Exam Details
Subject | cyber security and it governance (csitg) | |
Paper | ||
Exam / Course | mba | |
Department | ||
Organization | Gujarat Technological University | |
Position | ||
Exam Date | December, 2018 | |
City, State | gujarat, ahmedabad |
Question Paper
1
Seat No.: Enrolment
GUJARAT TECHNOLOGICAL UNIVERSITY
MBA SEMESTER 3 EXAMINATION WINTER 2018
Subject Code: 3539254 Date:12/12/2018
Subject Name: Cyber Security and IT Governance (CSITG)
Time:10:30 AM To 01:30 PM Total Marks: 70
Instructions:
1. Attempt all questions.
2. Make suitable assumptions wherever necessary.
3. Figures to the right indicate full marks.
Q.1
Define the following term briefly:
14
Forgery Social Engineering Salami Attack (d)Backdoors Identify Theft Email Spoofing Password Sniffing
Q.2
Explain the possible attacks on cell phones with examples
07
How are cyber crimes classified? Explain with example.
07
OR
What is cyber stalking? How stalking works?
07
Q.3
Define phishing. Explain spam emails and hoax emails.
07
State the salient features of the Indian IT Act .
07
OR
Q.3
Describe the specific challenges that exist in India with regard to the law and cyber crime scenario in India.
07
Discuss how criminals plan the attack?
07
Q.4
Who are the stakeholders in IT Governance and what are their requirements?
07
What is Botnet? How do viruses get disseminated? Explain with diagram.
07
OR
Q.4
What is IT Governance? Why is IT Governance important?
07
Discuss digital signatures and Indian IT Act.
07
2
Q.5
SONY.SAMBANDH.COM
India saw its first cyber crime conviction recently. It all began after a complaint was filed by Sony India Private Ltd, which runs a website called www.sony-sambandh.com, targeting Non Resident Indians. The website enables NRIs to send Sony products to their friends and relatives in India after they pay for it online. The company undertakes to deliver the products to the concerned recipients. In May 2002, someone logged onto the website under the identity of Barbara Campa and ordered a Sony Colour Television set and a cordless head phone. She gave her credit card number for payment and requested that the products be delivered to Arif Azim in Noida. The payment was duly cleared by the credit card agency and the transaction processed. After following the relevant procedures of due diligence and checking, the company delivered the items to Arif Azim.
At the time of delivery, the company took digital photographs showing the delivery being accepted by Arif Azim. The transaction closed at that, but after one and a half months the credit card agency informed the company that this was an unauthorized transaction as the real owner had denied having made the purchase. The company lodged a complaint for online cheating at the Central Bureau of Investigation which registered a case under Section 418, 419 and 420 of the Indian Penal Code. The matter was investigated into and Arif Azim was arrested. Investigations revealed that Arif Azim, while working at a call centre in Noida gained access to the credit card number of an American national which he misused on the company's site.
The CBI recovered the colour television and the cordless head phone. In this matter, the CBI had evidence to prove their case and so the accused admitted his guilt. The court convicted Arif Azim under Section 418, 419 and 420 of the Indian Penal Code this being the first time that a cybercrime has been convicted. The court, however, felt that as the accused was a young boy of 24 years and a first-time convict, a lenient view needed to be taken. The court therefore released the accused on probation for one year. The judgment is of immense significance for the entire nation. Besides being the first conviction in a cybercrime matter, it has shown that the Indian Penal Code can be effectively applied to certain categories of cyber crimes which are not covered under the Information Technology Act 2000. Secondly, a judgment of this sort sends out a clear message to all that the law cannot be taken for a ride.
How the cyber crime can lead to defamation for country and what measures can be sought out to stop it?
07
What needs to be amended in IT Governance? How it can be done?
07
3
OR
Q-5.
Based on case discriminate between traditional and modern techniques of credit card fraud.
07
Under the Indian IT Act, is there a legal protection available for "personal data" or "sensitive personal data"? Explain how.
07
Seat No.: Enrolment
GUJARAT TECHNOLOGICAL UNIVERSITY
MBA SEMESTER 3 EXAMINATION WINTER 2018
Subject Code: 3539254 Date:12/12/2018
Subject Name: Cyber Security and IT Governance (CSITG)
Time:10:30 AM To 01:30 PM Total Marks: 70
Instructions:
1. Attempt all questions.
2. Make suitable assumptions wherever necessary.
3. Figures to the right indicate full marks.
Q.1
Define the following term briefly:
14
Forgery Social Engineering Salami Attack (d)Backdoors Identify Theft Email Spoofing Password Sniffing
Q.2
Explain the possible attacks on cell phones with examples
07
How are cyber crimes classified? Explain with example.
07
OR
What is cyber stalking? How stalking works?
07
Q.3
Define phishing. Explain spam emails and hoax emails.
07
State the salient features of the Indian IT Act .
07
OR
Q.3
Describe the specific challenges that exist in India with regard to the law and cyber crime scenario in India.
07
Discuss how criminals plan the attack?
07
Q.4
Who are the stakeholders in IT Governance and what are their requirements?
07
What is Botnet? How do viruses get disseminated? Explain with diagram.
07
OR
Q.4
What is IT Governance? Why is IT Governance important?
07
Discuss digital signatures and Indian IT Act.
07
2
Q.5
SONY.SAMBANDH.COM
India saw its first cyber crime conviction recently. It all began after a complaint was filed by Sony India Private Ltd, which runs a website called www.sony-sambandh.com, targeting Non Resident Indians. The website enables NRIs to send Sony products to their friends and relatives in India after they pay for it online. The company undertakes to deliver the products to the concerned recipients. In May 2002, someone logged onto the website under the identity of Barbara Campa and ordered a Sony Colour Television set and a cordless head phone. She gave her credit card number for payment and requested that the products be delivered to Arif Azim in Noida. The payment was duly cleared by the credit card agency and the transaction processed. After following the relevant procedures of due diligence and checking, the company delivered the items to Arif Azim.
At the time of delivery, the company took digital photographs showing the delivery being accepted by Arif Azim. The transaction closed at that, but after one and a half months the credit card agency informed the company that this was an unauthorized transaction as the real owner had denied having made the purchase. The company lodged a complaint for online cheating at the Central Bureau of Investigation which registered a case under Section 418, 419 and 420 of the Indian Penal Code. The matter was investigated into and Arif Azim was arrested. Investigations revealed that Arif Azim, while working at a call centre in Noida gained access to the credit card number of an American national which he misused on the company's site.
The CBI recovered the colour television and the cordless head phone. In this matter, the CBI had evidence to prove their case and so the accused admitted his guilt. The court convicted Arif Azim under Section 418, 419 and 420 of the Indian Penal Code this being the first time that a cybercrime has been convicted. The court, however, felt that as the accused was a young boy of 24 years and a first-time convict, a lenient view needed to be taken. The court therefore released the accused on probation for one year. The judgment is of immense significance for the entire nation. Besides being the first conviction in a cybercrime matter, it has shown that the Indian Penal Code can be effectively applied to certain categories of cyber crimes which are not covered under the Information Technology Act 2000. Secondly, a judgment of this sort sends out a clear message to all that the law cannot be taken for a ride.
How the cyber crime can lead to defamation for country and what measures can be sought out to stop it?
07
What needs to be amended in IT Governance? How it can be done?
07
3
OR
Q-5.
Based on case discriminate between traditional and modern techniques of credit card fraud.
07
Under the Indian IT Act, is there a legal protection available for "personal data" or "sensitive personal data"? Explain how.
07
Other Question Papers
Subjects
- accounting for managers
- accounting for managers (afm)
- advance marketing management
- applied pharmaceutics
- b2b marketing
- banking and insurance
- banking and insurance -ii
- brand marketing
- business analytics (ba)
- business communication
- business english (be)
- business environment
- business ethics
- business ethics and corporate governance (becg)
- business law for managers
- business mathematics
- business process reengineering
- business process reengineering (bpr)
- business statistics
- business statistics (bs)
- business structure and management
- business structure and process
- change management & organization development
- change management and organizational development
- company law
- compensation management
- computer applications
- constitution of india
- consumer behavior (cb)
- consumer behaviour
- cooperative management
- corporate accounting (ca)
- corporate restructuring
- corporate tax planning
- corporate taxation (ct)
- corporate taxation and financial planning (ct & fp)
- cost & management accounting (cma)
- cost and management accounting
- counseling skills for managers
- creativity and innovation
- creativity, incubation and innovation (cii)
- cross continent business philosophy
- cyber security and it governance (csitg)
- database management
- designing of operations system (dos)
- development of human skills
- digital marketing
- e-commerce
- ecological management & business
- economics for managers (efm)
- effective communication skills
- elements of direct & indirect taxes
- elements of financial accounting
- english language
- enterprise resource planning
- entrepreneurial finance (ef)
- entrepreneurship
- environment for business
- environment management
- export – import policy, procedure documentation
- export-import policy procedures & documentation
- export-import procedures
- family business management
- financial accounting
- financial management
- financial planning
- foreign exchange management
- foreign language-french
- french (foreign language)
- fundamentals of information technology
- fundamentals of marketing (fom)
- gandhian philosophy for managing business (gpmb)
- german (foreign language)
- global human resource management (ghrm)
- healthcare and hospital management
- human resource development
- human resource management
- human resource management.
- human skills
- human values & business ethics (hvbe)
- import export procedures
- income tax (it)
- indian economy
- indian ethos & human quality development
- information system audit and control
- information systems
- information technology and global business
- integrated marketing communication
- integrated marketing communication (imc)
- intellectual property rights
- international accounting practice
- international business
- international business (ib)
- international commercial law (icl)
- international economic environment (iee)
- international economics (ie)
- international finance
- international financial management (ifm)
- international human resource management
- international human resource management (ihrm)
- international marketing
- international supply chain management
- inventory management, material planning and management
- inventory management, materials planning and management
- investment banking (ib)
- labor law
- leadership
- legal aspects business
- legal aspects of business
- legal aspects of business (lab)
- macro economics (me)
- management accounting
- management control system
- management control systems
- management information system
- management of cooperatives
- management of financial planning (mfp)
- management of financial services (mfs)
- management of industrial relation and labour law
- management of industrial relations and labour laws (mir & ll)
- management principles
- managerial communication
- managerial communication (mc)
- managerial economics
- managerial economics(me)
- managing digital innovation and transformation (mdit)
- marketing management
- marketing research (mr)
- material management
- mergers and acquisitions
- micro economics
- micro small and medium enterprise
- multicultural organizational behavior (mob)
- new entrepreneurship & innovation management
- new venture creation
- operation management
- organisational dynamics
- organizational behavior
- organizational behaviour
- performance management (pm)
- principles of management (pm)
- product & brand management (pbm)
- product and brand management
- product design and development
- production & operations management (pom)
- production and operations management
- production management
- project management
- project management for entrepreneurs
- public relation management
- quantitative analysis - ii
- quantitative analysis (qa)
- quantitative analysis-i
- relational database management system (rdbms)
- research methodology
- research methodology (rm)
- retailing - ii
- retailing and franchising (rf)
- risk management
- rural marketing
- sales & distribution management
- sales and distribution management (sdm)
- security analysis & portfolio management
- security analysis & portfolio management (sapm)
- service marketing
- services and relationship marketing (srm)
- social entrepreneurship
- social media analytics (sma)
- strategic financial management
- strategic financial management (sfm)
- strategic human resource management
- strategic information technology management
- strategic management
- supply chain & logistics management
- supply chain and logistics management
- supply chain management
- supply chain management (scm)
- system analysis and design
- system analysis and design(sa&d)
- talent management
- technology and business
- technology management
- total quality management and world class manufacturing excellence (tqmwcme)
- tourism and hospitality management (thm)
- wto multilateral trading system and it’s impact on business
- wto multilateral trading system and its impact on business(wmts-i)