Introduction To Cyber Crime And Cyber Security Question And Answers | letsbug

 

 Introduction To Cyber Crime And Cyber Security

1.  Answer the following questions in short.

1. What is E-mail spamming?

    Answer: 

        Spam is any kind unwanted, unsolicited digital communication that gets sent out in bulk. Often spam is sent via email, but is can also be distributed via text messages, phone calls, or social media.

        E-mail spam is popular but it is used in other media also like Instant messaging Spam, Usenet newsgroups Spam, Web search engine Spam, Spam in blog, wiki Spam, online classified ads Spam, Mobile phone messaging Spam, Internet forum Spam, Social networking Spam, File Sharing network Spam, Video Sharing sites etc.

2. Define cybercrime?

    Answer: 

        Cybercrime is any illegal behaviour, directed by means of electronic operations that target the security of computer system and the data processed by them.

3. What is hacking?

    Answer: 

        Hacking is an act of breaking into a computer and/or network and it is an offense. Hackers ( the people doing the 'hacking') are basically computer programmers who have an advanced understanding of computers and commonly misuse this knowledge for devious reasons.

4. What do you meant by Password sniffing?

    Answer: 

        Password sniffers are the programs that monitor or record the name and password of network users as they login. This often happens on public wifi network where it is relatively easy to spy on weak or unencrypted traffic.

        When data is transmitted across network, if the data packets are not encrypted then data within the network packet can be read using a sniffer. Using a sniffer application, an attacker can analyse the network and gain information to eventually cause the network to crash or to become corrupted, or read the communication happening across the network.

5. Define cyber security

    Answer:

        Cyber security means protecting information, devices, computers, computer resource, communication devices and information stored therein from unauthorized access, use, disclosure, disruption, modification or destruction.

2.  Define the following terms:

1. Data diddling

    Answer: 

        Data diddling is unauthorized altering of raw data before entry into a computer system, and then changing it back after processing is done. Using this technique, the attacker may modify the expected output and is difficult to track.

2. Salami attack

    Answer: 

        This kind of attack is normally widespread in the financial institutions or for the purpose of committing financial crimes. Salami technique is a technique by which cybercriminals steal very small amount of money at a time so that there is no noticeable difference in the overall size. The attacker gets away with these little amounts and thus gathers a considerable amount over a period of time. The principle of this method is the failure to detect the misappropriation.

3. E-mail Spoofing

    Answer: 

        E-mail spoofing is a form of cyber attack in which a hacker sends an email that has been manipulated to seem as if it originated from a trusted source. Email spoofing is a popular tactic used in phishing because people are more likely to open an email when they think it has been sent by a known sender.

4.  Computer Sabotage

    Answer: 

        The use of the internet to obstruct the normal functioning of a computer system through the introduction of viruses, worms or logic bombs, is referred to as computer sabotage.

5. Identity Theft

    Answer: 

       Identity theft occurs when someone uses another person's personal identifying information, like their name, ID number, or Credit card number, Bank account details without their permission, to commit fraud or other crimes.

3.  Answer the following questions:

1. What is Cyber Security Policy?

    Answer: 

         In general, Cyber security policies are the directives designed to maintain cyber security. Cyber security refers to laws and regulations concerning information distribution, private enterprise objectives for information protection, computer operations methods for controlling technology, and configuration variables in electronic devices.

        Cyber security policy is presented as something that set out security goals in support of constituents who are expected to modify their behaviour in compliance with the policy to produce cyber security.

        There is a governance body who establishes laws, rules, and/or regulations that are meant not only to affect constituent behaviour, but also affect others, who thereby become stakeholders in the policy process. Organization are bound by governing bodies to obey the policy. Organizations observe cyber security policies issued by governing bodies as well as establish their own internal cyber security policies.

2. Explain domains of Cyber Security Policy.

    Answer:

        There are different domains of the governance hence cyber security applies to the corresponding governance according to the domain. For example, a nation-state cyber security will apply to all citizens within its domain, whereas  a corporate cyber security policy will apply only to the staff of the corporation, cyber security policy issued by an industry regulator will apply only to those industries in its regulatory domain.

        Following are the domains of Cyber Security Policy:

  1. Laws and Regulations
  2. Enterprise Policy
  3. Technology Operations
  4. Technology Configuration

Comments

Categories

Big Data Analytics Binary Search Binary Search Tree Binary To Decimal binary tree Breadth First Search Bubble sort C Programming c++ Chemical Reaction and equation class 10 class 10th Class 9 Climate Complex Numbers computer network counting sort CSS Cyber Offenses Cyber Security Cyberstalking Data Science Data Structures Decimal To Binary Development diamond pattern Digital Marketing dust of snow Economics Economics Lesson 4 Email Validation English fire and ice Food Security in India Footprints Without feet Forest And Wildlife Resources game Geography Geography lesson 6 glassmorphism Glossary Graph HackerRank Solution hindi HTML image previewer India-Size And Location Insertion Sort Internet Network Status Interview Questions Introduction to cyber crime and cyber security IT javascript tricks json to CSV converter lesson 2 lesson 1 lesson 2 Lesson 3 Lesson 6 lesson 7 Life lines of National Economy life processes Linear Search Linked List lowest common ancestor Machine Learning MCQs median in array Merge sort min and max of two numbers Moment Money and Credit My Childhood Natural Vegetation and Wildlife NCERT Network connectivity devices Network Models Network Security No Men Are foreign Node.js operator overloading P5.js PHP Physical features of India Population Prime Numbers python Quick sort R language Rain on the roof Regular Expression Resources and development reversing array saakhi science Searching Algorithm Selection sort Social Media Marketing social science Software Engineering Software Testing Sorting Algorithm Stacks staircase pattern System Concepts Text Recognition The last Leaf time converter Time Passed From A Date Todo List App Tree Trending Technologies Understanding Economic Development username and password video player Visualization water resources Wired And Wireless LAN साखी
Show more

Popular Posts

Big Data MCQs(multiple choice questions) with answers - letsbug

Digital Marketing MCQ(Multiple Choice Questions) with Answers | part 1 | letsbug

Software Engineering MCQs questions with answers - letsbug