Showing posts with label IIBF Cyber crime and Fraud management. Show all posts
Showing posts with label IIBF Cyber crime and Fraud management. Show all posts

Sunday, 12 March 2023

CCP recollected questions on 11.03.2023

 RECOLLECTED QUESTIONS CCP 11.03.2023 3.30 PM

Case studies:

1. PRIORITY SECTOR LENDING ( pslcs , housing, education)

2. EXPORT FINANCE ( PCFC, post shipment credit, NTP)

3. Insolvency and bankruptcy code

4. Factoring and forfaiting

5.current ratio, dscr , limit calculations and interpretation

6. Debt equity ratio, turnover ratios and collection periods

7. Bank guarantees

8. Break even analysis ..

Normal questions :

1. Liquidity risk - asset liabilities management

2. Contents of credit policy

3. Certificate of commencement of business - issued by registrar of companies as per company act -2013

4. Question on one person company ( OPC )

5. case based questions regarding advance to Limited company

6. Questions on bills discounting system

7. Types of syndication

8.guidelines on consortium lending.

9.statutory and regulatory restrictions on loans and advance

10. Current ratio problems and comparison for two different companies

11. Two problems on tangible networth

12. Sensitivity analysis

13. Question on payback period

14. Time value of money - features, problems on present and future value 

15. Advantages and disadvantage of IRR 

16. Margin of safety in break even analysis

17. Net working capital definition

18. Impact of inadequate working capital

19. Margin percentage in turnover method - 5 percentage of projected annual turnover

20. Min investment in commercial paper - 5 lakh

21. LC which covers storage and warehouse charges - green clause LC

22. Questions on coacceptance facilities

23. Questions on diamond dollar account DDA scheme

24.ultra vires borrowing

25. Running account facility in pre shipment finance

26. Loans under weaker section in priority sector lending

27. Characteristics of retail banking

28. Purpose for model home loan

29. Repayment period in IBA model education loan - 15 years

30. Moratorium period in IBA mode education loan - 2 years

31. Calculation of loan amount - IBA model education loan 

32. Documents of which registration is compulsory

33. Time limit for registration of documents

34. Personal liability documents

35. Limitation of documents - time period

36. Question on English mortgage

37. Question on credit monitoring and tools.

38. Objectives of supervision and follow up

39. Doubt ful asset - definition

40. Prudential and revised prudential guidelines on restructuring of advances

41. Wilful defaulter

42. SARFAESI act notice period - 60 days

43.case based question on mortgage and CERSAI registration of two different banks

Thursday, 30 December 2021

CYBER CRIME QUESTIONS OF IIBF EXAM (MEmoRY BaSed previous Years

 CYBER CRIME QUESTIONS OF IIBF EXAM (MEmoRY BaSed previous Years

Q1.what is honey pot.

Q2. What are steps involved in a Ecommerce transactions.

Q3. Difference between durability and consistency.

Q4. What is firewell.

Q5 .what is wankworm and NASA.

Q6. Eucp published in which year.

Q7.OLA is not a popular app store.

Q8.what is circumstantial evidences. 

Q9.BOSS (Bharat operating system solution) was developed by which organizations -CDAC 

Q10.what is malicious code writer's. 

Q11.What is multilayered security 

Q12. What is data. 

Q13.blackmailing is an example of cyber extortion. 

Q14 what is SCADA.

Q15.what is cryptolocker

Q16.smart card in metro railway stations are examples 

Q17.packet filter firewall.

Q18. micro ATM.

Q19.cross site Scripting.

Q20. What is A hectivist...

Q21. Rupay card is issued in which year. 

Q22. what is Trojan hourse. 

Q23. What is malware.

Q.24. data backup is an example of which type of control.

Q25. what is Lebance loop modus oprendi in atm card frauds.

Q26.CCTV is an example of which control.

Q27.what is Cyber Smearing.

Q28.what is operating system Vulnerability

Q29.what is full form of CISA cyber security information sharing Act.

Q30 what is Zeus viruses.

Q31.what is hashh value and integrity.

Q32.what difference between Authorization and Authentication.

Q33. What is INFO stealer?

Q34.what is A back End Access.

Q35.what is meaning of phrase of "Ab initio Unlawfully or Unlegally.

Q36.what is security Administration and Quality Assurance.

Q37.what is CAPTCHA.

Q38.Intentionally misrepresentation of Data is called A Fraud.

Q39.What is definition of Control.

Q40.What is John Deo Order. ...

Q41.what is payment walked and digital wallet

Q42 what is Anonymous.

Q43. What is trapdoor access.

Q44.Total branch automation TMA.

Q45. .com and .org are TLD.

Q46. TCS fraud in Andhra Pradesh is an example of reasonable security practises and procedures.

Q47. The PVCL case in India refers to which Act of IT act Act_69 power to moniter, intercept or Block URL.

Q48.one question on CBS and TBA total branch Automations.

Q49. Sys admin sys user or teller all are examples of Spoofing.

Q50.what is A network Analysis.

Q51.what is vulnerability

Q52.what is DNS sinkholding.

Q53.e.Contactless smart card are example of which.

Q54 . Lebance Loop card fraud rubber band type material inside Atm Fraud.

Q55.what is Contigency planning.

Q56.what is Nigrean 419 Fraud.

Q57.Dumpster Diving.

Q58.what is difference between Steersman and script kiddle ,

Q59.Staganography.

Q60. What is SSL injections and Cross Site Scripting......

Q61. Preventive detective and compensating contol.

Q62. DRONES ARE developed by Drdo.

Q63.income tax.

Q64.Director of DRDO and it's powers.

Q65 .differencebetween Cert india and nasscom.

Q66.TSP/IP. Q67.DDos Attack.

Q68. CyberSmearing and Cyber Defamation.

Q69. Cyberwarfare and Cyber terrorism.

Q70. BECKDOOR access.

Q71.digital signature.

Q72.symmetric and AsymmetricEncryption

Q73.public and private keys.

Q74.command Injections and SQL injections.

Q75.details of Masquerding Attack.

Q76. Trapdoor access and BYOT device.

Q77.Sec.43 and Sec 46 of IT act.....

Q78.Sec. 69 B deals with......

Q79.Blue Hat hackers are a Part of testing team.

Q80.what is crypyolocker and INFO Stealer

Q81.WHAT IS zeus virus

Q82.What do you understand by Mean rea or destructive Mindset.

Q83.what is DDL DATA definition language

Q84.what is packet filteration Firewall

Q85.what do you understand by the word ANONMOUS

Q85.what is computer vandalism

Q86.WHAT IS FRONT END validation control

Q87.what is DATA

Q88.WHAT IS Locard Exchange PRINCIPLE

Q89.WHAT is penalty under SECTION 46 AND 47 of IT AMENDMENT ACT

Q90.What is xss cross site scripting

Q91.what is TCS fraud IN andhrapredseh is EXAMPLE OF

Q92.WHAT is cybersmearing

Q93.what is STEERSMAN

Q94.WHAT do you mean by ALITE HECKER

Q95.IDS is palced between internet and firewell

Q96.what is PCIDSS

Q97.WHAT is Matrix code barcoding

Q98.WHAT is software Piarcy

Q99.what is DNS SINKHOLDING

Q100.WHAT do you understand by traditional criminals

Q101.WHAT is beck end access

Q102.IN WHICH year ekyc published and its detail

Q103.BYOD DEVICE q Q104.WHAT is trapdoor

Q105.what is PURPOSE OF FIREWELL

Q106. BATCH processing is an example of oltp online transition

Precessing

Q107.WHAT IS UTM

Q108. Loss of reputation is a serous adverse effect of DDOS ATTACK

Q109.THE discussion paper held on payment and settlement system of RBI held on 2013 was main focus on ENHANCED USE OF ENTERNET BANKING AND E COMMERCE Q110.what is B2G business to government E COMMERCE TRANSCTION

Q111.boss was developed by cdac

Q112.WHAT IS STAGANOGRAPHY Q113. WHAT IS ALGORITHM

Q114.WHT IS PKI Q.115 WHAT IS HONEY POT q116. WHAT IS MICROATM

Q117.DETAILS ABOUT I4C AND CERTIN Q118.SATYAM AND SIFY CASE

Q119.PUCL CASE IS AN example of sec.69 Q120.WHAT IS VBV THESE ARE

RECOLLECTED QUESTION OF PAPER ON 15 SEPTEMBER 2018

20.10.2018 cyber crime question

1.cyber crime definition

2.3 factor pressure, opportunity, rationalisation

3.cybernetics,kybernetes,steersman,governor,cyberpunk----given 4 option

4.honey pot

5.1st worm

6.denial of service

7.buffer overflow

8.shoulder surfing

9.access control

10.script kiddles

11.john doe order

12.nigrria419

13cyber warfare

14 email spoofing

15 cyber stalking

16 domain name .in represent

17.Satyam infoway ltd vs siffynet supreme court

18 cyber warfare

19 phishing

20 zeus

21.non repudiation

22 tailgating

23.trapdoor

24.captcha.

25 .blue hat hacker

26.phreaking

27. Ethical hacking

28.anonymous

29.bar code matrix code

30.RFID

31.data manipulation and data definition language

32.symmetic encryption

33.Encryption and decryption

34.lo-card exchange principle

35.C-Dac

36.payment getway

37.payment and settlements system 2007

38 acquiring bank

39 brute force attack

40.man in the middle attack

41session hijacking

42.digital wallet

43OLTP

44 Ucpdc

45.EMV card

46.netra drdo

47CBI Specialized structure

48.electonic signature

49.DSCI set up byNASSCOM

50.US Initiative -cyber security information sharing act

51.it act andit amendment act.

52.Pki

53 .authenticity

54.maximum value that can be stored in a prepaid card 50000

55. SWIFT


By pritee Hardiha

Cyber fraud management exam recollected questions on 17.11.2018

The regulator of uav,

Netra developed by,

Script kiddies,

Ethical hacking,

Blue hat hacking,

Nigeria 419,

Social engineering,

When a NRI contacted u by phone to transfer 500000 lakh rupee to another account

in another branch. what action will be taken by you as a Branch manager.

.org,.com are Tld or Sld,

Cyber crime definition,

Cyber smearing,

Masquerading attack,

Email spoofing,

In a software application at end of page we use to see "I agree with term and

conditions". what do you mean by that.

A.p case vs Tcs case,

Eucp started in which year- Approved in 2001& effective from 2002

Steps involved in online transfer processing.

Where scada is used.

Anonymous definition,

Tail gating,

Tress passing,

Harrasing a lady over mail comes under which crime,

Cyber warfare,

Definition of Durability,

Odd man out of the given below which is not an app

1.ola 2.google store.3.black berry.4.apple

Locard principle,

Malicious code writers,



By rama

Cyber crime definition

3 factors induce to commit fraud

Internet of things

Wank worm first hacktivist attack

Stuxnet

Script kiddies

Spoofing

CcTLD

Ransomware

SCADA

Vishing

Authorisation authentication difference

BYOD

authentication tech for e mail

Digital signature

Internet addiction disorder

CAPTCHA

blue hat hacker

2D bar coding known as matrix code

DML

Prevention control

Detection control

Digital footprints

Brute force attack

Payment wallets

SWIFT

prepaid cards

Shoulder surfing

PCIDSS

TCS vs state of AP case

IPC forgery of electronic records

3 domain servers of security initiative

Compulsive disorders

Stylometry

Jilani working group

FSDC

to combat computer related crimes, CBI has following specialized

structure

CBI Interpol

Cyber crime and fraud management recollected on 28.12.2019

Recollected questions:

Cyber crimes are handled by which organization in india

Type 1 crime

Preventive control

Detective control

Deterrent control

Logical control

Sections and their fine with imprisonment in years

Committes of it security ,it governance, it controls

Netra by which organisation

Fast flux

Stux net

Phising

Shoulder surfing

Digital signature

Oldest agency in india

Few questions on cert in

Passive attack

Active attack

Direct attack

In direct attack

Logic bomb

Zeus

India own operating system boss in under whom

Confidentiality

Availability

Integrity

Conventional crime

Cyber crime

Same features of conv and cyber crime

Tailgating


imp topics are

1differences between viruses and worm

2 it act

3 different types of cyber crimes

4 various types of cards

5 gate way payment

6 prevention and detection control

7 pss act

8 2 tier authentication

9 passive and active attacks

mostly questions from 2 and 3 and 4...units


Cyber terrorism

1. Who Coordinates with Interpol in India ? - CBI

2. Which department was designated as Nodal Agency for Cyber Crime prevention -

CERT-IN

3. What is the difference between Virus and Worm - Virus need human intervention

to activate or multiply whereas worm automatically get multiplied

4. Worms are mainly used by hackers to - Occupy more space in the system/heavy

usage of bandwidth in the network

5. One of the employee carefully watching the password entered by the Manager.

What type of threat it is - Shoulder Surfing

6. Leaving a Logged in Computer by an employee - is human negligence

7. Hackers scans the computer pre attack to identify - Vulnerability in the system

8. Hackers inject worms/virus into the network to reach the target system and it -

exploits the Vulnerability

9. Non updation of antivirus is - one of the major vunerability

10. One customer recieved a call in his mobile phone and the person posing himself

as a bank manager collected the card credentials from him.This type is called -

Phising

11. Online Banking sites are borne to what risk - Phising/IP spoofing

12. Data transfer between systems vide Network can be secured by - PKI

13. Customers can make sure that they deal with the authenticated website - by

checking the Lock icon near the address bar

14.In https, S denotes - Secured/Security

15.This kind of worms directly attacks the root directory - Rootkits

16. This worms are really hard to detuct and delete - Rootkits

17. The compromised systems in the network are commonly termes as - Zombies

18. Customer security credentials were compromised by way of fraudulent SMS is

called - smishing

19. The employees who try to hack their own company's site/find the vulnerabilities

are called - White hat hackers

20.DDos - Distributed Denial of Service

21.Ransomware which blocks the access to the website demanding ransom for the

same is - Denial of Service attack

22. Using same method for both encryption and decryption is called - symmetric

encryption

23. Providing Last Login detail in Internet banking site is to - to detect any

unauthorised usage earlier

24.Limits for retrying the passwords is - to avoid the unauthorised access

25. To safeguard from the Key Loggers attack - Use Virtual Key board to enter

passwords

26.UTM stands for - Unified Threat Management

27.Setting up smoke detectors in the branch is - Detective Method

28.Placing Security guard in system room to avoid - Physical damage/attack on

systems

29. Following the authorised person to enter into system room and making entry into

the room is - Tailgatting

30.Dumbster Driving is a method - Searching for vulnerability in deleted files and

data

31.FIrewall is - Intrusion Detection System

32.Authentication of electronic data/document can be assertained by - Digital

Signature

33. When two or more persons illegally tries to enter into a critical room with single

id/same id - Masquerading

34.Detection is normally - Post incedent

35. Post incident study mainly for the purpose of - study the impact of the attack and

lessons for future prevention

36. Indian Agency working on Digital Forensics and Cyber security - C-DAC

37. OLTP refers to - On line Transaction Processing

38. OLTP is also termed as - Payment Gateway

39. Payment Gateway the Acquiring Bank to - Issuing bank through the Card Scheme

to complete the transaction

40.Security Concerns arise in Payment Gateways are - At the User Level, Bank level

and Merchant POS

41. Credit Card data theft through POS is falls under - Merchant PoS Security

42.Data encrypted using Private key can be decrypted by the public key available

with - the Receiver

43. Cross verifying the Signature on the Slip against the Signature in the back side of

the ATM card is doen by - the Merchant

44.Data should be secured in the following stages - Saved, Transit and Retrival

45.Intruder software in a network which attacks the data while in trnasit and thus

commits data theft - Man in the Middle Attack

46. Captures a widows sessio for the purpose of data theft before it reaches the

recipient is - Session Hijacking

47. Limits set for retrying of password is to avoid - Brute Force attack

48. ISSP stands for - Information System Security Policy

49.ICANN stands for - International Corporation for Assigned Names and Numbers

50.TLD stands for - Top Level Domain

51.Globally recognized set of rules defined for electronic records is - e-UCP

52.Technique used to redirect traffic from the infected device is called - Sinkholding

53. The technique which can intercept unencrypted data transit of mobile apps is

called - Wi FI Snifing

54. This is one type of malware which doesnot affect the system/network - Ad-ware

55. This usually comes as a Pop up/add on screen which carries link for dubious

websites - Ad-ware

56.EMV cards follow standard of - ISO/IEC No 7816

57. EMV cards follow this standard for Contactless card - ISO/IEC 14443

58. NFC is the technique used in contactless cards - Near Field Communication

59.PCI - DSS stands for - Plastic Card Industries - Data Security Standards

60. NFC cards works under - RFID Technology

61. Providing Access controls to employess based on roles/need is - Risk based

Authentication

62. Seeking PIN to complete a transaction in PoS is - 2FA

63.SSL - Secure Socket Layering

64.SSL ensures - Encrypted link between a web server and a browser

65. Sending annoying messages to a person causing irritation/nuisance - Cyber

Stalking

66. Black mailing a person using Computer/or network is - Cyber Extortion

67. Ransomware is type of - Cyber Extortion

68. Disputes on Domain names and protest are redressed globally by - UDRP

69. Phising/Vishing is type of - Cyber Cheating

70. Group of people attacks a Computer/ group of computers for propagating a

objective - Cyber Terrorists

71. Hackers with common interest attack rival government's department site and

database are - Cyber terrorists

72. ____ refers to the quality of secrecy associated with the data and the state of

keeping an information asset secret - Confidentiality

73.____ refers to the state of remaining in the same format and not allowing for any

tampering/manipulation - Integrity

74. ____ refers to the state o confirmation that the user has the authority to issue the

command to the system - Authorisation

75. Quality of non denial, the stake holders are not permitted to denythe particular act

of doing the act is - Non-repudiation

76. CAPTCHA refers to - Completely Automated Public Turing test to Tell

Computers and Humans Apart

77. Placing letters in different sizes and styles which is hard to read by systems/robots

is called - CAPTCHA

78. _______ is an important component for study and analysis to under the modus

operandi of a Cyber Attack - Threat Vector

79. In cyber Crime, Threat landscape is denoted as - Study of entire overview of the

network which was attacked

80. Conventional Crimes are - Physical crimes that involve thet of systems and

hardware devices

81.Cyber Crimes are - System Crimes that involves data theft or tampering

82.Insider Attack Threat is - attack on the system/network by own employee without

any permission/authentication

83.______ is the most dangerous attack in cyber crimes - Insider Attack

84. An employee copied and sold the sensitive information to a competitor concern is

an example of - Insider Attack

85. Hackers scan the port/system and develop worm or codes to attack the same based

on this - Vulnerability

86. ____ does not wait for any executable file to run for getting activated in the target

system - Worm

87.____ refers to small piece of programs injected into the target system to spy on the

activities - Spyware

88. Drones are classified as - Spying Devices

89. UAV stands for - Unmanned Aerial Vehicle

90. Most of the UAV used by the polic/defence authorities for - Survelliance

purposes

91.The persons who are hired by companies to hack their own website/to identify the

Vulnerability are - Blue Hat Hackers

92. System of effectively taking care of URL filterig, web-filtering, anti-virus, as all

in one solution is referred as - Unified Threat Management

93. Force Log out option in Internet banking after certain time of Idleness is to guard

the system against - Session Hijacking

94. Installing anti virus into the system is - Preventive Method

95.A statement used to create, alter, drop objects in a database is called - Data

Definition Language

96. Fault Detection, isolation and recovery are closely associated wiht - Detection

Control

97. Installing Bio Metric devices to check unauthorised entry is - Physical Control

98. Unless properly logged, straightaway accessing the database through a SQL is

termed as - Back end Access

99.IT Act 2008 describes the activity of hacking as a criminal activity in section no

66

100. IT Act 2000 came in force on - 17 October 2000

101. IT Amendment Act came into force on - 27 October 2009

101. IT Act consists of - 13 Chapters and 90 Sections

102. The Section which deals with cyber crimes as civil offence - Section 43

103. The Section deals with cyber crimes as Criminal Offences - Section 66

104. IT Amendment Act included the following which is not in the IT Act 2000 -

Electronic Signature

105. Electronic Signature has been dealt in - Section 15

106. Under Section 43A, if any body corporate handling any sensitive personal data is

negligent in implementing and maintaining reasonable security the compensation may go upto - five crore rupees

107. Under Section 43, if one found guilty on Data theft/alters/destroys the same the

penalty/compensation may go upto - One Crore rupees

108. Tampering with Computer Source Documents - Section 65

109. Punishment under Section 65 may go upto - Three years imprisonment and

extend upto Two Lakhs Fine

110. Computer Related offences which were dealt under section 43 can also be dealt

as criminal offence under section - 66

111. Punishment under Section 66 may go upto - two three years and/or fine upto five

lakhs rupees

112. Crime of Cyber Stalking ( sending electronic messages for the purpose of

causing annoyance/inconvenience/decieve/mislead the recipient) may lead to - two

three years imprisonment

113. Identity Theft is dealt under Section - 66c

114. Punishment of Identity Theft - may extend to three years term and/or fine upto

One lakhs rupees

115. Puishment for Cyber Cheating - may extend to three years term and/or fine upto

One lakhs rupees

116. Cyber Cheating is dealt under - Section 66D

117. Punishment for Cyber Terrorism may extend upto - Life time Imprisonment

118. Cyber Terrorism is dealt under - Section 66F

119. Publishing obscene material in electronic form dealt under - Section 67

120. Punishment under Section 67 may extend upto - two three years term and/or five lakhs fine

121. Punishment for Sudsequent conviction of the same crime under section 67 is - 5

years term and/or ten lakhs rupees fine

122. Sexually explicit content in electronic form dealt under - Section 67A

123. Punishment under Section 67A is - Five years term with fine

124.Punishment for Sudsequent conviction of the same crime under section 67A is – 7 years term and/or ten lakhs rupees fine

125. CERT-IN has been designated as Nodal agency for Critical Information

Infrastructure Protection under Section - 70B

126. Mispresentation/Suppression of material Fact dealt under - Section 71

127. Penalty under Section 71 - Two years term and/or fine upto One lakh rupees

128. Breach of confidentiality and Privacy dealt under Section - 72

129. Analysing the style of writing or the langauage style for the purpose of Crime

Investigation is - Stylometry

130. RBI issues licenses for Payment Banks in India based on approval from - BPSS

131. NTRO stands for - National Technical Research Organisation

132. Netra, the light weight UAV was developed by - DRDO

133.NCIIPC stands for - National Critical Information Infrastructure Protection

Centre

134. DSCI - Data Security Council of India, established by NASSCOM

135. Digital Forensic tools used by our Police Department were developed by - CDAC

136. C-DAC stands for - Centre for Development of Advanced Computing

137. NTRO works under - Prime Minister's Office

138. Two acts which are mainly handled by ED - FEMA and PMLA

139. Money laundering using banking systems/Internet banking is – Conventional Crime

140. Obtaining an IP address similar to some other and demanding a ransom for

forego the same is - Cyber Squatting

141. Data Protection while in transit using non repudiation techniques can be

achieved through - Public Key Infrastructure

142. Card Skimming is a technique mostly used th steal the card details and it mostly

placed on - ATM manchines

143. Card Skimming Data Theft can be avoided using - Contactless Cards/NFC Cards

144. To avoid the Card Credentials in Online sites these cards were introduced -

Virtual Cards durability and consistency.

145. Smart Cards which are loaded with Money prior to issue is called - Prepaid

Cards

146. Virtual Cards normally comes with a validity of - 24 hours to 48 hours

147. Maximum loading permitted in a Prepaid as per RBI instruction is - 50000/-

148. Hackers try to capture the login credentials by analysing the keys pressed in the

Key boards. the worms captures such data is called as - Key Loggers

149. By clicking unauthenticated link, customers may diverted to fake websites to

capture the sensitive personal. This is type of - Website spoofing/IP Spoofing

150. Ad wares are used not to harm the computers but to - make a catch by making

the user to click on the dubious link to fake websites

Q4. What is firewell.

Q5 .what is wankworm and NASA.

Q6. Eucp published in which year.

Q7.OLA is not a popularapp store.

Q8.what is circumstantial evidences


26-12-2021 Vishal

Mens Rea

FastFlux

Stuxnet

Wank Worm

ISO 27001

Digital Signature issued by

ITAA Sec 43

ITAA Sec 66

ITAA Sec 70

ITAA Sec 71

Masquarding

Tailgating

Blue Hat Hacker

White Hat Hacker

Script Kiddies

DDL

DML

Schema

Wednesday, 3 November 2021

Memory recalled questions of prevention and cyber crime management on 23.10.2021

 Memory recalled questions of prevention and cyber crime management on 23.10.2021:-

1) cyber crime-Greek word kybernets

2)Threat vector, John doe order

3)Cyber terrorism- section-66F

4) Matching of compliance to their functions-2marks

5)from ATM withdrawal which type of data processing

6) Different type of National institution

7)FASTFLUX,IP SPOOFING

8)CASE STUDIES OF SMC PNEUMATICA Vs Jogesh kwatra 

9)Masquerading, Tailgating

10)Common types of card fraud

11)DOS,DDOS

12) DETECTION CONTROL

13)Man in the middle attack

14)script kiddies

15)Men's Rea

16)White hat hackers

17)ISSA

18)Database control case study

19) Imprisonment for punishment by cheating

20)SCADA,DSCI,CISA 

Etc..and many more.

Monday, 10 August 2020

Cyber crime recollected questions on 09th aug 2020

 Cyber crime and fraud management recollected questions today


Cyber stalking 

IT amendment act

Types of control 

Cyber crime origin 

Punishment for cyber crime 

Cyber squatting 

CIA

CBI function 

Honeypot 

Payment system 

Information security 

ISO 27001

NTRO

Rootkit

Trojan horse 

Info steal 

Cyber terrorism 

Hacking 

Hacking defined under IT or ITA

Computer Fraud 

Vishing 

IPC

DoS

Cyber Extortion 

Fire Alarm and CCTV, which type of control 

Malware 

Hactivist 

White hat hackers

Digital signature 

Electronic signature 

Integrity 

Durability 

Cyber forensic

RBI as regulatory

Sniffer

PKI

Encryption-decryption

Motive of hacker

OLTP

Payment Gateway 



Very few questions from module D.

Tuesday, 21 July 2020

Cyber crime and fraud prevention recollected questions July 2020

Qs are from almost all chapters for module A some are 
Like
Which of the options are correct for fraud triangle

Cyber word origin from 

APT (Advanced persistent threat)
Spammers 
Script kiddies 
Phishing vishing
Cyber stalking
Threat vector
Threat landscape
John doe order
Dos ddos attack
Fast flux 
Ip spoofing
Cyber squatting
Term key logger other similar term is form grabber
Cryptography encryption decryption
ICANN (PAGE 27 GOOD READ)
INDRP 
cyber extortion ransomware
Zeus trojan
One qs like which is not malware 
SCADA full form
Three stakeholder of Information
Pillars of Information security(read in detail)
Non repudiation
Authorisation and authentication
2FA -ATM Transaction
Difference between digital and electronic signature
Tailgating
Masquerading
UTM 
BOTS botnet zombies 
Man in middle attack
Trojan
Adware
Types of malwareModule B
cyber crime and fraud difference relationship
Types of controls
2D bar coding
RFID
Software security controls
Case study qs based on front end validation 

Database schema based qs
DDL DML
Intrusion prevention
Detection control
Mens rea 
White collar offense
Page91 stages
93 all frauds are incidents but all incidents need not be frauds 
Reporting Investigation
NTP
PAGE 96 ITIL important phases in detail
Digital evidence vs physical evidence
Evidence collection
Locard exchange principle
SIM IMSI
CDAC
Object of cyber evidence
Cyber forensic 
Wearable technology
Chain of custody
DigitalForensic lab in Hyderabad

Spyware
UAV 
PAGE 53 most used passwords
Firewall
Types of hackers read in detail 
Backend access
Hacker tools
Ethical attack Ethical hacking
Anonymous
69 page q9
Suggest to read each chapter qs and answer also

Module C
OLTP
PAGE111 Which of following not online transaction technology they will give some different term 
BPSS
PSS act
Page113 115 116117
119 I agree
UCP Letter of credit
TLD
Payment wallet
IP spoofing
Payment system page 128
PSDG
BUDAPEST CONVENTION
sinkholing
Federal reserve 
SWIFT

Module D
Page 157
ISMS
CERT
Page 162 Anwar vs pk basheer
Skimmer 
NCRB
IT related legislation in india page164
Page 166 authentication of records
NTRO comes under PMO
Qs on page 167 need to read

Page171
Vodafone case and page 173
Advance fee
3D
ecommerce
Tax haven
HUMAN TRAIT (Sigmun Freud)is result of childhood 
Computer Addiction
Page185 186
information silo
Stylometry
Qs on page 191
196 Deity
RBI BFS 
Page 198 G GopalaKrishna qs can be like which are it cover from multiple options most probably a choice given so Answer should be all
NABARD
IDRBT INFINET
NET NEUTRALITY
204 205 
Chief compliance officer
Different National level institutions
NTRO
 NIA
DSCI
CERT
Page 216 cert instructions on blocking of urls
CBI
IB is world oldest 
directorate of enforcement includes fema and PMLA
US initiative is CISA
CDAC own operating system BOSS

prepaid card limit 50000
Page 139 140 141
carders
Cloning and Skimming
NFC
PCI- DSS
Rupay card
Investigation scene of crime
G gopalakrishna
EMV(EURO PAY MASTER VISA)



Sunday, 22 March 2020

New All IIBF Certifications PDFs in single link 2020-2021

All IIBF Certification PDFs in single link 2020-2021

Read corresponding  IIBF books .. Macmillan / Taxmann.

These all materials are extra information to get knowledge.

All the best


Face book:

https://www.facebook.com/groups/543054539662893/

Certified credit officer/Professionals 2020

https://drive.google.com/file/d/1lUW00Y-qnVzH9R9QB4ZjGqeShYDATS-e/view?usp=sharing

CAIIB ABM 2020

https://drive.google.com/file/d/10AkzgCtLyYexdKulaYY3B1ljHRJPGuLu/view?usp=sharing


MSME 2020

https://drive.google.com/file/d/1m1qF2hh9D0hpVvFTlNCR2rvpYAiEQTD8/view?usp=sharing


KYC AML:2020

https://drive.google.com/file/d/1T__7x42LV1HaG9YBQuMkAIPvS9GAHeL8/view?usp=sharing


BCSBI:2020

https://drive.google.com/file/d/1lSOKtV5OrThXmCwiB4TGVyOjZVVtjThd/view?usp=sharing


CAIIB IT:2020

https://drive.google.com/file/d/1t7Ein_FE5YMruvDQPOG4Z3Z-TE-Xmp_1/view?usp=sharing


Certified Treasury Professionals:2020
https://drive.google.com/file/d/1lVvYYtYC797vn1DKuSAsCxJhkv3E1JxK/view?usp=sharing


Digital banking 2020
https://drive.google.com/file/d/1lckjesn0gs0kiOZID1aBubb4tiHvbzPE/view?usp=sharing


Forex Individual 2020

https://drive.google.com/file/d/1lf3o8SRqy2_aRJulq9qf2q0krHmFlKok/view?usp=sharing


Forex Operations 2020
https://drive.google.com/file/d/1lnPrVdXPVsc3sve8OwsjE87OEgsxsAVb/view?usp=sharing



Cyber Crime and fraud management 2020

https://drive.google.com/file/d/1m2y5bwuUa1vKkBjx5DjwH17dNf8BP-xu/view?usp=sharing


Information System for Bankers 2020
https://drive.google.com/file/d/1lt0r7cRzJHTmBXsmF9xvEYFzaaxHCxTI/view?usp=sharing


International Trade Finance  2020
https://drive.google.com/file/d/1lxS3FGgdzI5Q-rJFPufnVUSA69TpVjT3/view?usp=sharing


IT SECURITY 2020
https://drive.google.com/file/d/1ly9nfxTpucTPKB6kuV-mIod4pTc97ceg/view?usp=sharing


Micro finance 2020

https://drive.google.com/file/d/1lzMSuWctOJUrKnNP_FfRlQL9ngs1U6aS/view?usp=sharing

Risk In financial services 2020
https://drive.google.com/file/d/1m7eITlMDdKTnc1FU1sSIKJtP8IcrZrG1/view?usp=sharing


Certified Audit  Professionals:
https://drive.google.com/file/d/1m8aQcdD4qr7R4QzUEgiN1Paw_rWhKWsm/view?usp=sharing

https://drive.google.com/file/d/1zoloZKNR2-UsBGIf0gw1ErhD0F2Y9mHW/view?usp=sharing



Telegram:

https://t.me/joinchat/KP68xFdZGztM7iDAuS4ueg














Wednesday, 1 January 2020

Cyber crime and fraud management recollected on 28.12.2019


Cyber crime and fraud management recollected on 28.12.2019


Recollected questions:
Cyber crimes are handled by which orgnanisation in india
Type 1 crime
Preventive control
Detective control
Detterant control
Logical control
Sections and their fine with imprisonment in years
Committes of it security ,it governance, it controls
Netra by which organisation
Fast flux
Stux net
Phising
Shoulder surfing
Digital signature
Oldest agency in india
Few questions on cert in
Passive attack
Active attack
Direct attack
In direct attack
Logic bomb
Zeus
India own operating system boss in under whom
Confidentiality
Availability
Integrity
Conventional crime
Cyber crime
Same features of conv and cyber crime
Tailgating
imp topics are  1differences between viruses and worm
2 it act
3 different types of cyber crimes
4 various types of cards
5 gate way payment
6 prevention and detection control
7 pss act
8 2 tier authentication
9 passive and active attacks
mostly questions from 2  and 3 and 4...units

 Cyber terrorism
1. Who Coordinates with Interpol in India ? - CBI
2. Which department was designated as Nodal Agency for Cyber Crime prevention - CERT-IN
3. What is the difference between Virus and Worm - Virus need human intervention to activate or multiply whereas worm automatically get multiplied
4. Worms are mainly used by hackers to - Occupy more space in the system/heavy usage of bandwidth in the network
5. One of the employee carefully watching the password entered by the Manager. What type of threat it is - Shoulder Surfing
6. Leaving a Logged in Computer by an employee - is human negligence
7. Hackers scans the computer pre attack to identify - Vulnerability in the system
8. Hackers inject worms/virus into the network to reach the target system and it - exploits the Vulnerability
9. Non updation of antivirus is - one of the major vunerability
10. One customer recieved a call in his mobile phone and the person posing himself as a bank manager collected the card credentials from him.This type is called - Phising
11. Online Banking sites are borne to what risk - Phising/IP spoofing
12. Data transfer between systems vide Network can be secured by - PKI
13. Customers can make sure that they deal with the authenticated website - by checking the Lock icon near the address bar
14.In https, S denotes - Secured/Security
15.This kind of worms directly attacks the root directory - Rootkits
16. This worms are really hard to detuct and delete - Rootkits
17. The compromised systems in the network are commonly termes as - Zombies
18. Customer security credentials were compromised by way of fraudulent SMS is called - smishing
19. The employees who try to hack their own company's site/find the vulnerabilities are called - White hat hackers
20.DDos - Distributed Denial of Service
21.Ransomware which blocks the access to the website demanding ransom for the same is - Denial of Service attack
22. Using same method for both encryption and decryption is called - symmetric encryption
23. Providing Last Login detail in Internet banking site is to - to detect any unauthorised usage earlier
24.Limits for retrying the passwords is - to avoid the unauthorised access
25. To safeguard from the Key Loggers attack - Use Virtual Key board to enter passwords
26.UTM stands for - Unified Threat Management
27.Setting up smoke detectors in the branch is - Detective Method
28.Placing Security guard in system room to avoid - Physical damage/attack on systems
29. Following the authorised person to enter into system room and making entry into the room is - Tailgatting
30.Dumbster Driving is a method - Searching for vulnerability in deleted files and data
31.FIrewall is - Intrusion Detection System
32.Authentication of electronic data/document can be assertained by - Digital Signature
33. When two or more persons illegally tries to enter into a critical room with single id/same id - Masquerading
34.Detection is normally - Post incedent
35. Post incident study mainly for the purpose of - study the impact of the attack and lessons for future prevention
36. Indian Agency working on Digital Forensics and Cyber security - C-DAC
37. OLTP refers to - On line Transaction Processing
38. OLTP is also termed as - Payment Gateway
39. Payment Gateway the Acquiring Bank to - Issuing bank through the Card Scheme to complete the transaction
40.Security Concerns arise in Payment Gateways are - At the User Level, Bank level and Merchant POS
41. Credit Card data theft through POS is falls under - Merchant PoS Security
42.Data encrypted using Private key can be decrypted by the public key available with - the Receiver
43. Cross verifying the Signature on the Slip against the Signature in the back side of the ATM card is doen by - the Merchant
44.Data should be secured in the following stages - Saved, Transit and Retrival
45.Intruder software in a network which attacks the data while in trnasit and thus commits data theft - Man in the Middle Attack
46. Captures a widows sessio for the purpose of data theft before it reaches the recipient is - Session Hijacking
47. Limits set for retrying of password is to avoid - Brute Force attack
48. ISSP stands for - Information System Security Policy
49.ICANN stands for - International Corporation for Assigned Names and Numbers
50.TLD stands for - Top Level Domain
51.Globally recognized set of rules defined for electronic records is - e-UCP
52.Technique used to redirect traffic from the infected device is called - Sinkholding
53. The technique which can intercept unencrypted data transit of mobile apps is called - Wi FI Snifing
54. This is one type of malware which doesnot affect the system/network - Ad-ware
55. This usually comes as a Pop up/add on screen which carries link for dubious websites - Ad-ware
56.EMV cards follow standard of - ISO/IEC No 7816
57. EMV cards follow this standard for Contactless card - ISO/IEC 14443
58. NFC is the technique used in contactless cards - Near Field Communication
59.PCI - DSS stands for - Plastic Card Industries - Data Security Standards
60. NFC cards works under - RFID Technology
61. Providing Access controls to employess based on roles/need is - Risk based Authentication
62. Seeking PIN to complete a transaction in PoS is - 2FA
63.SSL - Secure Socket Layering
64.SSL ensures - Encrypted link between a web server and a browser
65. Sending annoying messages to a person causing irritation/nuisance - Cyber Stalking
66. Black mailing a person using Computer/or network is - Cyber Extortion
67. Ransomware is type of - Cyber Extortion
68. Disputes on Domain names and protest are redressed globally by - UDRP
69. Phising/Vishing is type of - Cyber Cheating
70. Group of people attacks a Computer/ group of computers for propagating a objective - Cyber Terrorists
71. Hackers with common interest attack rival government's department site and database are - Cyber terrorists
72. ____ refers to the quality of secrecy associated with the data and the state of keeping an information asset secret - Confidentiality
73.____ refers to the state of remaining in the same format and not allowing for any tampering/manipulation - Integrity
74. ____ refers to the state o confirmation that the user has the authority to issue the command to the system - Authorisation
75. Quality of non denial, the stake holders are not permitted to denythe particular act of doing the act is - Non-repudiation
76. CAPTCHA refers to - Completely Automated Public Turing test to Tell Computers and Humans Apart
77. Placing letters in different sizes and styles which is hard to read by systems/robots is called - CAPTCHA
78. _______ is an important component for study and analysis to under the modus operandi of a Cyber Attack - Threat Vector
79. In cyber Crime, Threat landscape is denoted as - Study of entire overview of the network which was attacked
80. Conventional Crimes are - Physical crimes that involve thet of systems and hardware devices
81.Cyber Crimes are - System Crimes that involves data theft or tampering
82.Insider Attack Threat is - attack on the system/network by own employee without any permission/authentication
83.______ is the most dangerous attack in cyber crimes - Insider Attack
84. An employee copied and sold the sensitive information to a competitor concern is an example of - Insider Attack
85. Hackers scan the port/system and develop worm or codes to attack the same based on this - Vulnerability
86. ____ doesnot wait for any executable file to run for getting activated in the target system - Worm
87.____ refers to small piece of programs injected into the target system to spy on the activities - Spyware
88. Drones are classified as - Spying Devices
89. UAV stands for - Unmanned Aerial Vehicle
90. Most of the UAV used by the polic/defence authorities for - Survelliance purposes
91.The persons who are hired by companies to hack their own website/to identify the Vulnerability are - Blue Hat Hackers
92. System of effectively taking care of URL filterig, web-filtering, anti-virus, as all in one solution is referred as - Unified Threat Management
93. Force Log out option in Internet banking after certain time of Idleness is to guard the system against - Session Hijacking
94. Installing anti virus into the system is - Preventive Method
95.A statement used to create, alter, drop objects in a database is called - Data Definition Language
96. Fault Detection, isolation nad recovery are closely associated wiht - Detection Control
97. Installing Bio Metric devices to check unauthorised entry is - Physical Control
98. Unless properly logged, straightaway accessing the database through a SQL is termed as - Back end Access
99.IT Act 2008 describes the activity of hacking as a criminal activity in section no 66
100. IT Act 2000 came in force on - 17 October 2000
101. IT Amendment Act came into force on - 27 October 2009
101. IT Act consists of - 13 Chapters and 90 Sections
102. The Section which deals with cyber crimes as civil offence - Section 43
103. The Section deals with cyber crimes as Criminal Offences - Section 66
104. IT Amendment Act included the following which is not in the IT Act 2000 - Electronic Signature
105. Electronic Signature has been dealt in - Section 15
106. Under Section 43A, if any body corporate handling any sensitive personal data is negligent in implementing and maintaining reasonable security the compensation may go upto - five crore rupees
107. Under Section 43, if one found guilty on Data theft/alters/destroys the same the penalty/compensation may go upto - One Crore rupees
108. Tampering with Computer Source Documents - Section 65
109. Punishment under Section 65 may go upto - Three years imprisonment and extend upto Two Lakhs Fine
110. Computer Related offences which were dealt under section 43 can also be dealt as criminal offence under section - 66
111. Punishment under Section 66 may go upto - two three years and/or fine upto five lakhs rupees
112. Crime of Cyber Stalking ( sending electronic messages for the purpose of causing annoyance/inconvenience/decieve/mislead the recipient) may lead to - two three years imprisonment
113. Identity Theft is dealt under Section - 66c
114. Punishment of Identity Theft - may extend to three years term and/or fine upto One lakhs rupees
115. Puishment for Cyber Cheating - may extend to three years term and/or fine upto One lakhs rupees
116. Cyber Cheating is dealt under - Section 66D
117. Punishment for Cyber Terrorism may extend upto - Life time Imprisonment
118. Cyber Terrorism is dealt under - Section 66F
119. Publishing obscene material in electronic form dealt under - Section 67
120. Punishment under Section 67 may extend upto - two three years term and/or five lakhs fine
121. Punishment for Sudsequent conviction of the same crime under section 67 is - 5 years term and/or ten lakhs rupees fine
122. Sexually explicit content in electronic form dealt under - Section 67A
123. Punishment under Section 67A is - Five years term with fine
124.Punishment for Sudsequent conviction of the same crime under section 67A is - 7 years term and/or ten lakhs rupees fine
125. CERT-IN has been designated as Nodal agency for Critical Information Infrastructure Protection under Section - 70B
126. Mispresentation/Suppression of material Fact dealt under - Section 71
127. Penalty under Section 71 - Two years term and/or fine upto One lakh rupees
128. Breach of confidentiality and Privacy dealt under Section - 72
129. Analysing the style of writing or the langauage style for the purpose of Crime Investigation is - Stylometry
130. RBI issues licenses for Payment Banks in India based on approval from - BPSS
131. NTRO stands for - National Technical Research Organisation
132. Netra, the light weight UAV was developed by - DRDO
133.NCIIPC stands for - National Critical Information Infrastructure Protection Centre
134. DSCI - Data Security Council of India
135. Digital Forensic tools used by our Police Department were developed by - C-DAC
136. C-DAC stands for - Centre for Development of ADvanced Computig
137. NTRO works under - Prime Minister's Office
138. Two acts which are mainly handled by ED - FEMA and PMLA
139. Money laundering using banking systems/Internet banking is - Conventional Crime
140. Obtaining an IP address similar to some other and demanding a ransom for forego the same is - Cyber Squatting
141. Data Protection while in transit using non repudiation techniques can be achieved through - Public Key Infrastructure
142. Card Skimming is a technique mostly used th steal the card details and it mostly placed on - ATM manchines
143. Card Skimming Data Theft can be avoided using - Contactless Cards/NFC Cards
144. To avoid the Card Credentials in Online sites these cards were introduced - Virtual Cards
145. Smart Cards which are loaded with Money prior to issue is called - Prepaid Cards
146. Virtual Cards normally comes with a validity of - 24 hours to 48 hours
147. Maximum loading permitted in a Prepaid as per RBI instruction is - 50000/-
148. Hackers try to capture the login credentials by analysing the keys pressed in the Key boards. the worms captures such data is called as - Key Loggers
149. By clicking unauthenticated link, customers may diverted to fake websites to capture the sensitive personal. This is type of - Website spoofing/IP Spoofing
150. Ad wares are used not to harm the computers but to - make a catch by making the user to click on the dubious link to fake websites

Monday, 26 August 2019

Prevention Cyber crime and fraud yesterday recollected questions

Prevention of cyber crime and fraud management" - 25.08.2019 Recollected Questions
Crime Defined in IPC 1860
Threat vector
John Doe order
IT Amendment Act 2008 section 66 F cyber terrorism
Cyber stalking
IT act section 66 D cyber cheating
Stuxnet
Phising
Digital signature
Tailgating
Masquerading
Shoulder surfing
Dumpster diving
Man in the middle attack
Rootkit
Script kiddie
Blue hat hackers
Phreaking
Cyber risk insurance
Symmetric encryption
Digital footprints
Locard's exchange principle - taking and leaving
IMEI
Internet of things
BPSS
Brute Force attack
Rupay card
PCI DSS
3D Secure
Stylometry
Disgruntled employees
Salami attack
Net neutrality
CERT in
I4C
Boss Linux
Steganography

Sunday, 28 April 2019

All IIBF Certifications PDFs in single link Updated on April 2019

All IIBF Certifications PDFs in single link

Read corresponding  IIBF book 1st Macmillan / Taxmann.

These all materials are extra information to get knowledge.

All the best

Certified credit officer/Professionals
https://drive.google.com/file/d/1UuxDdXjdmPYiMa05SPgXQe1ZjuQ4e8bh/view?usp=sharing

MSME
https://drive.google.com/file/d/10zBkmliUC7170ZzgceaslAHeGXQd1-vF/view?usp=sharing

KYC AML:
https://drive.google.com/file/d/10mB6kpvV3CZ7UhUvXKnbFs2z_KUJu2IT/view?usp=sharing

BCSBI
https://drive.google.com/file/d/1Bdlk9P7in93ua_xusXgtwj0-USU3ALRV/view?usp=sharing

CAIIB ABM
https://drive.google.com/file/d/1NXM9K5pNJps-euhZR0TbV6Zz87zFK8gA/view?usp=sharing

CAIIB IT
https://drive.google.com/file/d/1Pj5vev_yk78BvAM6PTr-2wiRRXUDeiXH/view?usp=sharing

Certified Treasury Professionals:
https://drive.google.com/file/d/1Ojzmwijq9oqLoWWba0uWhzMzZwYdlYws/view?usp=sharing

Digital banking
https://drive.google.com/file/d/1EYj0XBI3-7_P9zq24WgPSFNkU6uJsEDz/view?usp=sharing

Forex Individual
https://drive.google.com/file/d/1jiyi1IiOI1W0r9u1aIFw0RH1U3jAOxNE/view?usp=sharing

Forex Operations
https://drive.google.com/file/d/1-ToWV33bJ4mKv20nNkQoLNw7z8bHwpuU/view?usp=sharing

Cyber Crime and fraud management
https://drive.google.com/file/d/16pwzqhxEBDYGq1SgUlXExhYXmWzCujmm/view?usp=sharing

Information System for Bankers
https://drive.google.com/file/d/1Xs8ywGhueRM4RToIRehfB5Od3YC0m7yM/view?usp=sharing

International Trade Finance
https://drive.google.com/file/d/11yfB3mpE51VPViNvOGcbDVIA3_i8r4wq/view?usp=sharing

IT SECURITY
https://drive.google.com/file/d/1plGml38MO1MBebPdTpC5pGEvh7rdqDfe/view?usp=sharing

Microfinace
https://drive.google.com/file/d/1mo-Pz-zoylEUKG21eKhRFJMcrbwv3RNb/view?usp=sharing

Risk In financial services
https://drive.google.com/file/d/1TdRYKQ34PGLtcnmnF83brpVHp2kEHUT9/view?usp=sharing

Certified Audit  Professionals:

https://drive.google.com/file/d/1gzaqFOz97-yNdL-COsYUkka0MTTaB9xF/view?usp=sharing








Tuesday, 23 October 2018

Cyber fraud management exam recollected on 20.10.2018

20.10.2018 cyber crime question
1.cyber crime definition
2.3 factor pressure,opportunity,rationalisation
3.cybernetics,kybernetes,steersman,governor,cyberpunk----given 4 option
4.honey pot
5.1st worm
6.denial of service
7.buffer overflow
8.shoulder surfing
9.access control
10.script kiddles
11.john doe order
12.nigrria419
13cyber wefare
14 email spoofing
15 cyber stalking
16domain name .in represent
17.Satyam infoway ltd vs siffynet supreme court
18cyber warfare
19phishing
20zeus
21.non repudiation
22 tailgating

23.trapdoor
24.captcha.

25 .blue hat hacker
26phreaking
27. Ethical hacking
28.anonymous
29bar code matrix code
30.RFID
31.data manipulation and data definition language
32.symmetic encryption
33. Encryption and decryption
34.locard exchange principle
35.c-Dac
36.payment getway
37.payment and settlements system 2007
38 acquiring bank
39 brute force attack
40.man in the middle attack
41session hijacking
42.digital wallet
43OLTP
44 Ucpdc
45.EMV card
46.netra drdo
47CBI Specialized structure
48.electonic signature
49.DSCI set ip NASSCOM
50.US Initiative -cyber security information sharing act
51.it act andit amendment act.
52.Pki
53 .authenticity
54.maximum value that can be stored in a prepaid card 50000
55. SWIFT


By pritee Hardiha

Monday, 8 October 2018

Cyber fraud management exam Recollected questions on 06.10.2018

Recollected questions cyber crime 06102018
1. Word associated with cybercrime
2.NETRA IS DEVELOPED BY
3.guidelines for use of UAV are issued by
4.which of the following is not industrial body
Ficci,Nasscom,DSCI
5.CISA act of USA pass for
6.CbI branches,Ccrdu,CCIC,CFL
7..org.,.com are top level domain
8.cyber crime defined in Indian contract act.
9.Definition of data manipulation language
10.steps in online payment
11.masquereading definition
12.boss developed by cdac
13. Cyber smearing means
14. Meaning of accept term & condition
15In case of Andhra Pradesh &TCS fraud computer &computer terminal
16. Data backup is which type of control. 17. Which is better option if we received email from unknown person
18.concept of rupay card year
19. If you are branch manager and received email from nri customer to transfer amount of rs.10k from his acct what will I do
Four option given1 make transaction 2 ask him to send application by post for transaction 3 ask him to send proof of address verified by Foreign authorities
20. Arrange sequence for steps involved in online transaction
21. State It adjuator..
22.e kyc 2015- digital signature by Aadhar authorities and e consent of subscriber
23.firewall used for
24. Blue hat hacker definition
25. What is mean by ethical hacker
26.defination of annonomus
27.scripkiddie definition
28.scada used in
29.what is smart card.
30.micro ATM
31.online batch processing (oltp).edi ,eft, STP

32.pki advantages

Saturday, 6 October 2018

IT related bits

1) If a computer is bind to store confidential or sensitive information in order to ensure that can not be accessed, which of the
following shall be made use of a) close circuit TV b) encryption c) buried line censors
d) locking and guarding e) None of the above
2) A computer can not boot if it does not have the :
a)compiler b) loader c) operating system d) assembler e) None of the above
3) Transfer of fund by computers without banks intervention can be done by
a) fax b) telephone c) camera d) IMB e) None of the above
4) The device that connect different types of networks is called :
a) b) hub c) bridge d) router e) None of the above
5) The processing machine that process the cheques of high speed in the clearing house is called
a) processor b) router cum shorter c) encoder d) all the above e) None of the above
6) The signature of the customer can be captured by
a) keyboard b) mouse c) scanner d) all of the above e) None of the above
7) The basic unit of a mark sheet into which you enter data in enclosed sheet is called
a) tab b) cell c) box d) range e) None of the above
8) Batch reports area : a) adhoc report b) EOD/BOD report c) available under business objective
d) generated by FRS data base e) None
9) First page of website in terminal : a) home page b) index c) java script d) bookmark e) None of the above

11) sending an e mail is equal to
a)picturing an event b) narrating a story c) writing a letter d) creating a drawing e) None of the above
12) The term VPN stands for
a)virtual private network b) vocational planning network c) voice program network d) voluntary program network e) None of the above
13) To move the cursor to the end of the document line
a)ctrl+end b) alt+ctrl+end c) page down d) ctrl+alt e) none of the above
14) The resolution of the computer screen is determine by which of the following
a)colour b) memory c) pixcels d) processing speed e) none of the above
15) Which of the following refer to a small single line network
a)LAN b) DSL c) RAM d) USB e) None of the above
16) The fraud and other type of crimes that happen on the internet network are called
a)internet fraud b) internet crimes c) cyber crimes d) electronic fraud e) None of the above
17) Which of the following term describe computer program better
a)hardware instruction b) input devices c) output devices d) central processing unit e) None of the above
18) Which of the following activities are carried through electronic means it is called
a)e-banking b) e-business in banking c) internet banking d) all the above e) None of these
19) A small line which flashes on the computer screen
a)cursor b) mouse c) cell d) all the above e) None of the above
20) computer use the ------number system to store the data and perform calculations
a)binary b) octal c) decimal d) hexadecimal e) None of the above
21) IFSC code is
a)11 digit alpha numeric code b) 10 digit alpha numeric c) 1 digit numeric d) 11 digit alpha code e) None
22) cannet is an example of
a)internet b) intranet c) both d) internal software e) None of the above
23) Which of the following makes use of the artificial intelligence
a) user of the computer b) computer c) operating system d) application systen e) the above all of
24) The name of UPI app in our bank is called
a)canmobile b) canara swipe c) e- infobook d) empower e) None of the above
25) The computer that co ordinate all computer activities into a network is known as
a)sever b) UPS c) modulator d) LAN e) None of the above
26) Which of the following is not a storage device
a)tape drive b) floppy disc drive c) hard disc drive d) printer driver e) None of the above
27) Servers of computers that provides resources to other computers connected to a
a)network b) mainframe c) supercomputer d) client e) None of the above
28) ASBA means - a)application supported by block account b) application supported by block amount c) application supported by
block arrangement d) application supported by block demat a/c e) None of the above
29) Collecting personal information and effectively bring another individual is known as the crime of
a)spooling b) identify theft c) spoofing d) hacking e) None of the above
30) Saving bank a/c is transferred from one cbs branch to another cbs branch. The a/c no is
a)does not change b) changes c) can not transferred a/c in cbs d) new branch dp code is added e) None
31) In page preview mode :
a)you can see all pages of document b) you can see the page you are currently working c) you can see only that page do not contain
document d) you can only see the title page of your document e) None of the above
32) Ram stands for -
a)random access memory b) ready application module c) read access memory d) remote access memory e) None
33) Printing device that create an image directly on paper by spraying ink and has substances recurring cost is known as - a) plotter b)
desk jet printer c) inkjet printer d) dot matrix printer e) None of the above
34) --------is data that has been organized or presented in meaningful fashion
a)process b)software c)storage d)information e) None of the above
35) The term cyber law stands for which of the following
a)the law governing cyber cafe establishment only b) the low governing computer activity c) the law relating to various information
technology d) any of the above e) None of the above
36. Which of the following package was first introduced in our bank - a) ibbs b)banks 2000 c)alpm d) cbs d) none
37) which of the following services are available in the atms
a) balance enquiry b)mobile top-up c)opening of term deposit a/c d)a & b e) a to c
38) which of the following can be used to select the entire document
a)cntrl +a b) alt+s c)shift+a d)cntrl+k e)cntrl+h
39) coded entities which are used to access to a computer system are called
a)entry code b)password c)security commands d)code words e)none of these
40) ________ is the appearance of typed characters - a)size b)format c)point d)colour e)none of these
41) idealing a customer must have one_______across the bank
a)account id b)customer id c) cbs id d)place id e) all of above
42) the term led stands for
a) light electronic device b) light electrical device c) light emitting device d)local electronic device e)none of above
43) junk email is also called - a)spam b)spoof c)sniffer script d) spool e) none of these
44) modem is connected to -a) a telephone line b) a keyboard c) a printer d) mouse e0 scaner
45) date and time are available on the desktop at - a) keyboard b) recycle bin c) my computer d) task bar e) none
46) information technology has resulted in - a) improved efficiency b) innovative products c)effective delivery system d) enhanced
productivity e)all of the above
47)the signature of customer can be captured by - a) keyboard b)scanner c) mouse d)all of the above e) none
48) to insert a word into the middle of a sentence
a) move the curser to the desired location in the sentence and type the new word
b) move the curser to the desired location in the sentence press enter key and type the new word
c) move the curse to the beginning of the sentence and start typing
d) retype the whole sentence e)none of these
49) whenever networks are not possible ,our bank has gone for satellite connections otherwise called as
a) winsat b) vsat c) sat d) vat e) tat
50) Unwanted repetitions massages, such as unsolicited bulk email is called as
A) spam b) trash c) Calibri d) courier e) none of these
ANSWER
1 B 2 C 3 D 4 D 5 E 6 C 7 B 8 B 9 A
11 C 12 A 13 A 14 C 15 A 16 C 17 D 18 D 19 A 20 A
21 A 22 B 23 E 24 A 25 D 26 D 27 A 28 A 29 D 30 A
31 A 32 A 33 A 34 D 35 C 36 C 37 D 38 B 39 B 40 B
41 B 42 C 43 A 44 A 45 D 46 E 47 B 48 B 49 B 50 A

Saturday, 15 September 2018

Today cyber crime recollected questions 15.09.2018

CYBER CRIME QUESTIONS OF 15 SEPTEMBER PAPER...
Shared by Praveen  Kachhwaha

 Q1.what is honey pot. Q2. What are steps involved in a Ecommerce transactions. Q3. Difference between durability and consistency. Q4. What is firewell. Q5 .what is wankworm and NASA. Q6. Eucp published in which year. Q7.OLA is not a popular app store. Q8.what is circumstantial evidences. Q9.BOSS (Bharat operating system solution was developed by which organizations -CDAC Q10.what is malicious code writer's. Q11.What is multylayered security Q12. What is data. Q13.blackmailing is an example of cyber extortion. Q14 what is SCADA. Q15.what is cryptolocker Q16.smart card in metrorailway stations are examples Q17.packet filter firewall. Q18.micro ATM. Q19.cross site Scripting. Q20. What is A hectivist...
 Q21 . Rupay card is issued in which year. Q22 what is Trojan hourse. Q23. What is malware. Q.24.data backup is an example of which type of control. Q25.what is Lebance loop modulas oprendi in atm card frauds. Q26.CCTV is an example of which control. Q27.what is Cyber Smearing. Q28.what is operating system vulnerability Q29.what is full form of CISA cyber security information sharing Act. Q30 what is zeus viruses. Q31.what is hashh value and integrity. Q32.w difference between Authirization and Authentication. Q33. What is INFO stealer. Q34.e.what is A beck End Access. Q35.what is meaning of phrase of "Ab initio Unlawfully or Unlegally. Q36.what is security Administration and Quality Assurance. Q37.what is CAPTCHA. Q38.Intentionally misrepresentation of Data is called A Fraud. Q39. What is definition of Control. Q40.What is A John Deo Order. ...

Q41.what is payment walked and digital wallet Q42 what is Anonymous. Q43. What is trapdoor access. AQ44..Total branch automation TMA. Q45. .com and .org are TLD. Q46. TCS fraud in Andhra Pradesh is an example of reasonable security practises and procedures. Q47. The PVCL case in India refers to which Act of IT act Act_69 power to moniter,intercept or Block URL. Q48.one question on CBS and TBA total branch Automations. Q49. Sysadmin sysuser or teller all are examples of Spoofing. Q50.what is A network Analysis. Q51.what is vulnerability Q52.what is DNS sinkholding. Q53.e.Contactless smart card are example of which. Q54 .Lebance Loop card fraud rubber band type material inside Atm Fraud. Q55.what is Contigency pkanning. Q56.what is Nigrean 419 Fraud. Q57.Dumpster Diving. Q58.what is diffrence between Steersman and script kiddle , Q59.Staganography. Q60. What is SSL injections and Cross Site Scripting......
Q61. Preventive detective and compensating contol. Q62. DRONES ARE developed by Drdo. Q63.income tax. Q64.Director of DRDO and it's powers. Q65 .difference between Cert india and nasscom. Q66.TSP/IP. Q67.DDos Attack. Q68. Cyber Smearing and Cyber Defamation. Q69. Cyberwarfare and Cyber terrorism. Q70.BECKDOOR access. Q71.digital signature. Q72.symmetric and Asymmetric encrption. Q73.public and private keys. Q74.command Injections and SQL injections. Q75.details of Masquerding Attack. A76. Trapdoor access and BYOT device. Q77.Sec.43 and Sec 46 of IT act..... Q78.Sec. 69 B deals with...... Q79.Blue Hat hackers are a Part of testing team. Q80.what is crypyolocker and INFO Stealer
Q81.WHAT IS zeus virus Q82.What do you understand by Mean rea or destructive Mindset. Q83.what is DDL DATA definition language Q84.what is pecket filteration firewall Q85.what do you understand by the word ANONMOUS Q85.what is computer vandalism Q86.WHAT IS FRONT END validation control q87.what is DATA Q88.WHAT IS Locard Exchange PRINCIPLE Q89.WHAT is penalty under SECTION 46 AND 47 of IT AMENDMENT ACT Q90.What is xss cross site scripting Q91.what is TCS fraud IN andhrapredseh is EXAMPLE OF q92.WHAT is cybersmearing
 Q93.what is STEERSMAN Q94.WHAT do you mean by ALITE HECKER Q95.IDS is palced between internet and firewell Q96.what is PCIDSS Q97.WHAT is Matrix code barcoding Q98.WHAT is software Piarcy Q99.what is DNS SINKHOLDING Q100.WHAT do you understand by traditional criminals
 Q101.WHAT is beck end access Q102.IN WHICH year ekyc published and its detail Q103.BYOD DEVICE q Q104.WHAT is trapdoor Q105.what is PURPOSE OF FIREWELL Q106. BATCH processing is an example of oltp online transition precessing Q107.WHAT IS UTM Qq108. Loss of reputation is a serous adverse effect of DDOS ATTACK Q109.THE disciussion paper held on payment and settlement system of RBI held on 2013 was main focus on ENHANCED USE OF ENTERNET BANKING AND E COMMERCE q110.what is B2G business to government E COMMERCE TRANSCTION q111.boss was developed by cdac Q112.WHAT IS STAGANOGRAPHY Q113. WHAT IS ALGORITHM
Q114.WHT IS PKI Q.115 WHAT IS HONEY POT q116. WHAT IS MICROATM q117.DETAILS ABOUT I4C AND CERTIN Q118.SATYAM AND SIFY CASE q119.PUCL CASE IS AN example of sec.69 Q120.WHAT IS VBV THESE ARE RECOLLECTED QUESTION OF PAPER ON 15 SEPTEMBER 2018

Sunday, 12 August 2018

All IIBF Certifications PDFs in single link

All IIBF Certifications PDFs in single link

Read corresponding  IIBF book 1st Macmillan / Taxmann.

These all materials are extra information to get knowledge.

All the best

Certified credit officer/Professionals
https://drive.google.com/file/d/1FplMEaDGqO901bQESuIMfmS0spej2p5B/view?usp=sharing

KYC AML
https://drive.google.com/file/d/1NhyU5b-q7SomdRD_kuyxwhO0lSVvlp8v/view?usp=sharing

MSME
https://drive.google.com/file/d/1pozMYe4F0moF-5dyAzhB_0BcaPIsqZYr/view?usp=sharing

BCSBI
https://drive.google.com/file/d/1vk4exeJW2PQM93gwDNsnvNGWj2uh7JMC/view?usp=sharing

Digital Banking
https://drive.google.com/file/d/1M5jr0a84pgqilJgJsBiZZe6FJBwDsuqi/view?usp=sharing

Foreign exchange Individual
https://drive.google.com/file/d/1jDQsTKSl54UrXC0gvBhiGv5V1tduk5Zj/view?usp=sharing

International Trade Finance
https://drive.google.com/file/d/1vYgdwbTVazkjv_2U7ppfAL2yfmsG295l/view?usp=sharing

Information system banker
https://drive.google.com/file/d/1yySCTA2aFwdeNDgTny9XlIB0x7IIG3SD/view?usp=sharing

IT security
https://drive.google.com/file/d/1XNLaHz4QNLCvHIH_MMuYjNqo7Cw7q2EY/view?usp=sharing

Prevention of cyber crime & fraud exam
https://drive.google.com/file/d/1GArx9JZAWOHH-fK8WvuEZSgqxjZgl_jG/view?usp=sharing

Certified Treasury Professionals
https://drive.google.com/file/d/1ZzUVI4CttHW_yNRO1DG4KSf9IAhZiCIm/view?usp=sharing

RISK in financial services
https://drive.google.com/file/d/134OS-POYOZaBLeEjFWLlAbhbFGKPWoPM/view?usp=sharing

Microfiance
https://drive.google.com/file/d/1bm27bcMA_NFUgdxbIJCJOlHLFinNA_rF/view?usp=sharing

CAIIB ABM 300 Case studies

https://drive.google.com/file/d/12voUk6-ubSI2PH0hKX6_trTf6T7wwdh2/view?usp=sharing

CAIIB  Elective IT pdf
https://drive.google.com/file/d/1x4RoW7L2Ub2VOFiAMVjjW7wV0aEtz6Gj/view?usp=sharing

FOREX OPERATIONS PDF

https://drive.google.com/file/d/19Qi4HjcLbca1X3P9ad_x3wESF1OOiqi7/view?usp=sharing

Certified Accounts and Audit pdf

https://drive.google.com/file/d/15hLGNIICS4p8IKUEsjAEPfmZJ-cm9lvO/view?usp=sharing

https://drive.google.com/file/d/1zoloZKNR2-UsBGIf0gw1ErhD0F2Y9mHW/view?usp=sharing





Tuesday, 31 July 2018

Import acts Information Technology (Amendment) Act, 2008

Import acts Information Technology (Amendment) Act, 2008
 Tampering with computer source Documents Sec.65
 Hacking with computer systems , Data Alteration Sec.66
 Sending offensive messages through communication service, etc Sec.66A
 Dishonestly receiving stolen computer resource or communication device Sec.66B
 Identity theft Sec.66C
 Cheating by personation by using computer resource Sec.66D
 Violation of privacy Sec.66E
 Cyber terrorism Sec.66F
 Publishing or transmitting obscene material in electronic form Sec .67
 Hackers scans the computer pre attack to identify - Vulnerability in the systemPunishment for
publishing or transmitting of material depicting children in sexually explicit act, etc.
 in electronic form Sec.67B
 Preservation and Retention of information by intermediaries Sec.67C
 Powers to issue directions for interception or monitoring or decryption of any information through
 any computer resource Sec.69
 Power to issue directions for blocking for public access of any information through any computer
 resource Sec.69A
 Power to authorize to monitor and collect traffic data or information through any computer resource
 for Cyber Security Sec.69B
 Un-authorized access to protected system Sec.70
 Penalty for misrepresentation Sec.71
 Breach of confidentiality and privacy Sec.72
 Publishing False digital signature certificates Sec.73
 Publication for fraudulent purpose Sec.74

Tuesday, 10 July 2018

Basic Principles of Information Security:

Basic Principles of Information Security:

For over twenty years, information security has held confidentiality, integrity and availability (known as the CIA triad) to be the core principles. There is continuous debate about extending this classic trio. Other principles such as Authenticity, Non-repudiation and accountability are also now becoming key considerations for practical security installations.

 Confidentiality: Confidentiality is the term used to prevent the disclosure of information to unauthorized individuals or systems. For example, a credit card transaction on the Internet requires the credit card number to be transmitted from the buyer to the merchant and from the merchant to a transaction processing network. The system attempts to enforce confidentiality by encrypting the card number during transmission, by limiting the places where it might appear (in databases, log files, backups, printed receipts, and so on), and by restricting access to the places where it is stored. If an unauthorized party obtains the card number in any way, a breach of confidentiality has occurred. Breaches of confidentiality take many forms like Hacking, Phishing, Vishing, Email-spoofing, SMS spoofing, and sending malicious code through email or Bot Networks, as discussed earlier.

 Integrity: In information security, integrity means that data cannot be modified without authorization. This is not the same thing as referential integrity in databases.
Integrity is violated when an employee accidentally or with malicious intent deletes important data files, when he/she is able to modify his own salary in a payroll database, when an employee uses programmes and deducts small amounts of money from all customer accounts and adds it to his/her own account (also called salami technique), when an unauthorized user vandalizes a web site, and so on.

On a larger scale, if an automated process is not written and tested correctly, bulk updates to a database could alter data in an incorrect way, leaving the integrity of the data compromised. Information security professionals are tasked with finding ways to implement controls that prevent errors of integrity.

 Availability: For any information system to serve its purpose, the information must be available when it is needed. This means that the computing systems used to store and process the information, the security controls used to protect it, and the communication channels used to access it must be functioning correctly. High availability systems aim to remain available at all times, preventing service disruptions due to power outages, hardware failures, and system upgrades. Ensuring availability also involves preventing denial-of-service (DoS) and distributed denial-of service (DDoS) attacks.

 Authenticity: In computing, e-business and information security it is necessary to ensure that the data, transactions, communications or documents (electronic or physical) are genuine. It is also important for authenticity to validate that both parties involved are who they claim they are.

 Non-repudiation: In law, non-repudiation implies one's intention to fulfill one’s obligations under a contract / transaction. It also implies that a party to a transaction cannot deny having received or having sent an electronic record. Electronic commerce uses technology such as digital signatures and encryption to establish authenticity and non-repudiation.

In addition to the above, there are other security-related concepts and principles when designing a security policy and deploying a security solution. They include identification, authorization, accountability, and auditing.

 Identification: Identification is the process by which a subject professes an identity and accountability is initiated. A subject must provide an identity to a system to start the process of authentication, authorization and accountability. Providing an identity can be typing in a username, swiping a smart card, waving a proximity device, speaking a phrase, or positioning face, hand, or finger for a camera or scanning device. Proving a process ID number also represents the identification process. Without an identity, a system has no way to correlate an authentication factor with the subject.

 Authorization: Once a subject is authenticated, access must be authorized. The process of authorization ensures that the requested activity or access to an object is possible given the rights and privileges assigned to the authenticated identity. In most cases, the system evaluates an access control matrix that compares the subject, the object, and the intended activity. If the specific action is allowed, the subject is authorized. Else, the subject is not authorized.

 Accountability and auditability: An organization’s security policy can be properly enforced only if accountability is maintained, i.e., security can be maintained only if subjects are held accountable for their actions. Effective accountability relies upon the capability to prove a subject’s identity and track their activities. Accountability is established by linking a human to the activities of an online identity through the

security services and mechanisms of auditing, authorization, authentication, and identification. Thus, human accountability is ultimately dependent on the strength of the authentication process. Without a reasonably strong authentication process, there is doubt that the correct human associated with a specific user account was the actual entity controlling that user account when an undesired action took place.

Monday, 9 July 2018

Information Technology (Amendment) Act, 2008 full details

Information Technology (Amendment) Act, 2008
BRIEF HISTORY
The Indian Information Technology Act 2000 (“Act”) was a based on the Model Law on Electronic Commerce adopted by the United Nations Commission on International Trade Law[1]; the suggestion was that all States intending to enact a law for the impugned purpose, give favourable consideration to the said Model Law when they enact or revise their laws, in view of the need for uniformity of the law applicable to alternatives to paper-based methods of communication and storage of information. Thus the Act was enacted to provide legal recognition for transactions carried out by means of electronic data interchange and other means of electronic communication, commonly referred to as "electronic commerce", which involved the use of alternatives to traditional or paper-based methods of communication and storage of information, to facilitate electronic filing of documents with the Government agencies. Also it was considered necessary to give effect to the said resolution and to promote efficient delivery of Government services by means of reliable electronic records. The Act received the assent of the President on the 9th of June, 2000.

The Act was subsequently and substantially amended in 2006 and again in 2008 citing the following objectives:
• With proliferation of information technology enabled services such as e-governance, ecommerce and e-transactions, protection of personal data and information and implementation of security practices and procedures relating to these applications of electronic communications have assumed greater importance and they require harmonization with the provisions of the Information Technology Act. Further, protection of Critical Information Infrastructure is pivotal to national security, economy, public health and safety, so it has become necessary to declare such infrastructure as a protected system so as to restrict its access.
• A rapid increase in the use of computer and internet has given rise to new forms of crimes like publishing sexually explicit materials in electronic form, video voyeurism and breach of confidentiality and leakage of data by intermediary, e-commerce frauds like personation commonly known as Phishing, identity theft and offensive messages through communication services. So, penal provisions are required to be included in the Information Technology Act, the Indian Penal Code, the Indian Evidence Act and the Code of Criminal Procedure to prevent such crimes.
• The United Nations Commission on International Trade Law (UNCITRAL) in the year 2001 adopted the Model Law on Electronic Signatures. The General Assembly of the United Nations by its resolution No. 56/80, dated 12th December, 2001, recommended that all States accord favorable consideration to the said Model Law on Electronic Signatures. Since the digital signatures are linked to a specific technology under the existing provisions of the Information Technology Act, it has become necessary to provide for alternate technology of electronic signatures for bringing harmonization with the said Model Law.
• The service providers may be authorized by the Central Government or the State Government to set up, maintain and upgrade the computerized facilities and also collect, retain appropriate service charges for providing such services at such scale as may be specified by the Central Government or the State Government.