20.10.2018 cyber crime question
1.cyber crime definition
2.3 factor pressure,opportunity,rationalisation
3.cybernetics,kybernetes,steersman,governor,cyberpunk----given 4 option
4.honey pot
5.1st worm
6.denial of service
7.buffer overflow
8.shoulder surfing
9.access control
10.script kiddles
11.john doe order
12.nigrria419
13cyber wefare
14 email spoofing
15 cyber stalking
16domain name .in represent
17.Satyam infoway ltd vs siffynet supreme court
18cyber warfare
19phishing
20zeus
21.non repudiation
22 tailgating
23.trapdoor
24.captcha.
25 .blue hat hacker
26phreaking
27. Ethical hacking
28.anonymous
29bar code matrix code
30.RFID
31.data manipulation and data definition language
32.symmetic encryption
33. Encryption and decryption
34.locard exchange principle
35.c-Dac
36.payment getway
37.payment and settlements system 2007
38 acquiring bank
39 brute force attack
40.man in the middle attack
41session hijacking
42.digital wallet
43OLTP
44 Ucpdc
45.EMV card
46.netra drdo
47CBI Specialized structure
48.electonic signature
49.DSCI set ip NASSCOM
50.US Initiative -cyber security information sharing act
51.it act andit amendment act.
52.Pki
53 .authenticity
54.maximum value that can be stored in a prepaid card 50000
55. SWIFT
1.cyber crime definition
2.3 factor pressure,opportunity,rationalisation
3.cybernetics,kybernetes,steersman,governor,cyberpunk----given 4 option
4.honey pot
5.1st worm
6.denial of service
7.buffer overflow
8.shoulder surfing
9.access control
10.script kiddles
11.john doe order
12.nigrria419
13cyber wefare
14 email spoofing
15 cyber stalking
16domain name .in represent
17.Satyam infoway ltd vs siffynet supreme court
18cyber warfare
19phishing
20zeus
21.non repudiation
22 tailgating
23.trapdoor
24.captcha.
25 .blue hat hacker
26phreaking
27. Ethical hacking
28.anonymous
29bar code matrix code
30.RFID
31.data manipulation and data definition language
32.symmetic encryption
33. Encryption and decryption
34.locard exchange principle
35.c-Dac
36.payment getway
37.payment and settlements system 2007
38 acquiring bank
39 brute force attack
40.man in the middle attack
41session hijacking
42.digital wallet
43OLTP
44 Ucpdc
45.EMV card
46.netra drdo
47CBI Specialized structure
48.electonic signature
49.DSCI set ip NASSCOM
50.US Initiative -cyber security information sharing act
51.it act andit amendment act.
52.Pki
53 .authenticity
54.maximum value that can be stored in a prepaid card 50000
55. SWIFT
No comments:
Post a Comment