Cyber Offenses and Cyberstalking | letsbug
Cyber Offenses And Cyberstalking
1. Answer the following questions in short.
1. Define Cyber Terrorism.
Answer:
The politically motivated use of computers and information to cause disruption in a nation society
2. What is social engineering?
Answer:
Social engineering is the art of manipulating people, so they give up confidential information. Social engineering is a non-technical strategy used by cyber attackers. It involves human interaction. It uses psychological manipulations to trick uses into making security mistakes or giving away sensitive information.
3. What is cyberstalking?
Answer:
The dictionary meaning of "stalking" is an "act or process of following perey stealthily - trying to approach somebody or something."4. What is Reconnaissance?
Answer:
This is first step towards cyber-attacks; it is one kind of a passive attack. "Reconnaissance" means an act of finding something or somebody. In this phase, the attacker tries to explore and gain the every possible information about the target.
5. What is online cyberstalker?
Answer:
An online stalker starts an interaction with the victim with the help of the Internet. They use E-mail and chat rooms to get connected with the victim, rather than using traditional instrumentation like phone.
2. Define the following terms:
1. Active attack
Answer:
In active attacks, the attacker explore the network of the victim and discovers individual hosts to confirm the information like IP addresses, operating system type and version, and services on the network, gathered in the passive attack phase.
Active attacks are usually used to alter the system. It may affect the integrity, authenticity and availability of data.
2. Passive attack
Answer:
Passive attack attempts to gain information about the target. It exploits confidential information. Passive attacks involve gaining data about a target without the knowledge of the target.
3. Hacker
Answer:
A hacer is a person with a strong interest in computers who enjoys learning and experimenting with them. Hacker are usually very talented, smart people who understand computer better than others.
4. Attack vector
Answer:
An "attack vector" is a path, which an attacker can gain access to a computer or a network server to deliver a malicious outcome. Attack vectors enables attackers to exploit system vulnerabilities, including the human element. Attack vectors includes viruses, E-mail attachments, webpages, pop-up windows. instant messages, chat rooms, and deception. All of these methods involve programming, except deception, in which human operator is fooled into removing or weakening system defenses.
5. Botnet
Answer:
Botnet is a term used for collection of software that runs autonomously and automatically. Botnet is associated with malicious software but can also be used for distributed computing software.
A bot runs automatically in the computer and can gain the control of the computer by infecting them with a virus or other malicious code that gives the access. Computer system maybe a part even through to be operating normally.
3. Answer the following questions:
1. Explain Human-based social engineering.
Answer:
Human-based social engineering refers to person-to-person interaction to get the required/desired information. For example, calling the help desk and tryping to find out a password.
- Impersonating an employee or valid user:
- Posing as an Important user:
- Using a third person:
- Calling technical support:
- Shoulder surfing:
- Dumpster diving:
2. Explain different techniques of Credit Card Frauds.
Answer:
Credit card fraud is a from of identity theft in which criminals makes purchases or obtains cash advances using a credit card account assigned to you.
Following are techniques of credit card frauds:
- Traditional Techniques:
- Paper-based application fraud:
- The traditional credit card fraud is paper-based application fraud. In which a criminal use stolen or fake documents such as utility bills and bank statements those can build up useful information to open an account in someone else's name.
- Application fraud can be divided into:
- ID theft: where an individual pretends to be someone else.
- Financial fraud: Where an individual gives false information about his or her financial status to acquire credit.
- Illegal use of lost and stolen cards:
- In another form of traditional technique, criminals use illegal use of lost and stolen cards. Credit card can be stolen either by pick pocketer or from postal service before it reaches its final destination.
- Modern Techniques:
- Skimming Card Information:
- In this technique, criminals produce a fake credit card. Then they use skimming to commit fraud.
- Skimming is where the information held to either the magnetic strip on the back of the credit card or data stored on the smart chip are copied from one card to another.
- Phishing site can also be used into giving credit card details to wrong site.
- Triangulation:
- The criminal offers good with heavy discounted rates through a website. The customer registers on this website along with credit card details. The criminal orders the goods from a legitimate website with the help of stolen credit card details and supply shipping address that have been provided by the customer while registering on the criminal's website. Such websites are usually available for few weeks/moths,so it is not possible to track.
- Credit card generators:
- It is another modern method where computer imitation software creates valid credit card number and expiry dates. The criminals highly rely on these generators to create valid credit cards. These are available for free download on the Internet.
Comments
Post a Comment