prof.(Dr.) Amitava Sen Date of Submission: 28.02.2024
Full Marks: 25 Circular Date: 22.02.2024
Sub: Regarding CA2 of OEC-CS801B Cyber Law & Ethics
Dear students,
As per the submission requirements of the CA-2 prescribed by the MAKAUT University,
the students are advised to submit a scanned copy of the handwritten answer (pdf version
only) in the google form on or before 28.02.2024.
The students should adhere to the following the guidelines while submitting the requisite
documents:
1. Each student shall answer all the questions from the Questions Paper Set only.
2. The answers shall be hand-written in A4 sheets, clearly mentioning
the student’s name, roll no. on the top of each sheet.
3. All the hand-written A4 sheets shall be scanned into a single pdf file and uploaded in the
google form given below. While uploading the scanned file, it shall be saved as:
Student Name_RollNo._CA2.CLE.pdf
4. The pdf file shall be uploaded in the google form provided at the following link:
https://forms.gle/VUVgDzCD33U4vMQF7
5. The hand written sheet should be submitted to the undersigned on or before 28th
Frbruary 2024.
If hard copy is not received in time and does not follow the above guidelines, the CA2
Marks will be filled as absent.
Prof.(Dr.) Amitava Sen
Professor CSE
M. No.9875447575
28.02.2024
Budge Budge Institute of Technology
Assignment for Internal Assessment – II (IA – II)
Stream: B. TECH (Electronics and Communication Engineering)
th th
Semester: 8 (EVEN) Year: 4 Year
Paper Code: OEC-CS801B Paper Name: Cyber Law & Ethics
Full Marks: 25 Academic Year 2023-24
QUESTION SET
Attempt ALL Questions
5 x 5 = 25 Marks
Q# 1 What is cybercrime?, Describe Category of Cybercrime How criminals plan
attacks, passive attack, Active attacks, cyberstalking?
Q# 2 What Laws and Regulations governs Cyber Security in India
Discuss salient point of that.
Q# 3 What Counter Measures can be implemented in E commerce framework for
Cyber Attack?
What is Botnets?
Q# 4 Explain each terms :Proxy servers, password checking, Trojan Horses and Backdoors;
DOS & DDOS attacks; SQL injection: buffer over flow
Q# 5 Explain Security challenges posted by mobile devices & cryptographic
security for mobile devices,
Write short notes on Data Theft, Hacking. & Different viruses on laptop