Introduction To Cyber Crime And Cyber Security Question And Answers | letsbug
Introduction To Cyber Crime And Cyber Security
1. Answer the following questions in short.
1. What is E-mail spamming?
Answer:
Spam is any kind unwanted, unsolicited digital communication that gets sent out in bulk. Often spam is sent via email, but is can also be distributed via text messages, phone calls, or social media.
E-mail spam is popular but it is used in other media also like Instant messaging Spam, Usenet newsgroups Spam, Web search engine Spam, Spam in blog, wiki Spam, online classified ads Spam, Mobile phone messaging Spam, Internet forum Spam, Social networking Spam, File Sharing network Spam, Video Sharing sites etc.
2. Define cybercrime?
Answer:
Cybercrime is any illegal behaviour, directed by means of electronic operations that target the security of computer system and the data processed by them.
3. What is hacking?
Answer:
Hacking is an act of breaking into a computer and/or network and it is an offense. Hackers ( the people doing the 'hacking') are basically computer programmers who have an advanced understanding of computers and commonly misuse this knowledge for devious reasons.4. What do you meant by Password sniffing?
Answer:
Password sniffers are the programs that monitor or record the name and password of network users as they login. This often happens on public wifi network where it is relatively easy to spy on weak or unencrypted traffic.
When data is transmitted across network, if the data packets are not encrypted then data within the network packet can be read using a sniffer. Using a sniffer application, an attacker can analyse the network and gain information to eventually cause the network to crash or to become corrupted, or read the communication happening across the network.
5. Define cyber security
Answer:
Cyber security means protecting information, devices, computers, computer resource, communication devices and information stored therein from unauthorized access, use, disclosure, disruption, modification or destruction.
2. Define the following terms:
1. Data diddling
Answer:
Data diddling is unauthorized altering of raw data before entry into a computer system, and then changing it back after processing is done. Using this technique, the attacker may modify the expected output and is difficult to track.
2. Salami attack
Answer:
This kind of attack is normally widespread in the financial institutions or for the purpose of committing financial crimes. Salami technique is a technique by which cybercriminals steal very small amount of money at a time so that there is no noticeable difference in the overall size. The attacker gets away with these little amounts and thus gathers a considerable amount over a period of time. The principle of this method is the failure to detect the misappropriation.
3. E-mail Spoofing
Answer:
E-mail spoofing is a form of cyber attack in which a hacker sends an email that has been manipulated to seem as if it originated from a trusted source. Email spoofing is a popular tactic used in phishing because people are more likely to open an email when they think it has been sent by a known sender.
4. Computer Sabotage
Answer:
The use of the internet to obstruct the normal functioning of a computer system through the introduction of viruses, worms or logic bombs, is referred to as computer sabotage.
5. Identity Theft
Answer:
Identity theft occurs when someone uses another person's personal identifying information, like their name, ID number, or Credit card number, Bank account details without their permission, to commit fraud or other crimes.
3. Answer the following questions:
1. What is Cyber Security Policy?
Answer:
In general, Cyber security policies are the directives designed to maintain cyber security. Cyber security refers to laws and regulations concerning information distribution, private enterprise objectives for information protection, computer operations methods for controlling technology, and configuration variables in electronic devices.
Cyber security policy is presented as something that set out security goals in support of constituents who are expected to modify their behaviour in compliance with the policy to produce cyber security.
There is a governance body who establishes laws, rules, and/or regulations that are meant not only to affect constituent behaviour, but also affect others, who thereby become stakeholders in the policy process. Organization are bound by governing bodies to obey the policy. Organizations observe cyber security policies issued by governing bodies as well as establish their own internal cyber security policies.
2. Explain domains of Cyber Security Policy.
There are different domains of the governance hence cyber security applies to the corresponding governance according to the domain. For example, a nation-state cyber security will apply to all citizens within its domain, whereas a corporate cyber security policy will apply only to the staff of the corporation, cyber security policy issued by an industry regulator will apply only to those industries in its regulatory domain.
Following are the domains of Cyber Security Policy:
- Laws and Regulations
- Enterprise Policy
- Technology Operations
- Technology Configuration
Comments
Post a Comment