Prevention of cyber crime and fraud management" - 25.08.2019 Recollected Questions
Crime Defined in IPC 1860
Threat vector
John Doe order
IT Amendment Act 2008 section 66 F cyber terrorism
Cyber stalking
IT act section 66 D cyber cheating
Stuxnet
Phising
Digital signature
Tailgating
Masquerading
Shoulder surfing
Dumpster diving
Man in the middle attack
Rootkit
Script kiddie
Blue hat hackers
Phreaking
Cyber risk insurance
Symmetric encryption
Digital footprints
Locard's exchange principle - taking and leaving
IMEI
Internet of things
BPSS
Brute Force attack
Rupay card
PCI DSS
3D Secure
Stylometry
Disgruntled employees
Salami attack
Net neutrality
CERT in
I4C
Boss Linux
Steganography
Crime Defined in IPC 1860
Threat vector
John Doe order
IT Amendment Act 2008 section 66 F cyber terrorism
Cyber stalking
IT act section 66 D cyber cheating
Stuxnet
Phising
Digital signature
Tailgating
Masquerading
Shoulder surfing
Dumpster diving
Man in the middle attack
Rootkit
Script kiddie
Blue hat hackers
Phreaking
Cyber risk insurance
Symmetric encryption
Digital footprints
Locard's exchange principle - taking and leaving
IMEI
Internet of things
BPSS
Brute Force attack
Rupay card
PCI DSS
3D Secure
Stylometry
Disgruntled employees
Salami attack
Net neutrality
CERT in
I4C
Boss Linux
Steganography
Pass with 60 marks
ReplyDelete