Untitled Quiz
47 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What is the range of IP addresses for Class C?

  • 240.0.0.0 to 254.255.255.254
  • 192.0.1.1 to 223.255.254.254 (correct)
  • 224.0.0.0 to 239.255.255.255
  • 192.0.0.0 to 223.255.255.255
  • What is a major factor that encourages individuals to commit cyber crimes?

  • High risk of discovery
  • Moral obligation to report crimes
  • Strict government regulations
  • Anonymity provided by cyberspace (correct)
  • Which type of malware is specifically designed for advertising purposes?

  • Adware (correct)
  • Ransomware
  • Spyware
  • Trojan horse
  • Which Regional Internet Registry (RIR) is responsible for serving the African region?

    <p>AfriNIC</p> Signup and view all the answers

    What is the primary function of spyware?

    <p>To steal sensitive information</p> Signup and view all the answers

    What is the purpose of the Domain Name System (DNS)?

    <p>To translate domain names into IP addresses</p> Signup and view all the answers

    Which RIR serves Europe, the Middle East, and parts of Central Asia?

    <p>RIPE NCC</p> Signup and view all the answers

    What motivates governments to engage in cyber trespassing?

    <p>Socially motivated interests</p> Signup and view all the answers

    Class D IP addresses are reserved for what purpose?

    <p>Multicast groups</p> Signup and view all the answers

    What can browser hijacking software do?

    <p>Change the user's default browser settings</p> Signup and view all the answers

    What is a common method through which spyware is often installed?

    <p>Downloading freeware applications</p> Signup and view all the answers

    How many hosts can Class C support on each of its networks?

    <p>254 hosts</p> Signup and view all the answers

    Which of the following describes a characteristic of malware?

    <p>Performs unwanted tasks</p> Signup and view all the answers

    What is maintained in the DNS cache?

    <p>Recently visited websites</p> Signup and view all the answers

    What is the first step in digital forensic investigation after discovering an attack?

    <p>Take a backup of the data for investigation</p> Signup and view all the answers

    What organization coordinates between the five Regional Internet Registries?

    <p>NRO</p> Signup and view all the answers

    What is one of the main reasons individuals might feel compelled to compromise their ethics in cyberspace?

    <p>Strong sense of anonymity</p> Signup and view all the answers

    Which tool is NOT mentioned as being used to capture data during digital forensic investigations?

    <p>Kaspersky</p> Signup and view all the answers

    What is calculated and matched with the original to check the integrity of the backup?

    <p>MD5 hash</p> Signup and view all the answers

    Why is the examination of the original machine avoided during a forensic investigation?

    <p>To prevent altering the evidence</p> Signup and view all the answers

    What should be ensured about the devices used for capturing backup?

    <p>They must be free from contamination</p> Signup and view all the answers

    What does a digital signature help to prevent in a transaction?

    <p>Denial or disagreement at a later stage</p> Signup and view all the answers

    What might deter some companies from reporting a cyber crime incident?

    <p>Fear of reputational damage</p> Signup and view all the answers

    Which type of files are specifically mentioned as being reviewed during the investigation?

    <p>Password protected and encrypted files</p> Signup and view all the answers

    What is the main role of antivirus software?

    <p>To protect the system against malicious programs</p> Signup and view all the answers

    What is a recommended preventive measure against cyber crime?

    <p>Fine-tuning the intrusion detection system</p> Signup and view all the answers

    What primary function does a firewall serve?

    <p>To act as a barrier against network threats</p> Signup and view all the answers

    What happens if data is tampered with during transmission?

    <p>The authenticity of the sender is compromised</p> Signup and view all the answers

    Why do antivirus programs regularly update their database?

    <p>To protect against newly emerging threats</p> Signup and view all the answers

    Which of the following is NOT a type of malicious program mentioned?

    <p>Spam</p> Signup and view all the answers

    What unique capability does a digital signature provide?

    <p>Validates the ownership of a document</p> Signup and view all the answers

    What was the main purpose of the promotional campaign launched by the mobile service operator?

    <p>To sell mobile phones at a low cost with a lock-in period</p> Signup and view all the answers

    What legal action did the mobile service operator take against the competitors who unlocked the phones?

    <p>They filed a case under copyright infringement</p> Signup and view all the answers

    How did the criminals get away with using stolen credit card data?

    <p>By utilizing public infrastructure like cyber cafes</p> Signup and view all the answers

    Which of the following was a key feature of the Love Bug worm?

    <p>It spread through email attachments</p> Signup and view all the answers

    What is the email address for the CBI Cyber Crime Cell?

    <p><a href="mailto:[email protected]">[email protected]</a></p> Signup and view all the answers

    What significant damage did the Love Bug worm cause?

    <p>Financial loss of approximately Rs. 22,000 crore</p> Signup and view all the answers

    Which website is associated with the Cyber Crime Police Station in Bangalore?

    <p><a href="http://www.cyberpolicebangalore.nic.in">http://www.cyberpolicebangalore.nic.in</a></p> Signup and view all the answers

    What do online degree frauds typically involve?

    <p>Fake degrees offered by unaffiliated institutions</p> Signup and view all the answers

    Which of the following contact numbers belongs to the Cyber Crime Police Station in Hyderabad?

    <p>+91-40-2785 2040</p> Signup and view all the answers

    What was a key factor in the spread of the Love Bug worm?

    <p>Users' lack of technical knowledge</p> Signup and view all the answers

    What is the fax number for the Cyber Crime Police Station in Bangalore?

    <p>+91-80-2294 3050</p> Signup and view all the answers

    What was the impact of the cyber theft of credit card data reported?

    <p>Total revenue loss of Rs. 17 crore</p> Signup and view all the answers

    Where is the CBI Cyber Crime Cell located?

    <p>New Delhi</p> Signup and view all the answers

    Which email address is associated with the Cyber Crime Police Station in Pune?

    <p><a href="mailto:[email protected]">[email protected]</a></p> Signup and view all the answers

    What is the fax number for the Cyber Crime Police Station in Hyderabad?

    <p>+91-40-2329 7474</p> Signup and view all the answers

    What is the contact detail for the Cyber Crime Police Station in Bangalore?

    <p>+91-80-2220 1026</p> Signup and view all the answers

    Study Notes

    Introduction to Cyber Security

    • Cyber security is a crucial field in today's digital world.
    • The book "Introduction to Cyber Security" by Jeetendra Pande covers various aspects of cyber security.
    • The book discusses the history of the internet to Cyber Crimes.
    • It also explains different types of malware and cybercrimes.
    • The book details various cyber security techniques such as authentication, encryption and firewall.
    • Lastly the book explains how to investigate cybercrimes.

    Index (Page 4)

    • Covers sections on the history of the internet, cybercrime classifications, malware types, and different kinds of cybercrime.
    • Contains page numbers for each section.

    1.1 Introduction (Page 8)

    • Internet is a crucial invention of the 21st century, significantly impacting every aspect of life.
    • Technology has made many tasks more accessible and convenient.
    • Cost of communication and information has decreased.
    • Example tasks performed via internet: paying bills, shopping, communication etc.
    • Internet allows users to stay connected 24/7.

    1.1.1 History of Internet (Page 8)

    • The first satellite Sputnik was launched in 1957 by Russia.
    • The United States responded in 1960s with the formation of ARPANET.
    • ARPANET was designed for communication even if parts of the network malfunctioned.
    • The first message over the internet was rudimentary, just "LOGIN".
    • ARPANET led to the development of protocols (TCP/IP).
    • NSFnet was created in 1986 to allow connections between universities and research centers.
    • National Science Foundation (NSF) helped to expand the internet to commercial usage.
    • The subsequent evolution of internet led to the World Wide Web.

    1.1.1.1 Internet Addresses (Page 10)

    • Internet addresses, or IPs, are unique, 32-bit binary numbers (dotted decimal format).
    • Assigned by Internet Assigned Numbers Authority (IANA).
    • Consist of four parts separated by dots called “octets”.
    • Categorized into five major classes (A, B, C, D, E) based on range.

    1.1.1.2 DNS (Page 11)

    • Internet uses domain names (e.g., www.uou.ac.in) for easier access.
    • Domain Name System (DNS) translates these human-readable domain names to machine-readable IP addresses.

    1.1.1.3 Internet Infrastructure (Page 12)

    • The internet is a network of networks.
    • Its global reach is made possible by interconnected networks and protocols.
    • In 1992, "The Internet Society" was formed to deal with regulations and protocols for global network.

    1.1.1.4 World Wide Web (Page 13)

    • The World Wide Web (WWW) is a system of interlinked hypertext documents.
    • Makes information available online in various formats.
    • Enables easy and fast retrieval of information, and has become a crucial part of our daily life.

    1.2 Introduction to Cyber Crime (Page 15)

    • Cybercrime is a growing area of concern globally causing many problems.
    • Cyber attacks can harm individuals and organizations in many ways.
    • The focus shifted from physically damaging a computer to causing financial loss and reputational damage.
    • Cybersecurity incidents are rising exponentially causing huge financial losses.

    1.2.1 Classification of Cyber Crimes (Page 16)

    • Cybercrimes are categorized into insider attacks and external attacks.

    1.2.2 Reasons for Commission of Cyber Crimes (Page 17)

    • Cybercrimes are committed for various reasons: money, revenge, opportunity for recognition or to show off one's skills, and anonymity.

    1.3 Malware and types (Page 18)

    • Malware is malicious software designed to take advantage of a computer without permission.
    • Types of Malware: adware, spyware, browser hijacking software, viruses, worms, Trojan horse, and scareware.

    1.4 Kinds of Cyber Crime (Page 21)

    • Different types of cybercrime acts such as cyber stalking, child pornography, forgery, software piracy, cyber terrorism, phishing, computer vandalism, hacking, etc.

    2.1 Authentication (Page 25)

    • Verification of a user's identity is essential for security.
    • Common methods involve username and password.
    • Two-factor authentication adds an extra layer of security using OTP.
    • Biometric data and physical tokens are also used as additional methods.

    2.2 Encryption (Page 26)

    • Ensures data confidentiality during transmission.
    • Encrypts data into unreadable format.
    • Encryption makes original data difficult to understand for unauthorized access.
    • Asymmetric key encryption uses a pair of keys (public and private) to secure communication.

    2.3 Digital Signatures (Page 27)

    • Validates data, verifies the authenticity of the sender, ensures data tampering cannot occur.
    • Digital signatures use the private key of the sender to encrypt data along with the message.
    • This encrypted data can be decrypted at the receiving end using the sender’s public key.

    2.4 Antivirus (Page 28)

    • Antivirus protects the computer from malware.
    • Regularly upadtes its database to combat the latest threats.
    • Antivirus protects the devices from viruses, worms, trojan horses etc.

    2.5 Firewall (Page 30)

    • Firewalls control incoming and outgoing network traffic as a security measure.
    • It blocks unauthorized access to the network.

    2.6 Steganography (Page 31)

    • Hiding secret messages inside other files is called steganography.
    • It's a technique for covert communication without detection.

    3.1 Computer Forensics (Page 32)

    • Computer forensics is the scientific investigation of computer crimes.
    • It involves collecting, preserving, and analyzing digital evidence.

    5.1 Cyber Security Initiatives in India (Page 46)

    • India is facing a growing need for skilled cybersecurity professionals.
    • National and international initiatives are crucial for improving cybersecurity infrastructure.

    5.2 Counter Cyber Security Initiatives in India (Page 47)

    • Government of India has implemented various initiatives to mitigate cyberattacks such as NCTC, NISAP, CERT-In and IUSCSF.

    6.1 Generating Secure Passwords (Page 51)

    • Discusses the importance of strong passwords and provides guidelines.
    • Emphasizes use of random combinations and avoid common passwords.

    6.2 Using Password Manager (Page 55/56)

    • Password managers are software utilities that simplify password management.
    • Explains their benefits: security, convenience, ease of use.

    6.3 Enabling Two–Step Verification (Page 62)

    • Two–step verification is an enhanced user authentication measure providing an additional layer of security.
    • It verifies your identity by requiring extra validation such as a verification code.

    7.1 Configuring Firewalls on Mac Computers (Page 74/75)

    • Discusses the steps to allow and deny specific communications via the firewall.
    • Mac computers come equipped with built in firewalls that are configurable.

    7.2 Working with Windows Firewalls (Page 77)

    • Windows firewalls manage network traffic between the computer and the internet.
    • There are inbound and outbound rules defining access.
    • It is advised to enable firewall's full stealth ability and boot time filtering for best security.

    8.1 Finding the best browser (Page 88/89)

    • Selecting a suitable browser based on user requirements and computer specifications is important.
    • Tabbed browsers: Safari, Firefox, Opera.
    • Consideration of mobile devices, operating system, bandwidth.
    • Less resource/memory hungry browsers can be considered.

    9.1 Safe Browsing (Page 93)-

    • Important aspects for safe internet browsing.
    • Identifying secure websites/connections using the HTTPS protocol, padlock icon.

    9.2 Tips for Buying Online (Page 94/95)

    • Essential information about protecting yourself in the online purchasing process.
    • Secure websites, business reputation, checking website details.
    • Importance of carefully reviewing contract terms (returns policies).

    9.3 Clearing Cache for Browsers (Page 95/100)

    • Discusses cache clearing as an approach to improve browsing speed and performance.
    • Explains the steps to clear browsing data, cookies in Chrome, Safari, Internet Explorer & Opera.
    • Use these different steps to clear browsing data correctly on those specified browsers.

    9.3.1 Clearing Cache for Chrome Browsers (Page 96/99/100)

    • Provides steps to clear data in Chrome browsers for faster performance.

    9.3.2 Clearing Cache for Chrome Browsers (Page 99)

    • Clear browser cache steps for Chrome less than version 10.

    9.3.3 Clearing Cache for Safari (Page 101/102/103)

    • Steps for clearing Safari cache for iOS, iPhone and iPad.

    9.3.4 Clearing Cache for Safari (Pages 102/103)

    • Steps to clear Safari cache on Macs

    9.3.5 Clearing Cache for Safari (Page 104)

    • Safari's cache clearing steps on windows.

    9.3.6 Clearing Cache for Internet Explorer (Page 105)

    • Steps to clear I.E cache on different versions (9,10,11)

    9.3.7 Clearing Cache for Internet Explorer (Page 107)

    • Steps to clear I.E cache on Version 8

    9.3.8 Clearing Cache for Firefox (Page 111/112)

    • Steps to clear cache in Firefox

    9.3.10 Clearing Cache for Opera (Page 114)

    • How to clear cache in Opera.

    9.3.11 Clearing cache for Ccleaner (Page 114/115)

    • How to clear cache using Ccleaner.

    10.1 What is Wireless LAN? (Page 116)

    • Describes Wireless LAN (WLAN) as a way of communication.
    • Highlighted benefits of wireless networks include convenient, cost-effective and easy maintenance.

    10.2 Major Issues With WLAN (Pages 117/118)

    • Various attacks and vulnerabilities of WLANs such as sniffing , key cracking, DoS attacks, unauthorized access .
    • Different ways to make WLAN secure.

    11.1 Safe Browsing Guidelines for Social Networking Sites (Page 122/123/124/125)

    • Discusses safe practices and potential risks of social networks' usage.

    11.1.1 General Tips on using Social Networking platforms (Page 123/124)

    • Provides best practices, security awareness and safe usage tips on social media platforms.
    • Discussing importance of privacy and security of information posted on social media platforms.

    11.1.2-11.1.6 Social Networking site tips (Pages 124 to 127)

    • Safety tips for various important social networking sites functionality such as sharing posts, revealing location, sharing images , etc.

    11.2 Email Security Tips (Pages 127/128)

    • Provides rules and tips to keep your email safe and avoid scams.
    • Discusses the significance of secure passwords, and precautions against phishing.

    12.1 Introduction to Smartphone Security (Page 129)

    • Provides the advantages and importance of smartphones in today's digital landscape.
    • Highlights the potential security vulnerabilities and risks associated with using smartphones

    12.2 Smartphone Security Guidelines-Part 1(Pages 130-133)

    • Discusses the value of controlling personal data on a mobile device, offering best practice tools and setup examples of security.

    12.2.2.1-12.2.2.4 Setup,Installation and communication (Pages 132-133)

    • Discusses setup, installation, and communications using different platforms of mobile phones.
    • Providing information about different OS types (iOS, Android).
    • Highlighting the importance of using different security apps.

    12.2.3 Communicating securely via voice and messages(Pages 133-137)

    • Encourages secure communication using appropriate tools and settings (SMS and VoIP).

    12.2.3.1-12.2.3.7 Sending Messages Securely(Pages 137/138)

    • Discussing different applications(VoIP,SMS etc..) and how they can be used securely to avoid security breaches.

    6.4 Securing Computer Using Free Antivirus (Page 72)

    • Mentions several highly-rated free antivirus options for general use.

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Related Documents

    More Like This

    Untitled Quiz
    6 questions

    Untitled Quiz

    AdoredHealing avatar
    AdoredHealing
    Untitled Quiz
    37 questions

    Untitled Quiz

    WellReceivedSquirrel7948 avatar
    WellReceivedSquirrel7948
    Untitled Quiz
    18 questions

    Untitled Quiz

    RighteousIguana avatar
    RighteousIguana
    Untitled Quiz
    48 questions

    Untitled Quiz

    StraightforwardStatueOfLiberty avatar
    StraightforwardStatueOfLiberty
    Use Quizgecko on...
    Browser
    Browser