Cyber Security and Laws: Important Questions
Important Questions: Cyber Security & Laws
Ch 1 Introduction to Cybercrime
- Classify the cybercrimes and explain any one briefly.
- Write brief note on: Cyber-terrorism.
- Give a classification of cybercrime and cybercriminals.
- Explain in detail Cyber defamation and various types of criminals.
Ch 2 Cyber offenses & Cybercrime
- Discuss basic security precautions to be taken to safeguard Laptops and wireless devices.
- Compare Vishing, Phishing and Smishing in cyber security.
- How criminals plan the attack? Discuss various steps involved.
- Compare active attacks vs Passive attacks.
- Describe in detail about how criminals plan attacks?
- What are botnets? How it is exploit by attacker to cause cyber-attack.
- What do you understand by Social Engineering? Give its classification.
- Explain various challenges posed by mobile devices and their counter measures.
- Explain cloud computing with cyber-attacks.
- What do you mean by cyber stalker? Discuss types of stalker and their mitigation techniques.
- Explain Social Engineering. What are the security threats that can emanate from social networking sites?
Ch 3 Tools and Methods Used in Cyber line
- What is Bluetooth hacking? Explain Bluetooth hacking
tools in brief.
- Explain in detail the concepts of phishing and
identity theft.
- What do you understand by DOS and DDOS attacks?
Explain in detail.
- How attack vector will be use by attacker to gain
access of system?
- Explain various types of key-loggers in brief.
- Explain in detail mitigation techniques for DOS and
DDOS attack.
- What is SQL injection attack? Are there any
countermeasures that can be used to prevent the attack?
- Write short note on Identity Theft.
- What is buffer overflow problem? How NOPS are uses
to cause buffer overflow problem? Discuss 3 tools used defend buffer
overflow problem.
- Explain various types of phishing attacks and its
countermeasures.
- What is proxy servers and anonymizers
- What is phishing and how it works
- Write a note on Password cracking attacks
- Define password cracking. Formulate the
guidelines for strong, weak and random passwords.
- Define keyloggers and classify it. Recommend
the tool to detect it.
- Investigate on how computer viruses can
be categorized based on their attacks
- Explain trojan horse
- Discuss the functions of Backdoor and
lis tew examples with brief expanation
- Formulate the steps to protect from trojan
horse and backdoor
- Write a note on steganography
- Define DoS attacks. Classify DoS attacks
- Identify the different levels of DoS attack
and tools used to launch DoS attack
- What is DDoS? Recommend the preventive
measures for DoS/DDoS attack
- Define SQL injection. Formulate the steps
for SQL injection attack and counter measures to prevent it.
- Explain Buffer overflow
- Examine the traditional techniques of
attacks on wireless network and tools to protect it
- Examine the methods and techniques used
by phishers for phishing
- Write a note on SPS Algorithm
- Categorize the types of Identity theft
- Categorize the types of Phishing Scams
- Examine the techniques of ID theft
- Write a note on Personally Identifiable
information
Comments
Post a Comment