Cyber Security and Laws: Important Questions

 Important Questions: Cyber Security & Laws


Ch 1 Introduction to Cybercrime

  1. Classify the cybercrimes and explain any one briefly.
  2. Write brief note on: Cyber-terrorism.
  3. Give a classification of cybercrime and cybercriminals.
  4. Explain in detail Cyber defamation and various types of criminals.


Ch 2 Cyber offenses & Cybercrime

  1. Discuss basic security precautions to be taken to safeguard Laptops and wireless devices.
  2. Compare Vishing, Phishing and Smishing in cyber security.
  3. How criminals plan the attack? Discuss various steps involved.
  4. Compare active attacks vs Passive attacks.
  5. Describe in detail about how criminals plan attacks?
  6. What are botnets? How it is exploit by attacker to cause cyber-attack.
  7. What do you understand by Social Engineering? Give its classification.
  8. Explain various challenges posed by mobile devices and their counter measures.
  9. Explain cloud computing with cyber-attacks.
  10. What do you mean by cyber stalker? Discuss types of stalker and their mitigation techniques.
  11. Explain Social Engineering. What are the security threats that can emanate from social networking sites?


Ch 3 Tools and Methods Used in Cyber line

  1. What is Bluetooth hacking? Explain Bluetooth hacking tools in brief.
  2. Explain in detail the concepts of phishing and identity theft.
  3. What do you understand by DOS and DDOS attacks? Explain in detail.
  4. How attack vector will be use by attacker to gain access of system?
  5. Explain various types of key-loggers in brief.
  6. Explain in detail mitigation techniques for DOS and DDOS attack.
  7. What is SQL injection attack? Are there any countermeasures that can be used to prevent the attack?
  8. Write short note on Identity Theft.
  9. What is buffer overflow problem? How NOPS are uses to cause buffer overflow problem? Discuss 3 tools used defend buffer overflow problem.
  10. Explain various types of phishing attacks and its countermeasures.
  11. What is proxy servers and anonymizers
  12. What is phishing and how it works
  13. Write a note on Password cracking attacks  
  14. Define password cracking. Formulate the guidelines for strong, weak and random passwords.
  15. Define keyloggers and classify it. Recommend the tool to detect it.
  16. Investigate on how computer viruses can be categorized based on their attacks
  17. Explain trojan horse
  18. Discuss the functions of Backdoor and lis tew examples with brief expanation
  19. Formulate the steps to protect from trojan horse and backdoor
  20. Write a note on steganography
  21. Define DoS attacks. Classify DoS attacks
  22. Identify the different levels of DoS attack and tools used to launch DoS attack
  23. What is DDoS? Recommend the preventive measures for DoS/DDoS attack
  24. Define SQL injection. Formulate the steps for SQL injection attack and counter measures to prevent it.
  25. Explain Buffer overflow
  26. Examine the traditional techniques of attacks on wireless network and tools to protect it
  27. Examine the methods and techniques used by phishers for phishing
  28. Write a note on SPS Algorithm
  29. Categorize the types of Identity theft
  30. Categorize the types of Phishing Scams
  31. Examine the techniques of ID theft
  32. Write a note on Personally Identifiable information

Comments

Popular posts from this blog

Module 04 The Concept of Cyberspace Presentation

Books: Cyber Security and Laws