Cyber crime and fraud management recollected questions today
Cyber stalking
IT amendment act
Types of control
Cyber crime origin
Punishment for cyber crime
Cyber squatting
CIA
CBI function
Honeypot
Payment system
Information security
ISO 27001
NTRO
Rootkit
Trojan horse
Info steal
Cyber terrorism
Hacking
Hacking defined under IT or ITA
Computer Fraud
Vishing
IPC
DoS
Cyber Extortion
Fire Alarm and CCTV, which type of control
Malware
Hactivist
White hat hackers
Digital signature
Electronic signature
Integrity
Durability
Cyber forensic
RBI as regulatory
Sniffer
PKI
Encryption-decryption
Motive of hacker
OLTP
Payment Gateway
Very few questions from module D.
No comments:
Post a Comment