1] What is Cybercrime?
->Cybercrime is any criminal activity that involves computers or the internet.it includes
offenses like hacking, identity theft, phishing, and distributing malware. these activities can
lead to serious consequences such as financial loss, data breaches and emotional distress for
victims.
2] What is Digital Forensic?
->Digital forensic is the process of collecting, preserving, analyzing and presenting electronic
data to uncover evidence related to cybercrimes. it involves steps like gathering data from
devices, ensuring its integrity, analyzing it for relevant information, and presenting finding in a
legally acceptable manner.
3] What are the two categories of cybercrime?
->1]Crimes Targeting Computers and Network-these are offenses that specifically target
computer systems such as hacking and malware distribution.2]Crimes Using Computers as a
Tool-this include illegal activities like online fraud and identify theft, where computers are used
to facilitated the crimes.
4] What is reconnaissance?
->Reconnaissance is the process of gathering information about a target system or network to
identify vulnerabilities. its the first step in cyber attack and can be divided into two
types:1]passive Reconnaissance.2]active Reconnaissance.
5] What is cyber stalking?
->cyberstalking is a form of online harassment where an individual uses the internet to
repeatedly and intentionally harass or intimidate another person. this can include actions like
sending threatening messages spreading false information or monitoring the victims online
activities without their consent.
6] Define attack vector?
->an attack vector is a method or pathway that cyber attackers use to gain unauthorized access
to a system or network. it represents that various ways attackers can exploit vulnerabilities to
deliver malicious content or execute attacks.
7] What is phishing?
->phishing is a cyber attack method where attackers impersonate legitimate organizations to
trick individuals into revealing sensitive information like passwords or credit card details. this is
often done through fake emails or websites that look trustworthy.
8] What is public-key certification in digital signature?
->public-key certification in digital signatures is the process of verifying a public keys
authentication using a trusted third party known as a certification authority. the CA validates
the identify of the key owner and issues a digital certificate that contains the public key and
owner information signed by the CA.
9] Define denial-of-service(DOS) attack?
->a denial-of-service attack is a functioning of a targeted server, service or network by
overwhelming it with a flood of traffic or requests. the goal of a DOS attack is to make the
service unavailable to its intended uses, effectively denying access to legitimate users.
10] What is the difference between virus and worm?
->1]virus-a virus attaches itself to a legitimate program or file and requires human action to
spread such as opening an infected file.2]Worm-a worm is standalone malware that can self
replicate and spread across networks without needing to attach to a host file, often exploiting
vulnerabilities to propagate.
11] What is online fraud?
->online fraud refer to deceptive schemes conducted over the internet with the intent to steal
money or personal information.it include various activities such as phishing, identity theft and
online shopping scam.
12] Define term cyber security?
->cybersecurity is the practice of protecting computer, network, program and data from
unauthorized access, attacks and damage.
13] What is steganography?
->steganography is the technique of hiding information within other non-secret data to avoid
detection. unlink encryption which secures data by transformation it steganography conceals
the very existence of the information.
14] Define cyber terrorism?
->cyber terrorism is the use of the internet and computer technology to carry out violent acts or
disrupt critical infrastructure aiming to cause fear or harm for political or ideological purposes.
15] Explain the rules of Digital Evidence?
->1]Admissibility-digital evidence must be relevant to the case and gathered lawfully to be
admissible in court.2]Chain of Custody-its important to maintain a clear of custody
documenting who collected handled and stored the evidence to prove it has not been
altered.3]Preservation-digital evidence should be preserved in its original state often by
creating forensic copies to prevent loss or tampering.4]Authentication-the evidence must be
authenticated to establish its integrity and origin often using method like hash values to verify
that the data remains unchanged.
16] What are the consequences of cybercrime and their associated cost?
->1]financial loss-cybercrime can lead to huge financial losses for businesses including theft,
fraud and recovery cost.2]Reputation Damage-companies that experience cyberattacks my
suffer damage to their reputation, leading to loss of customer trust. this can result in decreased
sales and long-term financial impacts that are hard to measure.3]Legal Consequences-
organization may face legal liabilities and regulatory fines for failing to protect customer
data.4]Operational Disruption-cyberattacks can disrupt business operations causing downtime
and loss of service.
17] Why there is need of computer forensic?
->1]Investigation of cybercrime-computer forensics is essential for investigation cybercrimes
by recovering and analyzing digital evidence. which helps law enforcements identify and
prosecute offenders.2]Data Recovery-it aids in recovering lost or deleted data due to accidental
deleting hardware failure or cyberattacks which can be crucial for both business and
individual.3]Legal Evidence-digital evidence gathered through forensic method can be used in
court ensuring that it is admissible and has been properly handled which is important for legal
proceedings.4]Security improvement-forensic analysis helps organization identify
vulnerabilities in their system, allowing them to enhance their cybersecurity measures and
prevent future incidence.
18] Discuss various password cracking techniques?
->1]Brute Force Attack-this method involves trying every possible combination of character
until the correct password is found.it is effective but can take long time especially for complex
password.2]Dictionary Attack-attackers use a list of common password and words to guess the
password. this method is faster than brute force but relies on the password being a common
word.3]Rainbow Table Attack-this technique uses precomputed table of hash value to reverse-
engineer password.4]Social Engineering-attackers manipulate individuals into revealing their
password often through phishing email or impersonating trusted source.
19] Explain in brief each type of intellectual property?
->1]copyright-protects original works of authorship, like book, music, films and software. it
gives creators exclusive rights to reproduce, distribute and display their work.2]Trademarks-
protects symbols, names and slogans that identify goods or services. it helps consumers
distinguish between different and prevents confusion.3]Patent-grants exclusive rights to
inventors for their inventions, preventing others from making, using, or selling the invention for a
certain period new processes, machines, or composition.4]Trade secret-protect confidential
business information that gives a competitive edge, such as recipes or manufacturing
processes. Unlike other IP types, trade secrets are not registered but remain protected as long
as they are kept secret.
20] Why do we need cyber laws in India?
->1]protection of individuals-cyber laws safeguard individuals from various cybercrimes, such
as identity theft, cyberbullying and online harassment. they provide a legal frameworks for
victims to seek justice and protection.2]Regulation of Online Activities-as internet usage grows
it is crucial to regulate online activities including e-commerce and data privacy. cyber laws set
standard for how businesses and individuals should conduct themselves online.3]Prevention of
Cybercrimes-these lows help prevent and penalize cybercrimes like hacking, phishing and
spreading malwares. by clearly defining these offenses and their penalties, cyber laws act as a
deterrent to potential criminals.4]Promotion of cybersecurity-cyber laws encourage
organization to adopt necessary security measures to protect their data and system.
21] What is cyber forensics explain in details?
->cyber forensics also known as digital forensics is the practice of collecting, analyzing and
preserving electronic data to investigate cybercrimes and security including.1]Definition-cyber
forensics involves the identification, preservation, analysis and presentation of digital evidence
from computers, mobile devices, networks and other digital storage media.it aims to uncover
evidence that can be used in legal proceedings.2]Tools-cyber forensics utilizes various
software and hardware tools for data recovery, analysis, and reporting. common tools include
Encases, FTK and Wireshark.3]Application-cyber forensics is essential in criminal investigation,
corporate security branches, and civil litigation. it helps law enforcement, organizations and
legal teams understand the scope of incidents and gather evidences for prosecution or
defense.
22] What is proxy server? Also write the purpose of it?
->A proxy server is an intermediary server that acts as a gateway between a user device and the
internet. it processes requests from users forwards them to the desired web server and then
return the response back to the user.1]Anonymity-it hides the user IP address making online
activities more private and anonymity.2]Access Control-organization use proxy severs to
restrict access to certain websites or content ensuring that employees only access approved
resources.3]Caching-proxy server can store copies of frequently accessed web pages which
helps speed up loading times and reduces bandwidth usage.4]Security-they can provide an
additional layer of security by filtering out harmful content and protecting the internet network
from external threats.
23] Explain different types of credit card frauds?
->1]Card Not Present(CNP) Fraud-this type occurs when a thief uses stolen credit card
information to make purchases online or over the phone without having the physical card. its
common in e-commerce transactions.2]Card Present Fraud-this fraud happens when someone
physically has the credit card and used it for in-person transactions. this can happen through
theft or cloning of the card.3]Account Takeover-in this case a fraudster gains access to the
victim credit card account often through phishing or data breaches and makes unauthorized
purchases or changes account details.4]Application Fraud-this occurs when a fraudster uses
someone else personal information to apply for a credit card usually obtained through identity
theft method like stealing document or phishing.
24] Explain the different real life example of cybercrime?
->1]Ransomware Attack-one notable case is the WannaCry ransomware attack in 2017 which
affected hundreds of thousands of computer worldwide. it encrypted users files and demanded
payment in bitcoin to unlock them.2]Data Breaches-the target data breach in 2023 is a
significant example where hackers accessed the credit card and debit card information of
approximately 40 million customers.3]Phishing Scams-i 2020 a sophisticated phishing attack
targeted employees of several major companies using email that appeared to be from their IT
departments.4]Identity Theft-the case of the Equifax data breach in 2017 is a prime example
where sensitive information of 147 million people was exposed.
25] What is Domain Name? explain with example?
->A domain name is a human-friendly address used to identify a specific location on the
internet. it allows users to access websites without needing to remember the numerical IP
addresses that computers use to communicate with each other. a domain name consists of
two parts the unique name and top-level domain(TLD).Ex-in the domain name
www.example.com:-"example" is the unique name chosen by the website owner. "com" is the
top-level domain, which indicates the type of organization or purpose of the website.in this
case "com" is commonly used for commercial entities.
26] Explain how botnets can be used as a fuel to cybercriminal?
->Botnets are network of compromised computers or devices that cybercriminals control to
perform various malicious activities.1]DDoS Attacks-botnets can launch distributed denial of
service attack overwhelming a target server with traffic this can cause the website to crash
making it inaccessible to legitimated users.2]Spam and Phishing-cybercriminal use botnet to
send massive amount of spam email. these email can contain phishing links that trick user into
providing sensitive information like password or credit card detail.3]Credential Stuffing-botnet
can automate attempts to use stolen usernames and password across multiple sites. since
many people reuse password this can lead to unauthorized access to various accounts
resulting in identity theft or financial loss.
27] Describe active and passive attacks in detail?
->1]Active attacks-active attack involve an attacker actively engaging with a system to disrupt
or manipulate data. a]Modification of data-an attacker alters data being transmitted such as in
a man-in-the-middle attack. b]Denial of Service-this attack overwhelms a service making it
unavailable to users, often using a flood of traffic. c]Masquerading-the attacker impersonates a
legitimate user to gain unauthorized access.2]Passive attack-passive attack on the other hand
involve monitoring communication without altering them. a]Eavesdropping-an attack listens in
on communications to capture sensitive information like passwords. b]Traffic Analysis-
analyzing network traffic pattern to infer information about the communication. c]Data
interception-capturing data packets traveling across the network without modifying them.
28] What is EQL injection? Explain different method to prevent SQL injection attack?
->SQL injection is a security vulnerability that allows an attacker to interfere with the queries
that an application makes to its database. it happens when an application includes untrusted
data in a SQL query without proper validation. this can let attackers access, modify or delete
data in the database.1]Use Prepared Statements-this means using a template for your SQL
queries where you separated the actual SQL code from the data.2]Input Validation-check and
validate all user inputs. make sure they match expected formats.3]Stored Procedures-use
stored procedures to executes SQL command these are pre-written SQL queries that are strode
in the database and can help prevent injection because they are executed in a controlled
manner.
29] Explain organizational guidelines for internet usage?
->organizational guidelines for internet usage are crucial for maintaining a safe and productive
work environment.1]Acceptable Use Police(AUP)-this outline what employee can and cannot
do on the internet using company resource.2]Data Security-employee must understand the
importance of protecting sensitive information. guidelines should cover how to handle
confidential data, use secure password and recognize phishing attempt to prevent
unauthorized access or data breaches.3]Social Media Use-organization should provide clear
guideline on how employee can represent the compony on social media.4]Monitoring and
Compliance-employee should be aware that their internet usage may be monitored to ensure
adherence to the guidelines.
30] Define virus. Discuss the type of viruses?
->A virus is a type of malicious software that can replicate itself and spread from one computer
to another causing harm to system and data.1]File Infector Virus-Attaches itself to executable
file and spreads when those file are run.it can corrupt or delete files.2]Macro Virus-targets
applications that use macro like word or excel.it spreads through document containing infected
macros.3]Boot Sector Virus-Infect the boot sector of a storage device and actives when the
computer starts, making it hard to detect.4]polymorphic virus-change its code each time it
infects a new file making it difficulty for antivirus software to detect.
31] Discuss how email are used in Forensics analysis?
->1]Evidence Gathering-email can be collected as digital evidence in investigation. forensic
exports can retrieve email from server or device to analyze communication related to a
case.2]Metadata Analysis-each email contains metadata which include detail like the sender,
recipient, timestamps and routing information. analyzing this metadata helps establish the
timeline of events and the authenticity of the email.3]content Analysis-the content of email is
examined for relevant information, such as thread or discussion about illegal activities. this can
provide insights into the intentions and action of individual involved.4]relationship mapping-by
analyzing email communication forensic analysts can identify connection between individuals.
32] What is CIA? Discuss three concept of CIA model?
->CIA stand for confidentiality, integrity and Availability which are fundamental principle in
information security.1]Confidentiality-this principle ensures that sensitive information is only
accessible to those who have the proper authorization.2]Integrity-integrity involves maintaining
the accuracy and reliability of data. this means that information should not be altered or
tampered with by unauthorized individual.3]Availability-this principle ensures that information
and resource are accessible to authorized users when needed.it involves implementing
measures such as redundancy, backups and disaster recovery plans to prevent downtime.
33] What are the challenges to Indian law and cybercrime scenario in India?
->1]Lack of Awareness-many people and businesses are not fully aware of cyber threats and
the importance of cybersecurity leading to vulnerabilities.2]Evolving Technology-rapid
advancements in technology often outpace legal framework making it difficult to address new
types of cybercrime effectively.3]Inadequate Legal Framework-while there are laws like the IT
act there are still gaps and ambiguities that make it hard to prosecute
cybercriminals.4]Jurisdictional Issues-cybercrime frequently cross border complicating
enforcement and cooperation between countries when trying to tackle these crime.
34] social media marketing?
->this is a form of digital marketing that utilizes social media platform to utilizer social media
platform to promote products services or brands.it involves creating and sharing content
tailored to the target audience on platform like Facebook, Instagram, twitter. social media
marketing aims to engage users build brand awareness and drive website traffic.
35] Data Diddling?
->data diddling refer to the unauthorized manipulation of data before or after it is processed by
a computer system. this can involve altering data to produce false result, such as changing
figures in financial reports or organization. data diddling can occur in various forms including
changing input data, modifying software or altering output data.