The document outlines various aspects of cyber crime, including definitions, classifications, and specific types such as phishing, Trojan Horses, and DOS attacks. It also discusses legal frameworks like the IT ACT 2000, intellectual property issues, and the role of digital signatures. Additionally, it covers security policies, the life-cycle of viruses, and specific cyber threats like salami attacks and email spoofing.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0 ratings0% found this document useful (0 votes)
20 views
Cy Ber Security Important Questions
The document outlines various aspects of cyber crime, including definitions, classifications, and specific types such as phishing, Trojan Horses, and DOS attacks. It also discusses legal frameworks like the IT ACT 2000, intellectual property issues, and the role of digital signatures. Additionally, it covers security policies, the life-cycle of viruses, and specific cyber threats like salami attacks and email spoofing.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 1
1. Define the term cyber crime.
Give the classification of cyber crime
2. Explain the different types of phishing techniques 3. Describe the intellectual property issues. 4. How attack on Wireless network perform? 5. Explain the term Logic Bomb, Worms, spyware in brief. 6. What is IT ACT 2000? Write the features of IT ACT 2000. 7. Define the term cyber terrorism in detail. 8. Write down the life-cycle phases of virus 9. What is the role of digital signature in digital evidence? 10. How Trojan Horses affect the computer System/Network? 11. What is Salami attack? How information can be gathered through Salami technique? 12. Explain the various types of security policies and their review process. 13. What do you mean by information security? 14. How DOS and DDOS attack can be performed? 15. Write the short notes on: i) E-mail spoofing ii) Software Piracy iii) Trapdoors iv) Key loggers V) Spamming 16. Explain the term Cyber Crime. List down some important cyber crimes and explain each of them in two to three sentences 17.