Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • Pro Blog
  • Users
  • Groups
  • Unsolved
  • Solved
Collapse
Secnto AI
  1. Secnto AI
  2. Categories
  3. Virtual University
  4. CS204 - Cyber Law
  5. CS204 Assignment 2 Solution and Discussion
CS204 Assignment 2 Solution and Discussion
zaasmiZ
Re: CS204 Assignment 2 Solution and Discussion Assignment No. 02 Semester:Spring 2020 Cyber Law – CS204 Total Marks: 15 Due Date:16/06/2020 Objective: • The objective of this assignment is to enhance the knowledge of the students about cryptography technique for security purposes and cyber security measures. Uploading instructions: • Your assignment must be in .doc or .docx format (Any other formats like scan images, pdf, bmp, etc will not be accepted). • Save your assignment with your ID (e.g. bc020200786.doc). • No assignment will be accepted through email. Rules for Marking: It should be clear that your assignment will not get any credit if: • The assignment is submitted after due date. • The submitted assignment does not open or file is corrupted. • Your assignment is copied from internet, handouts or from any other student • Assignment is covered from lectures 04 to 06. For any query about the assignment, contact at cs204@vu.edu.pk Assignment Questions Questions: Marks 15 Question.1 (10 Marks) Use the caesar cipher method to encrypt the following words with shift key of 3 and show the complete process step by step. • “ASSIGNMENT” • “TOOLS” Question. 2 (5 Marks) Suppose that if you’ve ever tried to login to your online bank account and find that not all of your savings are being accounted for, it could be an indication that you’ve been targeted by cyber criminal. Although there are several ways that cyber criminals could have gotten your account data, there’s a fair chance you’ve accidentally come across a phishing website in the past, misinterpreting the login page of your online bank. Enlist all possible security measures to protect your online banking account from cyber criminals. Best of Luck
CS204 - Cyber Law
CS204 Assignment 1 Solution and Discussion
M
Re: CS204 Assignment 1 Solution and Discussion Assignment No. 01 Semester:Spring 2020 Cyber Law – CS204 Total Marks: 15 Due Date:29/05/2020 OBJECTIVE: The objective of this assignment is to enhance the knowledge of the students about E-commerce business models ,cyber crime, cyber crime catagories and cyber crime security measures. Uploading instructions: • Your assignment must be in .doc or .docx format (Any other formats like scan images, pdf, bmp, etc will not be accepted). • Save your assignment with your ID (e.g. bc020200786.doc). • No assignment will be accepted through email. Rules for Marking: It should be clear that your assignment will not get any credit if: • The assignment is submitted after due date. • The submitted assignment does not open or file is corrupted. • Your assignment is copied from internet, handouts or from any other student • Assignment is covered from lectures 01 to 03. For any query about the assignment, contact at cs204@vu.edu.pk Assignment Questions Questions: Marks 1555 Question. 1 Marks 05 Visit each of the sites below and then place them into one of the four E-commerce business model (s) according to their primary focus: www.newrelic.com www.bulkbookstore.com www.mcdelivery.com.pk www.uber.com www.olx.com.pk Question. 2 Marks 10 Mr. “Omar” is an HR coordinator at XYZ University. He receives an E-mail containing a message that, “Your University’s E-mail account password will be expired within 24 hours” from some fake E-mail account pretending to be the legitimate E-mail from University. Mr. “Omar” is redirected to a fake password renewal page i.e.“xyzcuniversity.edurenewal.com” where both new and existing passwords are requested. The cyber attacker is monitoring the page and hacks the original password to gain access. Keeping in view the above scenario, answer the following questions: Mention the cyber-crime name, which is occurring in the scenario. Mention the category of cyber-crime. Mention all possible prevention measures for such type of cyber-crimes. Best of Luck
CS204 - Cyber Law
CS204 Assignment 3 Solution and Discussion
zareenZ
Assignment No. 03 Semester: Fall 2019 Cyber Law – CS204 Total Marks: 15 Due Date:27/01/2020 Objectives: The objective of this assignment is to enhance the learning capabilities of the student about: • The Intellectual Property Rights • Investigation and Prosecution Agencies. • Power of Officers Instructions: Please read the following instructions carefully before submitting the assignment:  You will submit your assignment before or on due date on VU-LMS.  Assignment sent via Email will not be accepted/graded in any case.  If the submitted assignment does not open or file is corrupt, it will not be graded.  Assignment should be completed by your own efforts it should not be copied from internet, handouts or books.  You will submit solution only in the Microsoft Word File.  Assignment is covered from lectures 09 to 12. For any query about the assignment, contact at cs204@vu.edu.pk Assignment Questions Questions: Marks 15 Question. 1 (05 Marks) E-Series is an online music streaming website which has launched several music albums under its banner name and have all the copyrights reserved for its content. This company has published its music on online streaming website but from there other creators have illegally copied and molded the content of E-series and also uploaded with their own name. E-series took the notice and the case is now sent to National Response Centre For Cyber Crimes for further investigation. After reading the above scenario answer the following Question: Which personnel shall have the authority to obtain and copy the data, use equipment to make copies and obtain an intelligible output from the information system of online streaming website? And Under which Cybercrime Act this authority is delegated to the said personnel. Question. 2 (10 Marks) Identify the most suitable Intellectual Property Right for each of the following case: A cricketer creates his own company to sell his own collection of clothes. What kind of intellectual property can he use to show that his company is making the clothes? Which sort of intellectual property gives you the right to determine who can make and sell copies of your work if you write an original story? If a corporation develops a new idea that boosts its main product, what kind of intellectual property will it use to prohibit others from stealing its invention? Which term describes a logo or sign that identifies a brand? Which intellectual property protection applies for :Getz pharmaceutical Best of Luck
CS204 - Cyber Law
CS204 Assignment 2 Solution and Discussion
zareenZ
Assignment No. 02 Semester: Fall 2019 Cyber Law – CS204 Total Marks: 15 Due Date:02/12/2019 Objective: The objective of this assignment is to understand the concept of cyber security, its need, major security problems and the usage of cryptography technique for security purposes. Instructions: Please read the following instructions carefully before submitting the assignment:  You will submit your assignment before or on due date on VU-LMS.  Assignment sent via Email will not be accepted/graded in any case.  If the submitted assignment does not open or file is corrupt, it will not be graded.  Assignment should be completed by your own efforts it should not be copied from internet, handouts or books.  You will submit solution only in the Microsoft Word File.  Assignment is covered from lectures 04 to 06. For any query about the assignment, contact at cs204@vu.edu.pk Assignment Questions Questions: Marks 15 Question. 1 (05 Marks) Read the following scenario carefully and answer the questions. An employee of XYZ company get subscription to some number of free online IT magazines. During the process of registration for subscription, some information was being asked by the IT magzines in the form of questions, The IT magzines demand for bank details, first magazine asked for his complete date of birth, the second magazine asked for his bank name, and a third asked for his mother’s name.You are required to identify the possible cyber crime going on there also mention at least one prevention measure? Question.2 (10 Marks) Use the caesar cipher method to encrypt the word “ACTIVATION” and show the complete process step by step. Best of Luck
CS204 - Cyber Law
CS204 Assignment 1 Solution and Discussion
zareenZ
Topic thumbnail image
CS204 - Cyber Law
CS204 GDB1 Solution and discussion
zaasmiZ
Graded Discussion Board Semester: Spring 2019 Cyber Law – CS204 Topic: Cryptography Scenario Let us consider that a security company has around 400 employees exchanging valuable sensitive information everyday through internet between offices stationed at Karachi and Islamabad. Mohammad Ali is an IT Manager who oversees the overall IT infrastructure and is responsible for implementing the security measures and policies to guarantee the delivery of the messages safely so that no one can breach the confidential information. To achieve Privacy and high security normally the information is encrypted using symmetric and asymmetric encryptions, however there are some advantages and disadvantages of using both techniques in the above scenario. Point of Discussion: If you are asked to choose the best encryption technique (i.e. Symmetric or asymmetric) in the above scenario then what will be your choice? Support your answer with solid reasons considering the pros and cons of both techniques. Best of Luck !
CS204 - Cyber Law

CS204 Assignment 2 Solution and Discussion

Scheduled Pinned Locked Moved Solved CS204 - Cyber Law
cs204assignment 2solutiondiscussionfall 2019
4 Posts 1 Posters 934 Views
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • zareenZ Offline
    zareenZ Offline
    zareen
    Cyberian's Gold
    wrote on last edited by zareen
    #1

    Assignment No. 02
    Semester: Fall 2019
    Cyber Law – CS204

    Total Marks: 15

    Due Date:02/12/2019

    Objective:

    The objective of this assignment is to understand the concept of cyber security, its need, major security problems and the usage of cryptography technique for security purposes.

    Instructions:
    Please read the following instructions carefully before submitting the assignment:
     You will submit your assignment before or on due date on VU-LMS.
     Assignment sent via Email will not be accepted/graded in any case.
     If the submitted assignment does not open or file is corrupt, it will not be graded.
     Assignment should be completed by your own efforts it should not be copied from internet, handouts or books.
     You will submit solution only in the Microsoft Word File.
     Assignment is covered from lectures 04 to 06.
    For any query about the assignment, contact at cs204@vu.edu.pk

    Assignment Questions

    Questions: Marks 15

    Question. 1 (05 Marks)

    Read the following scenario carefully and answer the questions.

    An employee of XYZ company get subscription to some number of free online IT magazines. During the process of registration for subscription, some information was being asked by the IT magzines in the form of questions, The IT magzines demand for bank details, first magazine asked for his complete date of birth, the second magazine asked for his bank name, and a third asked for his mother’s name.You are required to identify the possible cyber crime going on there also mention at least one prevention measure?
    Question.2 (10 Marks)

    Use the caesar cipher method to encrypt the word “ACTIVATION” and show the complete process step by step.

    Best of Luck

    Discussion is right way to get Solution of the every assignment, Quiz and GDB.
    We are always here to discuss and Guideline, Please Don't visit Cyberian only for Solution.
    Cyberian Team always happy to facilitate to provide the idea solution. Please don't hesitate to contact us!
    %(red)[NOTE: Don't copy or replicating idea solutions.]
    Quiz Copy Solution
    Mid and Final Past Papers
    Live Chat

    zareenZ 2 Replies Last reply
    0
    • zareenZ zareen

      Assignment No. 02
      Semester: Fall 2019
      Cyber Law – CS204

      Total Marks: 15

      Due Date:02/12/2019

      Objective:

      The objective of this assignment is to understand the concept of cyber security, its need, major security problems and the usage of cryptography technique for security purposes.

      Instructions:
      Please read the following instructions carefully before submitting the assignment:
       You will submit your assignment before or on due date on VU-LMS.
       Assignment sent via Email will not be accepted/graded in any case.
       If the submitted assignment does not open or file is corrupt, it will not be graded.
       Assignment should be completed by your own efforts it should not be copied from internet, handouts or books.
       You will submit solution only in the Microsoft Word File.
       Assignment is covered from lectures 04 to 06.
      For any query about the assignment, contact at cs204@vu.edu.pk

      Assignment Questions

      Questions: Marks 15

      Question. 1 (05 Marks)

      Read the following scenario carefully and answer the questions.

      An employee of XYZ company get subscription to some number of free online IT magazines. During the process of registration for subscription, some information was being asked by the IT magzines in the form of questions, The IT magzines demand for bank details, first magazine asked for his complete date of birth, the second magazine asked for his bank name, and a third asked for his mother’s name.You are required to identify the possible cyber crime going on there also mention at least one prevention measure?
      Question.2 (10 Marks)

      Use the caesar cipher method to encrypt the word “ACTIVATION” and show the complete process step by step.

      Best of Luck

      zareenZ Offline
      zareenZ Offline
      zareen
      Cyberian's Gold
      wrote on last edited by zareen
      #2

      @zareen said in CS204 Assignment 1 Solution and Discussion:

      Use the caesar cipher method to encrypt the word “ACTIVATION” and show the complete process step by step.

      Encryption Key Management is crucial for securing your cryptographic keys. … Key Use and Rollover (Activation through Post-Activation) encrytion key … by authorized systems and users for encryption or decryption processes. … Here are the steps an encryption key manager vendor must to take to show full compliance:.link text

      Discussion is right way to get Solution of the every assignment, Quiz and GDB.
      We are always here to discuss and Guideline, Please Don't visit Cyberian only for Solution.
      Cyberian Team always happy to facilitate to provide the idea solution. Please don't hesitate to contact us!
      %(red)[NOTE: Don't copy or replicating idea solutions.]
      Quiz Copy Solution
      Mid and Final Past Papers
      Live Chat

      1 Reply Last reply
      0
      • zareenZ zareen

        Assignment No. 02
        Semester: Fall 2019
        Cyber Law – CS204

        Total Marks: 15

        Due Date:02/12/2019

        Objective:

        The objective of this assignment is to understand the concept of cyber security, its need, major security problems and the usage of cryptography technique for security purposes.

        Instructions:
        Please read the following instructions carefully before submitting the assignment:
         You will submit your assignment before or on due date on VU-LMS.
         Assignment sent via Email will not be accepted/graded in any case.
         If the submitted assignment does not open or file is corrupt, it will not be graded.
         Assignment should be completed by your own efforts it should not be copied from internet, handouts or books.
         You will submit solution only in the Microsoft Word File.
         Assignment is covered from lectures 04 to 06.
        For any query about the assignment, contact at cs204@vu.edu.pk

        Assignment Questions

        Questions: Marks 15

        Question. 1 (05 Marks)

        Read the following scenario carefully and answer the questions.

        An employee of XYZ company get subscription to some number of free online IT magazines. During the process of registration for subscription, some information was being asked by the IT magzines in the form of questions, The IT magzines demand for bank details, first magazine asked for his complete date of birth, the second magazine asked for his bank name, and a third asked for his mother’s name.You are required to identify the possible cyber crime going on there also mention at least one prevention measure?
        Question.2 (10 Marks)

        Use the caesar cipher method to encrypt the word “ACTIVATION” and show the complete process step by step.

        Best of Luck

        zareenZ Offline
        zareenZ Offline
        zareen
        Cyberian's Gold
        wrote on last edited by
        #3

        @zareen said in CS204 Assignment 1 Solution and Discussion:

        An employee of XYZ company get subscription to some number of free online IT magazines. During the process of registration for subscription, some information was being asked by the IT magzines in the form of questions, The IT magzines demand for bank details, first magazine asked for his complete date of birth, the second magazine asked for his bank name, and a third asked for his mother’s name.You are required to identify the possible cyber crime going on there also mention at least one prevention measure?

        Each car has associated with it zero to any number of recorded accidents. Answer : … are data-driven and sometimes used in executive information systems. … A study of online trading of few selected broking companies in. Pune. … paid an annual subscription fee of $89 to receive free shipping on all purchases through …link text

        Discussion is right way to get Solution of the every assignment, Quiz and GDB.
        We are always here to discuss and Guideline, Please Don't visit Cyberian only for Solution.
        Cyberian Team always happy to facilitate to provide the idea solution. Please don't hesitate to contact us!
        %(red)[NOTE: Don't copy or replicating idea solutions.]
        Quiz Copy Solution
        Mid and Final Past Papers
        Live Chat

        1 Reply Last reply
        0
        • zareenZ Offline
          zareenZ Offline
          zareen
          Cyberian's Gold
          wrote on last edited by
          #4

          Use the caesar cipher method to encrypt the word “ACTIVATION” and show the complete process step by step.

          A B C D E F G H I K L M N O P Q R S T U V W X Y Z

          Chose a number form 1 to 26 .the number will represent the key or the “shift” value that will be used to shift the standard Alphabet.

          KEY= 4

          A B C D E F G H I K L M N O P Q R S T U V W X Y Z

          W X Y Z A B C D E F G H I K L M N O P Q R S T U V

          Now bottom row of ALPHABE will now by known as Cipher ALPHABET.

          KEY=4

          Message =”ACTIVATION”

          Plain : A B C D E F G H I K L M N O P Q R S T U V W X Y Z

          Cipher: W X Y Z A B C D E F G H I K L M N O P Q R S T U V

          Ciper text : WYPERWPEKI

          Discussion is right way to get Solution of the every assignment, Quiz and GDB.
          We are always here to discuss and Guideline, Please Don't visit Cyberian only for Solution.
          Cyberian Team always happy to facilitate to provide the idea solution. Please don't hesitate to contact us!
          %(red)[NOTE: Don't copy or replicating idea solutions.]
          Quiz Copy Solution
          Mid and Final Past Papers
          Live Chat

          1 Reply Last reply
          0

          Reply
          • Reply as topic
          Log in to reply
          • Oldest to Newest
          • Newest to Oldest
          • Most Votes


          How to Build a $1,000/Month PAK VS BAN Live Live Cricket Streaming
          File Sharing
          Earn with File Sharing

          1

          Online

          3.0k

          Users

          2.8k

          Topics

          8.2k

          Posts
          solution
          1235
          discussion
          1195
          fall 2019
          813
          assignment 1
          428
          assignment 2
          294
          spring 2020
          265
          gdb 1
          238
          assignment 3
          79
          • PM. IMRAN KHAN
            undefined
            4
            1
            4.0k

          • Are the vaccines halal or not?
            undefined
            4
            1
            3.8k

          • All Subjects MidTerm and Final Term Solved Paper Links Attached Please check moaaz past papers
            zaasmiZ
            zaasmi
            3
            26
            75.1k

          • CS614 GDB Solution and Discussion
            M
            moaaz
            3
            3
            8.1k

          • How can I receive Reputation earning from Cyberian? 100% Discount on Fee
            Y
            ygytyh
            3
            28
            23.9k
          | |
          Copyright © 2010-26 RUP Technologies LLC. USA | Contributors
          • Login

          • Don't have an account? Register

          • Login or register to search.
          • First post
            Last post
          0
          • Categories
          • Recent
          • Tags
          • Popular
          • Pro Blog
          • Users
          • Groups
          • Unsolved
          • Solved