Saturday, 16 February 2019

Recollected cyber crime and fruad management on 16.02.2019

RECOLLECTED QUESTION OF PAPER ON 16 Feb 2019

2

cyber crime definition

3

john doe order

4

cyber stalking

5

cyber warfare

6

phishing

7

zeus

8

.non repudiation

9

.trapdoor

10

 Ethical hacking

11

2D/matrix code

12

.RFID

13

symmetic encryption

14

 Encryption and decryption

15

c-Dac

16

payment and settlements system 2007

17

acquiring bank

18

 brute force attack

19

man in the middle attack

20

session hijacking

21

CBI specialised structures

22

.electonic signature

23

US Initiative -cyber security information sharing act

24

.it act andit amendment act.

25

.Pki

26

.authenticity

27

SWIFT-details

28

IT adjudicator-detail

29

Budapost convention details

30

piggyback

31

threats

32

motives of cybercrime

33

APT agents-page 14

34

cybercrime not defined

35

threat landscape

36

fastflux

37

cyber squatting-infring trademark

38

stuxnet attack nuclear programe in iran

39

life imprisonment c terrorism

40

vishing

41

data/information

42

pillars IS -2 mark

43

authorisation/authentication

44

diff b/w digital and elec signature

45

tailgating

46

masquerading

47

data diddling

48

MiTMZombies

49

hacking def

50

hacking tools-steganograpy/profiling/key logger/key stroke logger

51

rootkit

52

white hat/black hat

53

zero day vulnerability

54

script kiddie

55

mens rea

56

application process control-software

57

RFID tags

58

detection control-principles

59

mitigation controls

60

telephonic instructions case study

61

digital footprints

62

cdr long form

63

BPSS

64

IPS- Intrution prevention sys

65

ISO 27001-ISMS

66

GPS

67

APP-def details

68

Rupay -network managed by NFS

69

shimmer

70

RBI stated banks that terminals installed at merchants should certified PCI-DSS PA-DSS page 147

71

ITAA 2008 exclusions

72

acts amemded y ITA 2000

73

anwar vs Basheer case page-162

74

jurisdiction page 162

75

NCRB

76

incidence of tax

77

OED-guiding principles for taxation in e com--page 174

78

major criminals in cyberspace -youth page 187

79

CERT in national nodal agency

80

G Gopalkrishna working group-2mark

81

IDRBT manages INFINET page 202

82

NTRO

83

national security policy by DeITY

84

CBI undee ministry of personal

85

RAW under PMO

86

Interpol details

87

BOSS devloped by C-DAC

1 comment: