Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
2 views3 pages

Unit 2 Assignment 2

Chapter 2 discusses various aspects of cyber offenses, including categories of cybercrime, cyberstalking, and the vulnerabilities of cybercafes. It covers the implications of mobile and wireless devices on cybercrime, credit card frauds, and security challenges. Additionally, it addresses authentication service security and types of attacks on mobile devices, along with preventive measures and the role of law enforcement and cybersecurity in combating these issues.

Uploaded by

shivani
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
2 views3 pages

Unit 2 Assignment 2

Chapter 2 discusses various aspects of cyber offenses, including categories of cybercrime, cyberstalking, and the vulnerabilities of cybercafes. It covers the implications of mobile and wireless devices on cybercrime, credit card frauds, and security challenges. Additionally, it addresses authentication service security and types of attacks on mobile devices, along with preventive measures and the role of law enforcement and cybersecurity in combating these issues.

Uploaded by

shivani
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

Chapter 2: Cyber Offenses and Cyberstalking

Questions

2.1 Criminals Plan: Categories of Cybercrime

- What are the different categories of cybercrime?


- What is reconnaissance in the context of cybercrime?
- What is the difference between passive and active attacks?

2.2 Cyberstalking

- What are the different types of stalkers?


- What are some common cases reported on cyberstalking?
- How does cyberstalking work?

2.3 Real-Life Incident of Cyberstalking

- Can you describe a real-life incident of cyberstalking?


- What were the consequences for the victim?

2.4 Cybercafe and Cybercrimes

- How are cybercafes vulnerable to cybercrimes?


- What measures can be taken to prevent cybercrimes in cybercafes?

2.5 Botnets

- What is a botnet?
- How is a botnet used as a fuel for cybercrime?
- What is an attack vector?
2.6 Cybercrime: Mobile and Wireless Devices

- How has the proliferation of mobile and wireless devices


contributed to cybercrime?
- What are the trends in mobility that have led to increased
cybercrime?

2.7 Credit Card Frauds

- How has the rise of mobile and wireless computing led to increased
credit card frauds?
- What measures can be taken to prevent credit card frauds?

2.8 Security Challenges Posed by Mobile Devices

- What are the security challenges posed by mobile devices?


- How can these challenges be addressed?

2.9 Authentication Service Security

- What is authentication service security?


- Why is it important?

2.10 Attacks on Mobile/Cell Phones

- What are the different types of attacks on mobile/cell phones?


- How can these attacks be prevented?

Some additional questions:

- What are some common signs of cyberstalking?


- How can individuals protect themselves from cyberstalking?
- What are some consequences of cybercrime?
- How can law enforcement agencies combat cybercrime?
- What is the role of cybersecurity in preventing cybercrime?

You might also like