Session 1 (2022-2023)
Question-to-Syllabus Mapping
Group-A (Very Short Answer Type Question)
- (i) “Cyberspace” was coined by ________.
- Syllabus Topic: 1. Introduction → Cyberspace
- (ii) Which is the oldest techniques used by hackers for phone hacking to make free calls?
- Syllabus Topic: 2. Hackers and Cyber Crimes → Types of Hackers / Cyber-Attacks and Vulnerabilities
- (iii) An attempt to steal, spy, damage or destroy computer systems, networks, or their associated information is known as ________.
- Syllabus Topic: 1. Introduction → Cyber threats
- (iv) The Code Red is a sort of a ________.
- Syllabus Topic: 2. Hackers and Cyber Crimes → Worms, Trojans, Viruses, Backdoors
- (v) Give an example of physical hacking.
- Syllabus Topic: 2. Hackers and Cyber Crimes → Cyber-Attacks and Vulnerabilities
- (vi) What is the existence of weakness in a system or network is known as?
- Syllabus Topic: 2. Hackers and Cyber Crimes → Cyber-Attacks and Vulnerabilities
- (vii) Which independent type of malicious program does not require any host program?
- Syllabus Topic: 2. Hackers and Cyber Crimes → Worms, Trojans, Viruses, Backdoors
- (viii) What are Trojan-Horse programs?
- Syllabus Topic: 2. Hackers and Cyber Crimes → Worms, Trojans, Viruses, Backdoors
- (ix) When there is an excessive amount of data flow, which the system cannot handle, ________ attack takes place.
- Syllabus Topic: 2. Hackers and Cyber Crimes → Cyber-Attacks and Vulnerabilities
- (x) A ________ can be a hardware device or a software program that filters all the packets of data that comes through a network, the internet, etc.
- Syllabus Topic: 3. Ethical Hacking and Social Engineering → Enterprise Information Security Architecture
- (xi) The Hacker who did break the SIPRNET system is ________.
- Syllabus Topic: 2. Hackers and Cyber Crimes → Types of Hackers
- (xii) A cyber-criminal or penetration tester uses the additional data that stores certain special instructions in the memory for activities to break the system. Name the type of attack.
- Syllabus Topic: 2. Hackers and Cyber Crimes → Cyber-Attacks and Vulnerabilities (Specifically Buffer Overflow)
Group-B (Short Answer Type Question)
- 2. Discuss Security Architecture.
- Syllabus Topic: 3. Ethical Hacking and Social Engineering → Enterprise Information Security Architecture
- 3. Mention the difference between symmetric and asymmetric encryption.
- Syllabus Topic: This is a foundational concept in cryptography, which underlies many security topics but is not explicitly listed as a standalone topic. It best fits within the context of protocols discussed in other units.
- 4. Write the steps to analyze the E-Mail Application’s security vulnerabilities.
- Syllabus Topic: 3. Ethical Hacking and Social Engineering → Vulnerability Assessment and Penetration Testing
- 5. What is a response code? List them.
- Syllabus Topic: This is a core web technology concept, relevant to network security and hacking but not directly named in the syllabus. It relates to understanding network communication for vulnerability assessment.
- 6. Discuss matrix mining.
- Syllabus Topic: This topic does not appear to directly map to the provided Cyber Security syllabus. It may be an out-of-syllabus question or related to a very specific sub-field not listed.
Group-C (Long Answer Type Question)
- 7. With a diagram, explain handshake protocol action. Explain SSL protocol stack.
- Syllabus Topic: This relates to secure communications protocols. While SSL isn’t explicitly named, it’s a fundamental part of network security, fitting broadly under topics that require secure data transmission.
- 8. Discuss security policy database. With a neat diagram, explain ip traffic processing.
- Syllabus Topic: 5. Cyber Ethics and Laws → at Network Layer-IPSec
- 9. Explain the different Threats to Information System? What do you mean by Information Assurance?
- Syllabus Topic: 1. Introduction → Cyber threats AND 3. Ethical Hacking and Social Engineering → Information Assurance
- 10. What do you mean by packet filtering in Firewall? Explain Firewall and working of Firewall? Explain the need to take Backup?
- Syllabus Topic: 3. Ethical Hacking and Social Engineering → Enterprise Information Security Architecture
- 11. Elaborate: “Cyber crime play a vital role against person, property and govt. to protect all valuable information and rights”.
- Syllabus Topic: 5. Cyber Ethics and Laws → Introduction to Cyber Laws / Offences under IT Act
Session 1 Analysis
- Question Distribution by Module:
- Unit 1 (Introduction): 3 questions (1A-i, 1A-iii, part of 9)
- Unit 2 (Hackers and Cyber Crimes): 8 questions (1A-ii, 1A-iv, 1A-v, 1A-vi, 1A-vii, 1A-viii, 1A-ix, 1A-xi, 1A-xii)
- Unit 3 (Ethical Hacking): 4 questions (1A-x, 2, 4, part of 9, 10)
- Unit 4 (Cyber Forensics): 0 questions
- Unit 5 (Cyber Ethics and Laws): 2 questions (8, 11)
- Note: Some questions covered concepts not explicitly in the syllabus (Encryption, SSL, Response Codes).
- Key Observations:
- Most Important Module: Unit 2: Hackers and Cyber Crimes was heavily dominant, especially in the very short answer section. A thorough understanding of malware types (worms, trojans), attack vectors, and vulnerabilities was critical.
- Second Most Important Module: Unit 3: Ethical Hacking and Social Engineering was the focus of the short and long answer questions, with emphasis on security architecture, firewalls, and vulnerability assessment.
- Neglected Module: Unit 4: Cyber Forensics and Auditing was completely ignored in this paper.
- Application & Foundational Knowledge: The paper included questions on foundational topics like SSL and encryption, which are essential for understanding security architecture, even if not listed as primary syllabus points.
Session 2 (2024-2025)
Question-to-Syllabus Mapping
Group-A (Very Short Answer Type Question)
- (i) Which method of hacking will record all your keystrokes?
- Syllabus Topic: 2. Hackers and Cyber Crimes → Malware threats (Keyloggers)
- (ii) Which malware does not clone or replicate itself through infection?
- Syllabus Topic: 2. Hackers and Cyber Crimes → Worms, Trojans, Viruses, Backdoors
- (iii) Which of the following actions compromise cyber security? a) Vulnerability b) Attack c) Threat d) Exploit
- Syllabus Topic: 1. Introduction → Cyber threats
- (iv) Write the utility of Passwords.
- Syllabus Topic: This is a fundamental security concept related to 2. Hackers and Cyber Crimes → Gaining Access.
- (v) “Cyberspace” was coined by ______.
- Syllabus Topic: 1. Introduction → Cyberspace
- (vi) Which of these is NOT a scanning type? a. Null Scan b. Xmas Tree Scan c. SYN Stealth d. Cloud Scan
- Syllabus Topic: 3. Ethical Hacking and Social Engineering → Vulnerability Assessment and Penetration Testing
- (vii) Which type of attack is an internet scam done by cyber-criminals where the user is convinced digitally to provide confidential information?
- Syllabus Topic: 3. Ethical Hacking and Social Engineering → Types of Social Engineering (Phishing)
- (viii) Which port number is usually referred to as the port number (default) of several web servers like apache?
- Syllabus Topic: This is a fundamental networking concept essential for 2. Hackers and Cyber Crimes → Cyber-Attacks and Vulnerabilities.
- (ix) Name a hacking approach where cyber-criminals design fake websites or pages for tricking or gaining additional traffic.
- Syllabus Topic: 3. Ethical Hacking and Social Engineering → Types of Social Engineering (Phishing/Pharming)
- (x) Which of the following is not a step followed by cyber-criminals in data breaching? a) Exfiltration b) Research and info-gathering c) Attack the system d) Fixing the bugs
- Syllabus Topic: 2. Hackers and Cyber Crimes → Broadly covers the hacking process (Gaining Access, etc.)
- (xi) Name the world’s very first antivirus program.
- Syllabus Topic: 2. Hackers and Cyber Crimes → Malware threats
- (xii) IT security in any firm or organization is maintained and handled by ______.
- Syllabus Topic: 1. Introduction → Cybersecurity - Organizational Implications
Group-B (Short Answer Type Question)
- 2. Explain data leakage.
- Syllabus Topic: 1. Introduction → Cyber threats
- 3. (i)Define Hacker. List Out the Types of hackers (ii)What is a Backdoor?
- Syllabus Topic: 2. Hackers and Cyber Crimes → Types of Hackers AND Worms, Trojans, Viruses, Backdoors
- 4. What is the difference between vulnerability assessment (VA) and penetration testing (PT)?
- Syllabus Topic: 3. Ethical Hacking and Social Engineering → Vulnerability Assessment and Penetration Testing
- 5. Describe briefly the CIA Triad and how to achieve it.
- Syllabus Topic: 1. Introduction → CIA Triad
- 6. Explain the difference between hashing and encryption.
- Syllabus Topic: Foundational cryptographic concept, essential context for the entire syllabus.
Group-C (Long Answer Type Question)
- 7. (i)Explain briefly about the Forensics Investigation Process. (ii)Discuss the challenges in computer forensics.
- Syllabus Topic: 4. Cyber Forensics and Auditing → Forensics Investigation Process
- 8. What do you mean by Information System? What is the need of Information System? What are the types of Information System?
- Syllabus Topic: This question is very general. It best relates to the context of 3. Ethical Hacking and Social Engineering → Enterprise Information Security Architecture.
- 9. Write a short note on a) Patent Law b) Copy write Law c) IPR
- Syllabus Topic: 5. Cyber Ethics and Laws → Intellectual Property Rights in Cyberspace
- 10. (i)Discuss cybercrime and the Indian ITA 2000. (ii) Explain in detail about architecture of IP Security
- Syllabus Topic: 5. Cyber Ethics and Laws → Offences under IT Act AND at Network Layer-IPSec
- 11. With a neat diagrams, Explain PGP Cryptographic Functions or PGP Functions (Authentication, Confidentiality, Confidentiality and Authentication)
- Syllabus Topic: This is a specific application of cryptography (like SSL in the previous paper). It is not explicitly named but falls under the general umbrella of securing communications.
Session 2 Analysis
- Question Distribution by Module:
- Unit 1 (Introduction): 5 questions (1A-iii, 1A-v, 1A-xii, 2, 5)
- Unit 2 (Hackers and Cyber Crimes): 6 questions (1A-i, 1A-ii, 1A-iv, 1A-viii, 1A-x, 1A-xi, 3)
- Unit 3 (Ethical Hacking): 4 questions (1A-vi, 1A-vii, 1A-ix, 4, 8)
- Unit 4 (Cyber Forensics): 1 question (7)
- Unit 5 (Cyber Ethics and Laws): 3 questions (9, 10)
- Note: PGP and Hashing/Encryption are foundational topics not explicitly listed.
- Key Observations:
- Balanced Distribution: This paper shows a much more balanced distribution across all syllabus modules compared to the 2022-2023 paper.
- All Modules Covered: Crucially, every single module from the syllabus was represented, including Unit 4: Cyber Forensics and Auditing, which was missing previously.
- Conceptual Focus: There was a strong emphasis on core concepts like the CIA Triad (Unit 1), Types of Hackers (Unit 2), VA vs PT (Unit 3), Forensics Process (Unit 4), and IPR/IT Act (Unit 5).
- Increased Legal Focus: Unit 5 had significant weight in the long answer section, covering both IPR and the IT Act/IPSec.
Session 3 (2023-2024)
Question-to-Syllabus Mapping
Group-A (Very Short Answer Type Question)
- (i) What is the existence of weakness in a system or network is known as?
- Syllabus Topic: 2. Hackers and Cyber Crimes → Cyber-Attacks and Vulnerabilities
- (ii) Which DDoS in mobile systems wait for the owner to trigger the cyber attack?
- Syllabus Topic: 2. Hackers and Cyber Crimes → Cyber-Attacks and Vulnerabilities
- (iii) Why are the factors like Confidentiality, Integrity, Availability, and Authenticity considered as the fundamentals?
- Syllabus Topic: 1. Introduction → CIA Triad
- (iv) What refers to exploring the appropriate, ethical behaviors related to the online environment and digital media platform?
- Syllabus Topic: 5. Cyber Ethics and Laws → Introduction to Cyber Laws
- (v) What type of text is transformed with the help of a cipher algorithm?
- Syllabus Topic: Foundational cryptographic concept.
- (vi) “Cyberspace” was coined by ________.
- Syllabus Topic: 1. Introduction → Cyberspace
- (vii) Network failure is primarily a ________ issue.
- Syllabus Topic: 1. Introduction → CIA Triad (Availability)
- (viii) ________ means the security of data from tampering by unidentified users.
- Syllabus Topic: 1. Introduction → CIA Triad (Integrity)
- (ix) Which is a sort of independent type of malicious program that would not require any host program?
- Syllabus Topic: 2. Hackers and Cyber Crimes → Worms, Trojans, Viruses, Backdoors
- (x) An act to injure, corrupt, or threaten a system or network is characterized ________.
- Syllabus Topic: 1. Introduction → Cyber threats
- (xi) What is security misconfiguration?
- Syllabus Topic: 2. Hackers and Cyber Crimes → Cyber-Attacks and Vulnerabilities
- (xii) Differentiate Worm and Virus.
- Syllabus Topic: 2. Hackers and Cyber Crimes → Worms, Trojans, Viruses, Backdoors
Group-B (Short Answer Type Question)
- 2. Describe Security risk and analysis.
- Syllabus Topic: 3. Ethical Hacking and Social Engineering → Threat Modelling
- 3. Explain Data backup security, Data archival security, and Data disposal considerations.
- Syllabus Topic: 1. Introduction → Cybersecurity - Organizational Implications
- 4. What is the use of policy?
- Syllabus Topic: 1. Introduction → Cybersecurity - Organizational Implications
- 5. Define session hijacking and its various challenges.
- Syllabus Topic: 2. Hackers and Cyber Crimes → Gaining Access
- 6. Explain the Feistel cipher in detail.
- Syllabus Topic: A specific cryptographic algorithm, falls under the general need for understanding encryption.
Group-C (Long Answer Type Question)
- 7. (a) Write short notes on: Firewall. (b) Backdoor. (c) Trapdoor.
- Syllabus Topic: 3. Ethical Hacking → Enterprise Information Security Architecture AND 2. Hackers and Cyber Crimes → Worms, Trojans, Viruses, Backdoors
- 8. (a) Discuss the SQL Injection in detail. (b) What is buffer overflow? (c) Discuss how to minimize Buffer Overflow.
- Syllabus Topic: 2. Hackers and Cyber Crimes → Cyber-Attacks and Vulnerabilities
- 9. (a) How VoIP hacking is done by attackers? (b) What are the measures for it? (c) Identify wireless network defense.
- Syllabus Topic: 2. Hackers and Cyber Crimes → Cyber-Attacks and Vulnerabilities
- 10. (a) Name & explain the two protocols to use for E-mail Security. (b) Explain Cryptanalysis process.
- Syllabus Topic: Foundational cryptographic and protocol knowledge (e.g., PGP, S/MIME).
- 11. (a) Elaborate “Cyber-crime plays a vital role against person, property, and govt. to protect all valuable information and rights”. (b) Encrypt a plain text using transposition cipher key. (c) What is transposition cipher?
- Syllabus Topic: 5. Cyber Ethics and Laws → Introduction to Cyber Laws / Offences under IT Act. Part (b) and (c) are foundational cryptography.
Session 3 Analysis
- Question Distribution by Module:
- Unit 1 (Introduction): 6 questions (1A-iii, 1A-vi, 1A-vii, 1A-viii, 1A-x, 3, 4)
- Unit 2 (Hackers and Cyber Crimes): 8 questions (1A-i, 1A-ii, 1A-ix, 1A-xi, 1A-xii, 5, part of 7, 8, 9)
- Unit 3 (Ethical Hacking): 2 questions (2, part of 7)
- Unit 4 (Cyber Forensics): 0 questions
- Unit 5 (Cyber Ethics and Laws): 2 questions (1A-iv, part of 11)
- Note: Multiple questions focused on cryptography (Feistel, Transposition, Cryptanalysis).
- Key Observations:
- Return to Heavy Focus on Unit 2: Similar to the 2022-23 paper, this one is heavily weighted towards Unit 2: Hackers and Cyber Crimes. The long answer questions almost exclusively focus on specific, technical attacks like SQL Injection, Buffer Overflow, and VoIP hacking.
- Strong Emphasis on Unit 1: The introductory concepts, especially the CIA Triad and organizational policies, were very prominent in the short answer sections.
- Forensics is Missing Again: Like the 2022-23 paper, Unit 4: Cyber Forensics and Auditing is completely absent.
- Deep Dive into Cryptography: This paper required knowledge of specific ciphers (Feistel, Transposition), indicating a need for a deeper understanding of cryptographic principles than just the difference between symmetric and asymmetric.
**Overall Analysis **
Tier 1: Must-Know Topics (Highest Priority)
These topics form the absolute core of every question paper and carry the most marks. You cannot afford to skip them.
- Unit 2: Hackers and Cyber Crimes: This is, without a doubt, the most important module.
- Malware Definitions: Be crystal clear on the difference between Worms, Trojans, Viruses, and Backdoors. This is the most repeated question in the entire analysis.
- Specific Attack Methodologies: Prepare long-answer questions on SQL Injection and Buffer Overflow. Understand what they are, how they are executed, and how to prevent them.
- General Attack Concepts: Know the definitions of Vulnerability, Threat, Attack, and Exploit. Understand attack types like DDoS, Phishing, and Session Hijacking.
- Foundational Cryptography & Protocols (Cross-Unit Topic): Though not a separate unit, cryptography questions are guaranteed to appear.
- Core Differences: Master the difference between Symmetric vs. Asymmetric Encryption and Hashing vs. Encryption.
- Security Protocols: Be prepared to explain SSL Handshake and IPSec architecture with diagrams. PGP functions are also important.
- Basic Ciphers: Understand simple ciphers like the Transposition Cipher.
Tier 2: High Priority Topics
These topics appear consistently, especially in short and long answer questions, and are essential for a high score.
- Unit 1: Introduction: This unit is a source of easy marks in the short answer section.
- CIA Triad: Know Confidentiality, Integrity, and Availability by heart. Be able to explain it and its importance.
- Key Terms: The term “Cyberspace” and its originator is a favorite one-mark question.
- Unit 3: Ethical Hacking and Social Engineering: Focus on defensive and assessment measures.
- Firewalls: Be prepared to explain what a firewall is, how it works, and concepts like packet filtering.
- VA vs. PT: Understand the key differences between Vulnerability Assessment and Penetration Testing.
- Security Architecture: Have a general understanding of what constitutes an enterprise security architecture.
Tier 3: Important for Scoring Well
These topics are slightly less frequent but are crucial for attempting all required questions in Groups B and C.
- Unit 5: Cyber Ethics and Laws: This unit is your key to one or two long-answer questions.
- Indian IT Act 2000: Understand its purpose and the penalties for cyber offenses.
- Intellectual Property Rights (IPR): Know the basics of Patent Law and Copyright Law in the context of cyberspace.
- Unit 4: Cyber Forensics and Auditing (The Wildcard): This unit’s importance fluctuates wildly. It was completely absent in two papers but was a major 15-mark question in another.
- Strategy: Do not skip this unit. At a minimum, prepare the Forensics Investigation Process thoroughly, as this is the most likely question to be asked from this module.
Final Actionable Advice:
- Prioritize Unit 2: Spend most of your time mastering the different types of malware and specific attacks.
- Practice Diagrams: For topics like SSL, IPSec, and PGP, diagrams are essential and often explicitly requested.
- Don’t Ignore Definitions: Group A is worth 10 marks. Quickly memorizing the key terms from all units can give you a strong start.
- Cover All Bases: While you should prioritize, notice that the 2024-2025 paper was very balanced. The safest strategy is to have a working knowledge of every unit, with a deeper focus on the Tier 1 and Tier 2 topics listed above.
Augmented Syllabus
Unit 1: Introduction to Cyber Security
- Introduction to Cyber Security:
- Importance and challenges
- Cyberspace:
- Definition and historical context (e.g., who coined the term)
- Core Concepts:
- CIA Triad (Confidentiality, Integrity, Availability) and how to achieve it
- Fundamentals like Authenticity
- Security Architecture
- Cyber Threats & Warfare:
- Cyber threats, Cyberwarfare, Cyber Terrorism
- Weaknesses, vulnerabilities, threats, and exploits
- Organizational & Critical Infrastructure Security:
- Cyber Security of Critical Infrastructure
- Cybersecurity - Organizational Implications
- Security Policy: Use and importance
Unit 2: Hackers and Cyber Crimes
- Actors in Cybersecurity:
- Types of Hackers, Hackers vs. Crackers
- Malware & System Threats:
- Malware Threats: Worms, Trojans, Viruses, Backdoors (including differentiation)
- Keystroke Logging
- Common Cyber-Attacks and Vulnerabilities:
- Denial-of-Service (DDoS): Specifically in mobile systems
- SQL Injection
- Buffer Overflow: and how to minimize it
- Session Hijacking: and its challenges
- VoIP Hacking
- Sniffing
- The Anatomy of a Hack:
- Gaining Access and Escalating Privileges
- Executing Applications, Hiding Files, and Covering Tracks
Unit 3: Ethical Hacking and Network Defense
- Ethical Hacking & Information Assurance:
- Ethical Hacking Concepts and Scopes
- Threats and Attack Vectors, Threat Modelling
- Information Assurance
- Enterprise Information Security Architecture
- Security Assessment:
- Vulnerability Assessment (VA) vs. Penetration Testing (PT)
- Network Security & Defense:
- Firewalls: Packet filtering, working principles, and the need for backups
- Passwords: Utility and importance
- Wireless Network Defense
- Symmetric vs. Asymmetric Encryption
- Hashing vs. Encryption
- Social Engineering:
- Types of Social Engineering (e.g., Phishing)
- Insider Attack and Prevention Strategies
- Targets and Defence Strategies
Unit 4: Cyber Forensics and Auditing
- Introduction to Cyber Forensics:
- Role of a forensics Investigator
- Computer Equipment and associated storage media
- The Forensics Process:
- Forensics Investigation Process
- Collecting Network-based Evidence
- Writing Computer Forensics Reports
- Challenges in computer forensics
- Data Management & Security:
- Data Leakage
- Data backup security, Data archival security, and Data disposal
- Auditing & Compliance:
- Auditing against a set of criteria
- Information Security Management System (ISMS)
- Introduction to ISO 27001:2013
Unit 5: Cyber Ethics, Laws, and Protocols
- Cyber Laws and Governance:
- Introduction to Cyber Laws
- Indian IT Act 2000: Cybercrime, offenses, and penalties
- E-Commerce and E-Governance
- Certifying Authority and Controller
- Intellectual Property Rights (IPR):
- IPR in Cyberspace
- Patent Law and Copyright Law
- Network Layer Security & Protocols:
- IPSec: Architecture and detailed protocols
- SSL Protocol Stack and handshake protocol
- PGP (Pretty Good Privacy): Cryptographic functions for authentication, confidentiality, and authentication
- E-Mail Security Protocols
Topics Asked in PYQs But Not Explicitly in Your Syllabus
Here is a list of topics that appeared in the question papers but were not directly mentioned in the syllabus you provided. You should consider adding these to your study plan.
- Specific Protocols and Architectures:
- SSL Protocol Stack: A detailed understanding was expected.
- PGP (Pretty Good Privacy): Questions required knowledge of its specific cryptographic functions.
- Feistel Cipher: This classical cryptographic structure was a specific question.
- E-mail Security Protocols: The exam asked to name and explain two protocols.
- Data and Information Systems:
- Data Leakage: Definition and explanation.
- Information System: Questions on its definition, need, and types were asked.
- Matrix Mining: This appeared as a short-note question.
- Legal and Historical Context:
- Indian IT Act 2000: This specific law was a focus area.
- Patent Law & Copyright Law: These forms of IPR were explicitly mentioned.
- Historical Facts: Questions like “who coined the term ‘cyberspace’,” “the world’s first antivirus program,” and who broke the “SIPRNET system” were asked.
- Attack and Defense Specifics:
- SQL Injection & Buffer Overflow: These were major topics in the long answer section.
- Session Hijacking: Required a detailed explanation.
- Response Codes: A question asked to list them, which likely refers to HTTP status codes or similar network responses.
- Scanning Types: Specific types like Null Scan, Xmas Tree Scan, and SYN Stealth were mentioned.