Podcast
Questions and Answers
What is the range of IP addresses for Class C?
What is the range of IP addresses for Class C?
What is a major factor that encourages individuals to commit cyber crimes?
What is a major factor that encourages individuals to commit cyber crimes?
Which type of malware is specifically designed for advertising purposes?
Which type of malware is specifically designed for advertising purposes?
Which Regional Internet Registry (RIR) is responsible for serving the African region?
Which Regional Internet Registry (RIR) is responsible for serving the African region?
Signup and view all the answers
What is the primary function of spyware?
What is the primary function of spyware?
Signup and view all the answers
What is the purpose of the Domain Name System (DNS)?
What is the purpose of the Domain Name System (DNS)?
Signup and view all the answers
Which RIR serves Europe, the Middle East, and parts of Central Asia?
Which RIR serves Europe, the Middle East, and parts of Central Asia?
Signup and view all the answers
What motivates governments to engage in cyber trespassing?
What motivates governments to engage in cyber trespassing?
Signup and view all the answers
Class D IP addresses are reserved for what purpose?
Class D IP addresses are reserved for what purpose?
Signup and view all the answers
What can browser hijacking software do?
What can browser hijacking software do?
Signup and view all the answers
What is a common method through which spyware is often installed?
What is a common method through which spyware is often installed?
Signup and view all the answers
How many hosts can Class C support on each of its networks?
How many hosts can Class C support on each of its networks?
Signup and view all the answers
Which of the following describes a characteristic of malware?
Which of the following describes a characteristic of malware?
Signup and view all the answers
What is maintained in the DNS cache?
What is maintained in the DNS cache?
Signup and view all the answers
What is the first step in digital forensic investigation after discovering an attack?
What is the first step in digital forensic investigation after discovering an attack?
Signup and view all the answers
What organization coordinates between the five Regional Internet Registries?
What organization coordinates between the five Regional Internet Registries?
Signup and view all the answers
What is one of the main reasons individuals might feel compelled to compromise their ethics in cyberspace?
What is one of the main reasons individuals might feel compelled to compromise their ethics in cyberspace?
Signup and view all the answers
Which tool is NOT mentioned as being used to capture data during digital forensic investigations?
Which tool is NOT mentioned as being used to capture data during digital forensic investigations?
Signup and view all the answers
What is calculated and matched with the original to check the integrity of the backup?
What is calculated and matched with the original to check the integrity of the backup?
Signup and view all the answers
Why is the examination of the original machine avoided during a forensic investigation?
Why is the examination of the original machine avoided during a forensic investigation?
Signup and view all the answers
What should be ensured about the devices used for capturing backup?
What should be ensured about the devices used for capturing backup?
Signup and view all the answers
What does a digital signature help to prevent in a transaction?
What does a digital signature help to prevent in a transaction?
Signup and view all the answers
What might deter some companies from reporting a cyber crime incident?
What might deter some companies from reporting a cyber crime incident?
Signup and view all the answers
Which type of files are specifically mentioned as being reviewed during the investigation?
Which type of files are specifically mentioned as being reviewed during the investigation?
Signup and view all the answers
What is the main role of antivirus software?
What is the main role of antivirus software?
Signup and view all the answers
What is a recommended preventive measure against cyber crime?
What is a recommended preventive measure against cyber crime?
Signup and view all the answers
What primary function does a firewall serve?
What primary function does a firewall serve?
Signup and view all the answers
What happens if data is tampered with during transmission?
What happens if data is tampered with during transmission?
Signup and view all the answers
Why do antivirus programs regularly update their database?
Why do antivirus programs regularly update their database?
Signup and view all the answers
Which of the following is NOT a type of malicious program mentioned?
Which of the following is NOT a type of malicious program mentioned?
Signup and view all the answers
What unique capability does a digital signature provide?
What unique capability does a digital signature provide?
Signup and view all the answers
What was the main purpose of the promotional campaign launched by the mobile service operator?
What was the main purpose of the promotional campaign launched by the mobile service operator?
Signup and view all the answers
What legal action did the mobile service operator take against the competitors who unlocked the phones?
What legal action did the mobile service operator take against the competitors who unlocked the phones?
Signup and view all the answers
How did the criminals get away with using stolen credit card data?
How did the criminals get away with using stolen credit card data?
Signup and view all the answers
Which of the following was a key feature of the Love Bug worm?
Which of the following was a key feature of the Love Bug worm?
Signup and view all the answers
What is the email address for the CBI Cyber Crime Cell?
What is the email address for the CBI Cyber Crime Cell?
Signup and view all the answers
What significant damage did the Love Bug worm cause?
What significant damage did the Love Bug worm cause?
Signup and view all the answers
Which website is associated with the Cyber Crime Police Station in Bangalore?
Which website is associated with the Cyber Crime Police Station in Bangalore?
Signup and view all the answers
What do online degree frauds typically involve?
What do online degree frauds typically involve?
Signup and view all the answers
Which of the following contact numbers belongs to the Cyber Crime Police Station in Hyderabad?
Which of the following contact numbers belongs to the Cyber Crime Police Station in Hyderabad?
Signup and view all the answers
What was a key factor in the spread of the Love Bug worm?
What was a key factor in the spread of the Love Bug worm?
Signup and view all the answers
What is the fax number for the Cyber Crime Police Station in Bangalore?
What is the fax number for the Cyber Crime Police Station in Bangalore?
Signup and view all the answers
What was the impact of the cyber theft of credit card data reported?
What was the impact of the cyber theft of credit card data reported?
Signup and view all the answers
Where is the CBI Cyber Crime Cell located?
Where is the CBI Cyber Crime Cell located?
Signup and view all the answers
Which email address is associated with the Cyber Crime Police Station in Pune?
Which email address is associated with the Cyber Crime Police Station in Pune?
Signup and view all the answers
What is the fax number for the Cyber Crime Police Station in Hyderabad?
What is the fax number for the Cyber Crime Police Station in Hyderabad?
Signup and view all the answers
What is the contact detail for the Cyber Crime Police Station in Bangalore?
What is the contact detail for the Cyber Crime Police Station in Bangalore?
Signup and view all the answers
Study Notes
Introduction to Cyber Security
- Cyber security is a crucial field in today's digital world.
- The book "Introduction to Cyber Security" by Jeetendra Pande covers various aspects of cyber security.
- The book discusses the history of the internet to Cyber Crimes.
- It also explains different types of malware and cybercrimes.
- The book details various cyber security techniques such as authentication, encryption and firewall.
- Lastly the book explains how to investigate cybercrimes.
Index (Page 4)
- Covers sections on the history of the internet, cybercrime classifications, malware types, and different kinds of cybercrime.
- Contains page numbers for each section.
1.1 Introduction (Page 8)
- Internet is a crucial invention of the 21st century, significantly impacting every aspect of life.
- Technology has made many tasks more accessible and convenient.
- Cost of communication and information has decreased.
- Example tasks performed via internet: paying bills, shopping, communication etc.
- Internet allows users to stay connected 24/7.
1.1.1 History of Internet (Page 8)
- The first satellite Sputnik was launched in 1957 by Russia.
- The United States responded in 1960s with the formation of ARPANET.
- ARPANET was designed for communication even if parts of the network malfunctioned.
- The first message over the internet was rudimentary, just "LOGIN".
- ARPANET led to the development of protocols (TCP/IP).
- NSFnet was created in 1986 to allow connections between universities and research centers.
- National Science Foundation (NSF) helped to expand the internet to commercial usage.
- The subsequent evolution of internet led to the World Wide Web.
1.1.1.1 Internet Addresses (Page 10)
- Internet addresses, or IPs, are unique, 32-bit binary numbers (dotted decimal format).
- Assigned by Internet Assigned Numbers Authority (IANA).
- Consist of four parts separated by dots called “octets”.
- Categorized into five major classes (A, B, C, D, E) based on range.
1.1.1.2 DNS (Page 11)
- Internet uses domain names (e.g., www.uou.ac.in) for easier access.
- Domain Name System (DNS) translates these human-readable domain names to machine-readable IP addresses.
1.1.1.3 Internet Infrastructure (Page 12)
- The internet is a network of networks.
- Its global reach is made possible by interconnected networks and protocols.
- In 1992, "The Internet Society" was formed to deal with regulations and protocols for global network.
1.1.1.4 World Wide Web (Page 13)
- The World Wide Web (WWW) is a system of interlinked hypertext documents.
- Makes information available online in various formats.
- Enables easy and fast retrieval of information, and has become a crucial part of our daily life.
1.2 Introduction to Cyber Crime (Page 15)
- Cybercrime is a growing area of concern globally causing many problems.
- Cyber attacks can harm individuals and organizations in many ways.
- The focus shifted from physically damaging a computer to causing financial loss and reputational damage.
- Cybersecurity incidents are rising exponentially causing huge financial losses.
1.2.1 Classification of Cyber Crimes (Page 16)
- Cybercrimes are categorized into insider attacks and external attacks.
1.2.2 Reasons for Commission of Cyber Crimes (Page 17)
- Cybercrimes are committed for various reasons: money, revenge, opportunity for recognition or to show off one's skills, and anonymity.
1.3 Malware and types (Page 18)
- Malware is malicious software designed to take advantage of a computer without permission.
- Types of Malware: adware, spyware, browser hijacking software, viruses, worms, Trojan horse, and scareware.
1.4 Kinds of Cyber Crime (Page 21)
- Different types of cybercrime acts such as cyber stalking, child pornography, forgery, software piracy, cyber terrorism, phishing, computer vandalism, hacking, etc.
2.1 Authentication (Page 25)
- Verification of a user's identity is essential for security.
- Common methods involve username and password.
- Two-factor authentication adds an extra layer of security using OTP.
- Biometric data and physical tokens are also used as additional methods.
2.2 Encryption (Page 26)
- Ensures data confidentiality during transmission.
- Encrypts data into unreadable format.
- Encryption makes original data difficult to understand for unauthorized access.
- Asymmetric key encryption uses a pair of keys (public and private) to secure communication.
2.3 Digital Signatures (Page 27)
- Validates data, verifies the authenticity of the sender, ensures data tampering cannot occur.
- Digital signatures use the private key of the sender to encrypt data along with the message.
- This encrypted data can be decrypted at the receiving end using the sender’s public key.
2.4 Antivirus (Page 28)
- Antivirus protects the computer from malware.
- Regularly upadtes its database to combat the latest threats.
- Antivirus protects the devices from viruses, worms, trojan horses etc.
2.5 Firewall (Page 30)
- Firewalls control incoming and outgoing network traffic as a security measure.
- It blocks unauthorized access to the network.
2.6 Steganography (Page 31)
- Hiding secret messages inside other files is called steganography.
- It's a technique for covert communication without detection.
3.1 Computer Forensics (Page 32)
- Computer forensics is the scientific investigation of computer crimes.
- It involves collecting, preserving, and analyzing digital evidence.
5.1 Cyber Security Initiatives in India (Page 46)
- India is facing a growing need for skilled cybersecurity professionals.
- National and international initiatives are crucial for improving cybersecurity infrastructure.
5.2 Counter Cyber Security Initiatives in India (Page 47)
- Government of India has implemented various initiatives to mitigate cyberattacks such as NCTC, NISAP, CERT-In and IUSCSF.
6.1 Generating Secure Passwords (Page 51)
- Discusses the importance of strong passwords and provides guidelines.
- Emphasizes use of random combinations and avoid common passwords.
6.2 Using Password Manager (Page 55/56)
- Password managers are software utilities that simplify password management.
- Explains their benefits: security, convenience, ease of use.
6.3 Enabling Two–Step Verification (Page 62)
- Two–step verification is an enhanced user authentication measure providing an additional layer of security.
- It verifies your identity by requiring extra validation such as a verification code.
7.1 Configuring Firewalls on Mac Computers (Page 74/75)
- Discusses the steps to allow and deny specific communications via the firewall.
- Mac computers come equipped with built in firewalls that are configurable.
7.2 Working with Windows Firewalls (Page 77)
- Windows firewalls manage network traffic between the computer and the internet.
- There are inbound and outbound rules defining access.
- It is advised to enable firewall's full stealth ability and boot time filtering for best security.
8.1 Finding the best browser (Page 88/89)
- Selecting a suitable browser based on user requirements and computer specifications is important.
- Tabbed browsers: Safari, Firefox, Opera.
- Consideration of mobile devices, operating system, bandwidth.
- Less resource/memory hungry browsers can be considered.
9.1 Safe Browsing (Page 93)-
- Important aspects for safe internet browsing.
- Identifying secure websites/connections using the HTTPS protocol, padlock icon.
9.2 Tips for Buying Online (Page 94/95)
- Essential information about protecting yourself in the online purchasing process.
- Secure websites, business reputation, checking website details.
- Importance of carefully reviewing contract terms (returns policies).
9.3 Clearing Cache for Browsers (Page 95/100)
- Discusses cache clearing as an approach to improve browsing speed and performance.
- Explains the steps to clear browsing data, cookies in Chrome, Safari, Internet Explorer & Opera.
- Use these different steps to clear browsing data correctly on those specified browsers.
9.3.1 Clearing Cache for Chrome Browsers (Page 96/99/100)
- Provides steps to clear data in Chrome browsers for faster performance.
9.3.2 Clearing Cache for Chrome Browsers (Page 99)
- Clear browser cache steps for Chrome less than version 10.
9.3.3 Clearing Cache for Safari (Page 101/102/103)
- Steps for clearing Safari cache for iOS, iPhone and iPad.
9.3.4 Clearing Cache for Safari (Pages 102/103)
- Steps to clear Safari cache on Macs
9.3.5 Clearing Cache for Safari (Page 104)
- Safari's cache clearing steps on windows.
9.3.6 Clearing Cache for Internet Explorer (Page 105)
- Steps to clear I.E cache on different versions (9,10,11)
9.3.7 Clearing Cache for Internet Explorer (Page 107)
- Steps to clear I.E cache on Version 8
9.3.8 Clearing Cache for Firefox (Page 111/112)
- Steps to clear cache in Firefox
9.3.10 Clearing Cache for Opera (Page 114)
- How to clear cache in Opera.
9.3.11 Clearing cache for Ccleaner (Page 114/115)
- How to clear cache using Ccleaner.
10.1 What is Wireless LAN? (Page 116)
- Describes Wireless LAN (WLAN) as a way of communication.
- Highlighted benefits of wireless networks include convenient, cost-effective and easy maintenance.
10.2 Major Issues With WLAN (Pages 117/118)
- Various attacks and vulnerabilities of WLANs such as sniffing , key cracking, DoS attacks, unauthorized access .
- Different ways to make WLAN secure.
11.1 Safe Browsing Guidelines for Social Networking Sites (Page 122/123/124/125)
- Discusses safe practices and potential risks of social networks' usage.
11.1.1 General Tips on using Social Networking platforms (Page 123/124)
- Provides best practices, security awareness and safe usage tips on social media platforms.
- Discussing importance of privacy and security of information posted on social media platforms.
11.1.2-11.1.6 Social Networking site tips (Pages 124 to 127)
- Safety tips for various important social networking sites functionality such as sharing posts, revealing location, sharing images , etc.
11.2 Email Security Tips (Pages 127/128)
- Provides rules and tips to keep your email safe and avoid scams.
- Discusses the significance of secure passwords, and precautions against phishing.
12.1 Introduction to Smartphone Security (Page 129)
- Provides the advantages and importance of smartphones in today's digital landscape.
- Highlights the potential security vulnerabilities and risks associated with using smartphones
12.2 Smartphone Security Guidelines-Part 1(Pages 130-133)
- Discusses the value of controlling personal data on a mobile device, offering best practice tools and setup examples of security.
12.2.2.1-12.2.2.4 Setup,Installation and communication (Pages 132-133)
- Discusses setup, installation, and communications using different platforms of mobile phones.
- Providing information about different OS types (iOS, Android).
- Highlighting the importance of using different security apps.
12.2.3 Communicating securely via voice and messages(Pages 133-137)
- Encourages secure communication using appropriate tools and settings (SMS and VoIP).
12.2.3.1-12.2.3.7 Sending Messages Securely(Pages 137/138)
- Discussing different applications(VoIP,SMS etc..) and how they can be used securely to avoid security breaches.
6.4 Securing Computer Using Free Antivirus (Page 72)
- Mentions several highly-rated free antivirus options for general use.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.