Monday, 7 January 2019

Cyber crime and fruad management recollected on October 20th 2018

20.10.2018 cyber crime question

1.cyber crime definition

2.3 factor pressure,opportunity,rationalisation

3.cybernetics,kybernetes,steersman,governor,cyberpunk----given 4 option

4.honey pot

5.1st worm

6.denial of service

7.buffer overflow

8.shoulder surfing

9.access control

10.script kiddles

11.john doe order

12.nigrria419

13cyber wefare

14 email spoofing

15 cyber stalking

16domain name .in represent

17.Satyam infoway ltd vs siffynet supreme court

18cyber warfare

19phishing

20zeus

21.non repudiation

22 tailgating



23.trapdoor

24.captcha.



25 .blue hat hacker

26phreaking

27. Ethical hacking

28.anonymous

29bar code matrix code

30.RFID

31.data manipulation and data definition language

32.symmetic encryption

33. Encryption and decryption

34.locard exchange principle

35.c-Dac

36.payment getway

37.payment and settlements system 2007

38 acquiring bank

39 brute force attack

40.man in the middle attack

41session hijacking

42.digital wallet

43OLTP

44 Ucpdc

45.EMV card

46.netra drdo

47CBI Specialized structure

48.electonic signature

49.DSCI set ip NASSCOM

50.US Initiative -cyber security information sharing act

51.it act andit amendment act.

52.Pki

53 .authenticity

54.maximum value that can be stored in a prepaid card 50000

55. SWIFT





By pritee Hardiha

1 comment: