Chapter 2: Cyber Offenses and Cyberstalking
Questions
2.1 Criminals Plan: Categories of Cybercrime
- What are the different categories of cybercrime?
- What is reconnaissance in the context of cybercrime?
- What is the difference between passive and active attacks?
2.2 Cyberstalking
- What are the different types of stalkers?
- What are some common cases reported on cyberstalking?
- How does cyberstalking work?
2.3 Real-Life Incident of Cyberstalking
- Can you describe a real-life incident of cyberstalking?
- What were the consequences for the victim?
2.4 Cybercafe and Cybercrimes
- How are cybercafes vulnerable to cybercrimes?
- What measures can be taken to prevent cybercrimes in cybercafes?
2.5 Botnets
- What is a botnet?
- How is a botnet used as a fuel for cybercrime?
- What is an attack vector?
2.6 Cybercrime: Mobile and Wireless Devices
- How has the proliferation of mobile and wireless devices
contributed to cybercrime?
- What are the trends in mobility that have led to increased
cybercrime?
2.7 Credit Card Frauds
- How has the rise of mobile and wireless computing led to increased
credit card frauds?
- What measures can be taken to prevent credit card frauds?
2.8 Security Challenges Posed by Mobile Devices
- What are the security challenges posed by mobile devices?
- How can these challenges be addressed?
2.9 Authentication Service Security
- What is authentication service security?
- Why is it important?
2.10 Attacks on Mobile/Cell Phones
- What are the different types of attacks on mobile/cell phones?
- How can these attacks be prevented?
Some additional questions:
- What are some common signs of cyberstalking?
- How can individuals protect themselves from cyberstalking?
- What are some consequences of cybercrime?
- How can law enforcement agencies combat cybercrime?
- What is the role of cybersecurity in preventing cybercrime?