RECOLLECTED QUESTION OF PAPER ON 16 Feb 2019
2
cyber crime definition
3
john doe order
4
cyber stalking
5
cyber warfare
6
phishing
7
zeus
8
.non repudiation
9
.trapdoor
10
Ethical hacking
11
2D/matrix code
12
.RFID
13
symmetic encryption
14
Encryption and decryption
15
c-Dac
16
payment and settlements system 2007
17
acquiring bank
18
brute force attack
19
man in the middle attack
20
session hijacking
21
CBI specialised structures
22
.electonic signature
23
US Initiative -cyber security information sharing act
24
.it act andit amendment act.
25
.Pki
26
.authenticity
27
SWIFT-details
28
IT adjudicator-detail
29
Budapost convention details
30
piggyback
31
threats
32
motives of cybercrime
33
APT agents-page 14
34
cybercrime not defined
35
threat landscape
36
fastflux
37
cyber squatting-infring trademark
38
stuxnet attack nuclear programe in iran
39
life imprisonment c terrorism
40
vishing
41
data/information
42
pillars IS -2 mark
43
authorisation/authentication
44
diff b/w digital and elec signature
45
tailgating
46
masquerading
47
data diddling
48
MiTMZombies
49
hacking def
50
hacking tools-steganograpy/profiling/key logger/key stroke logger
51
rootkit
52
white hat/black hat
53
zero day vulnerability
54
script kiddie
55
mens rea
56
application process control-software
57
RFID tags
58
detection control-principles
59
mitigation controls
60
telephonic instructions case study
61
digital footprints
62
cdr long form
63
BPSS
64
IPS- Intrution prevention sys
65
ISO 27001-ISMS
66
GPS
67
APP-def details
68
Rupay -network managed by NFS
69
shimmer
70
RBI stated banks that terminals installed at merchants should certified PCI-DSS PA-DSS page 147
71
ITAA 2008 exclusions
72
acts amemded y ITA 2000
73
anwar vs Basheer case page-162
74
jurisdiction page 162
75
NCRB
76
incidence of tax
77
OED-guiding principles for taxation in e com--page 174
78
major criminals in cyberspace -youth page 187
79
CERT in national nodal agency
80
G Gopalkrishna working group-2mark
81
IDRBT manages INFINET page 202
82
NTRO
83
national security policy by DeITY
84
CBI undee ministry of personal
85
RAW under PMO
86
Interpol details
87
BOSS devloped by C-DAC
2
cyber crime definition
3
john doe order
4
cyber stalking
5
cyber warfare
6
phishing
7
zeus
8
.non repudiation
9
.trapdoor
10
Ethical hacking
11
2D/matrix code
12
.RFID
13
symmetic encryption
14
Encryption and decryption
15
c-Dac
16
payment and settlements system 2007
17
acquiring bank
18
brute force attack
19
man in the middle attack
20
session hijacking
21
CBI specialised structures
22
.electonic signature
23
US Initiative -cyber security information sharing act
24
.it act andit amendment act.
25
.Pki
26
.authenticity
27
SWIFT-details
28
IT adjudicator-detail
29
Budapost convention details
30
piggyback
31
threats
32
motives of cybercrime
33
APT agents-page 14
34
cybercrime not defined
35
threat landscape
36
fastflux
37
cyber squatting-infring trademark
38
stuxnet attack nuclear programe in iran
39
life imprisonment c terrorism
40
vishing
41
data/information
42
pillars IS -2 mark
43
authorisation/authentication
44
diff b/w digital and elec signature
45
tailgating
46
masquerading
47
data diddling
48
MiTMZombies
49
hacking def
50
hacking tools-steganograpy/profiling/key logger/key stroke logger
51
rootkit
52
white hat/black hat
53
zero day vulnerability
54
script kiddie
55
mens rea
56
application process control-software
57
RFID tags
58
detection control-principles
59
mitigation controls
60
telephonic instructions case study
61
digital footprints
62
cdr long form
63
BPSS
64
IPS- Intrution prevention sys
65
ISO 27001-ISMS
66
GPS
67
APP-def details
68
Rupay -network managed by NFS
69
shimmer
70
RBI stated banks that terminals installed at merchants should certified PCI-DSS PA-DSS page 147
71
ITAA 2008 exclusions
72
acts amemded y ITA 2000
73
anwar vs Basheer case page-162
74
jurisdiction page 162
75
NCRB
76
incidence of tax
77
OED-guiding principles for taxation in e com--page 174
78
major criminals in cyberspace -youth page 187
79
CERT in national nodal agency
80
G Gopalkrishna working group-2mark
81
IDRBT manages INFINET page 202
82
NTRO
83
national security policy by DeITY
84
CBI undee ministry of personal
85
RAW under PMO
86
Interpol details
87
BOSS devloped by C-DAC