Cyber Offenses and Cyberstalking | letsbug

  

 Cyber Offenses And Cyberstalking

1.  Answer the following questions in short.

1. Define Cyber Terrorism.

    Answer: 

        The politically motivated use of computers and information to cause disruption in a nation society

2. What is social engineering?

    Answer: 

        Social engineering is the art of manipulating people, so they give up confidential information. Social engineering is a non-technical strategy used by cyber attackers. It involves human interaction. It uses psychological manipulations to trick uses into making security mistakes or giving away sensitive information.

3. What is cyberstalking?

    Answer: 

        The dictionary meaning of "stalking" is an "act or process of following perey stealthily - trying to approach somebody or something."
        Cyberstalking has been defined as the use of information and communications technology, particularly the Internet, by an individual or group or individuals to harass another individuals, groups of individuals, or organization.
        Cyberstalking is a new form of internet crime in our society, when a person is pursued or followed online. 

4. What is Reconnaissance?

    Answer: 

        This is first step towards cyber-attacks; it is one kind of a passive attack. "Reconnaissance" means an act of finding something or somebody. In this phase, the attacker tries to explore and gain the every possible information about the target.

5. What is online cyberstalker?

    Answer:

        An online stalker starts an interaction with the victim with the help of the Internet. They use E-mail and chat rooms to get connected with the victim, rather than using traditional instrumentation like phone.

2.  Define the following terms:

1. Active attack

    Answer: 

        In active attacks, the attacker explore the network of the victim and discovers individual hosts to confirm the information like IP addresses, operating system type and version, and services on the network, gathered in the passive attack phase.

        Active attacks are usually used to alter the system. It may affect the integrity, authenticity and availability of data.

2. Passive attack

    Answer: 

        Passive attack attempts to gain information about the target. It exploits confidential information. Passive attacks involve gaining data about a target without the knowledge of the target.

3. Hacker

    Answer: 

        A hacer is a person with a strong interest in computers who enjoys learning and experimenting with them. Hacker are usually very talented, smart people who understand computer better than others.

4.  Attack vector

    Answer: 

        An "attack vector" is a path, which an attacker can gain access to a computer or a network server to deliver a malicious outcome. Attack vectors enables attackers to exploit system vulnerabilities, including the human element. Attack vectors includes viruses, E-mail attachments, webpages, pop-up windows. instant messages, chat rooms, and deception. All of these methods involve programming, except deception, in which human operator is fooled into removing or weakening system defenses.

5. Botnet

    Answer: 

       Botnet is a term used for collection of software that runs autonomously and automatically. Botnet is associated with malicious software but can also be used for distributed computing software.

        A bot runs automatically in the computer and can gain the control of the computer by infecting them with a virus or other malicious code that gives the access. Computer system maybe a part even through to be operating normally.

3.  Answer the following questions:

1. Explain Human-based social engineering.

    Answer: 

         Human-based social engineering refers to person-to-person interaction to get the required/desired information. For example, calling the help desk and tryping to find out a password.

  1. Impersonating an employee or valid user:
  2. Posing as an Important user:
  3. Using a third person:
  4. Calling technical support:
  5. Shoulder surfing:
  6. Dumpster diving:

2. Explain different techniques of Credit Card Frauds.

    Answer: 

         Credit card fraud is a from of identity theft in which criminals makes purchases or obtains cash advances using a credit card account assigned to you.

        Following are techniques of credit card frauds:

  1. Traditional Techniques:
    1. Paper-based application fraud:
      1. The traditional credit card fraud is  paper-based application fraud. In which a criminal use stolen or fake documents such as utility bills and bank statements those can build up useful information to open an account in someone else's name.
      2. Application fraud can be divided into:
        1. ID theft: where an individual pretends to be someone else.
        2. Financial fraud: Where an individual gives false information about his or her financial status to acquire credit.
      3. Illegal use of lost and stolen cards:
        1. In another form of traditional technique, criminals use illegal use of lost and stolen cards. Credit card can be stolen either by pick pocketer or from postal service before it reaches its final destination.
    2. Modern Techniques:
      1. Skimming Card Information:
        1. In this technique, criminals produce a fake credit card. Then they use skimming to commit fraud.
        2. Skimming is where the information held to either the magnetic strip on the back of the credit card or data stored on the smart chip are copied from one card to another.
        3. Phishing site can also be used into giving credit card details to wrong site.
      2. Triangulation:
        1. The criminal offers good with heavy discounted rates through a website. The customer registers on this website along with credit card details. The criminal orders the goods from a legitimate website with the help of stolen credit card details and supply shipping address that have been provided by the customer while registering on the criminal's website. Such websites are usually available for few weeks/moths,so it is not possible to track.
      3. Credit card generators:
        1. It is another modern method where computer imitation software creates valid credit card number and expiry dates. The criminals highly rely on these generators to create valid credit cards. These are available for free download on the Internet.

Comments

Categories

Big Data Analytics Binary Search Binary Search Tree Binary To Decimal binary tree Breadth First Search Bubble sort C Programming c++ Chemical Reaction and equation class 10 class 10th Class 9 Climate Complex Numbers computer network counting sort CSS Cyber Offenses Cyber Security Cyberstalking Data Science Data Structures Decimal To Binary Development diamond pattern Digital Marketing dust of snow Economics Economics Lesson 4 Email Validation English fire and ice Food Security in India Footprints Without feet Forest And Wildlife Resources game Geography Geography lesson 6 glassmorphism Glossary Graph HackerRank Solution hindi HTML image previewer India-Size And Location Insertion Sort Internet Network Status Interview Questions Introduction to cyber crime and cyber security IT javascript tricks json to CSV converter lesson 2 lesson 1 lesson 2 Lesson 3 Lesson 6 lesson 7 Life lines of National Economy life processes Linear Search Linked List lowest common ancestor Machine Learning MCQs median in array Merge sort min and max of two numbers Moment Money and Credit My Childhood Natural Vegetation and Wildlife NCERT Network connectivity devices Network Models Network Security No Men Are foreign Node.js operator overloading P5.js PHP Physical features of India Population Prime Numbers python Quick sort R language Rain on the roof Regular Expression Resources and development reversing array saakhi science Searching Algorithm Selection sort Social Media Marketing social science Software Engineering Software Testing Sorting Algorithm Stacks staircase pattern System Concepts Text Recognition The last Leaf time converter Time Passed From A Date Todo List App Tree Trending Technologies Understanding Economic Development username and password video player Visualization water resources Wired And Wireless LAN साखी
Show more

Popular Posts

Big Data MCQs(multiple choice questions) with answers - letsbug

Digital Marketing MCQ(Multiple Choice Questions) with Answers | part 1 | letsbug

Software Engineering MCQs questions with answers - letsbug