CSL Ut1 Que Ans

Download as pdf or txt
Download as pdf or txt
You are on page 1of 9

CSL IA1 Question Bank

1. Explain the classification of Cybercrimes with examples.


Ans: Cybercrimes can be broadly classified into several categories based on the nature of the
crime, the target, and the methods used.
1. Crimes Against Individuals: These crimes are targeted directly at individuals, often
involving harassment, identity theft, or personal data breaches.
 Identity Theft: Stealing someone's personal information to commit fraud. For
example, a hacker stealing someone’s credit card information to make unauthorized
purchases.
 Cyberstalking: Using the internet to stalk or harass someone. This could include
sending threatening emails or spreading false information online.
 Phishing: Deceiving individuals into providing sensitive information, such as
passwords or banking details, by pretending to be a trustworthy entity.
2. Crimes Against Property: These crimes involve the theft or destruction of digital assets,
including intellectual property, financial information, or other valuable data.
 Hacking: Unauthorized access to a computer system to steal or manipulate data. For
example, a hacker breaking into a company's database to steal trade secrets.
 Ransomware: A type of malware that encrypts a victim's data and demands payment
(ransom) to restore access.
 Intellectual Property Theft: Stealing copyrighted material, such as software,
movies, or music, and distributing it illegally.
3. Crimes Against Organizations: These crimes target organizations, including businesses,
governmental bodies, or institutions, often for financial gain, competitive advantage, or
sabotage.
 Corporate Espionage: Stealing confidential business information, such as trade
secrets, to benefit a competitor.
 Denial of Service (DoS) Attacks: Flooding a company’s server with traffic to make it
unavailable to users.
 Data Breach: Unauthorized access to an organization's data, often involving the theft
of sensitive customer or employee information.
4. Crimes Against the Government: These are attacks against government systems or
networks, often with political motives or to disrupt government operations.
 Cyberterrorism: Attacks intended to cause widespread disruption, fear, or damage,
often to advance a political agenda.
 Espionage: Stealing state secrets or confidential government information, often to
benefit another nation.
 Hacktivism: Cyberattacks carried out as a form of protest or to promote a political
agenda.
5. Crimes Against Society: These crimes affect society at large and are often aimed at
causing widespread harm or panic.
 Child Pornography: Sharing or distributing child pornography through the internet
is a severe crime that affects society deeply.
 Spreading Misinformation: Using social media and other platforms to spread false
information that can cause public unrest or harm.
 Cyberwarfare: State-sponsored attacks against another nation's information systems
to damage, disrupt, or manipulate them.

2. What is the Importance of IT ACT? Explain the Objectives and the features of
the IT ACT 2000.
Ans: The Information Technology (IT) Act, 2000, is a pivotal piece of legislation in India that
governs electronic commerce, cybersecurity, and cybercrime. Here’s why it is important:
1. Legal Recognition of Electronic Transactions: The IT Act provides legal recognition to
electronic records and digital signatures, enabling online contracts and transactions. This is
crucial for the growth of e-commerce and digital business in India.
2. Cybercrime Prevention and Punishment: The Act defines and penalizes various
cybercrimes, including hacking, identity theft, and cyberstalking. It provides a legal
framework to prosecute offenders and protect individuals and organizations from cyber
threats.
3. Data Protection and Privacy: The IT Act includes provisions for the protection of
sensitive personal data. It mandates reasonable security practices and procedures for handling
such data, contributing to privacy and security in the digital realm.
4. E-Governance: The Act facilitates e-governance by allowing government agencies to
conduct official business electronically, thus improving efficiency, transparency, and
accessibility of government services.
5. Regulation of Digital Signatures: It establishes the legality of digital signatures, ensuring
secure and authentic electronic communication and transactions, which is vital for business
and government operations.
6. Promoting Confidence in Digital Economy: By providing a legal framework for
electronic activities, the IT Act helps build trust and confidence in digital transactions,
fostering the growth of the digital economy.
7. Addressing Emerging Cyber Threats: The Act is periodically updated to address new
and emerging cyber threats, ensuring that the legal framework remains relevant and effective
in the face of evolving technologies.
3. Case studies on Identity theft, email phishing, DDoS attack.
Ans: Identity Theft: Identity theft occurs when a criminal steals someone’s personal
information, such as Social Security numbers, credit card details, or bank account
information, to commit fraud or other crimes. The stolen information is often used to make
unauthorized purchases, open new accounts, or commit other financial crimes in the victim’s
name, leading to severe personal and financial consequences for the victim.
Email Phishing: Email phishing is a type of cyberattack where attackers send fraudulent
emails that appear to be from reputable sources, such as banks or well-known companies. The
email typically contains a link or attachment designed to trick the recipient into providing
sensitive information, like passwords or credit card numbers, or downloading malware onto
their device. Phishing is one of the most common and effective ways for cybercriminals to
steal information.
DDoS Attack (Distributed Denial of Service): A DDoS attack involves overwhelming a
target’s online service or network with a flood of internet traffic from multiple sources,
rendering it inaccessible to legitimate users. Attackers often use botnets—a network of
compromised computers—to generate massive amounts of traffic, causing significant
disruption to websites, online services, or networks. DDoS attacks are commonly used to
disrupt business operations, extort money, or make a political statement.

4. Explain How criminal plan the attack.


Ans: Cybercriminals typically plan an attack in the following stages:
1. Reconnaissance: They gather information about the target, such as system details,
vulnerabilities, and user behaviours, using both passive (public sources) and active
(scanning) methods.
2. Scanning and Enumeration: Next, they identify specific vulnerabilities in the
target’s systems through tools that scan for open ports, services, and weaknesses.
3. Gaining Access: Using the identified vulnerabilities, criminals gain unauthorized
access to the system, often through exploitation, social engineering (like phishing), or
brute force attacks.
4. Maintaining Access: They install backdoors or rootkits to maintain long-term access,
allowing them to return to the system without detection.
5. Covering Tracks: To avoid detection, criminals erase logs, delete malicious tools,
and disguise their activities to remove any evidence of the breach.
6. Exfiltration and Exploitation: Finally, they steal data, deploy ransomware, or
disrupt services to achieve their goal, whether it's financial gain, data theft, or
sabotage.
Each step is carefully planned to maximize success and minimize the risk of getting caught.
5. What is social engineering.
Ans: Social engineering is the art of manipulating people so they give up confidential
information. The types of information these criminals are seeking can vary. But when
individuals are targeted, the criminals are usually trying to trick you into giving them your
passwords or bank information, or access your computer to secretly install malicious
software – that will give them access to your passwords and bank information as well as
giving them control over your computer.
Criminals use social engineering tactics because it is usually easier to exploit your natural
inclination to trust than it is to discover ways to hack your software. For example, it is much
easier to fool someone into giving you their password than it is for you to try hacking their
password (unless the password is really weak).
Security is all about knowing who and what to trust. It is important to know when and when
not to take a person at their word and when the person you are communicating with is who
they say they are. The same is true of online interactions and website usage: when do you
trust that the website you are using is legitimate or is safe to provide your information?

6. What is Cyber stalking?


Ans: Cyberstalking is the use of the internet or digital tools to repeatedly harass, threaten, or
stalk someone. It includes sending unwanted messages, hacking accounts, or spreading lies
online. The goal is often to scare or distress the victim. Cyberstalkers often use social media,
email, or other online platforms. Cyberstalking involves using digital platforms to intimidate
or control someone by continuously monitoring or harassing them online, they can track the
victim’s online activity.
Cyberstalkers may impersonate their victims, post false information, or make threatening
comments. They often create multiple accounts to avoid detection and can track the victim’s
location or personal activities using GPS or spyware. Cyberstalking can result into offline
threats and is a serious situation of destruction of privacy which can often requires legal
action to stop. Cyberstalking is harmful and illegal.

7. What are Botnets? How it is exploiting attacker to cause cyber-attack?


Ans:
A botnet is a network of computers, devices, or servers that have been infected with malware
and are controlled remotely by a hacker, known as a botmaster. These compromised devices,
called "bots" or "zombies," are used to perform various malicious activities, such as
launching distributed denial-of-service (DDoS) attacks, sending spam, stealing data, or
mining cryptocurrency, all without the owners' knowledge. Botnets can consist of thousands
or even millions of devices, making them a powerful tool for cybercriminals to conduct large-
scale attacks and fraudulent activities.
8. Attack vector
Ans:
 An attack vector is a path or means by which a hacker (or cracker) can gain access to
a computer or network server in order to deliver a payload or malicious outcome.
 Attack vectors enable hackers to exploit system vulnerabilities, including the human
element.
 Attack vectors include viruses, attachments, Web pages, pop-up windows, instant
messages, chat rooms, and deception.
 All of these methods involve programming (or, in a few cases, hardware), except
deception, in which a human operator is fooled into removing or weakening system
defences.
 To some extent, firewalls and anti-virus software can block attack vectors.
 But no protection method is totally attack-proof.
 A defence method that is effective today may not remain so for long, because hackers
are constantly updating attack vectors, and seeking new ones, in their quest to gain
unauthorized access to computers and servers.

9. What are the Mobile vulnerabilities?


Ans:
 Mobile devices often do not have passwords enabled.
 Two-factor authentication is not always used when conducting sensitive transactions
on mobile devices.
 Wireless transmissions are not always encrypted
 Mobile devices may contain malware. • Mobile devices often do not use security
software.
 Operating systems may be out-of-date.
 Software on mobile devices may be out-of-date
 Mobile devices often do not limit Internet connections.
 Mobile devices may have unauthorized modifications.
 An unsecured WIFI network could let an attacker access personal information from a
device, putting users at risk for data and identity theft

10. What are Illegal activities observed in Cybercafé?


Ans:
Illegal activities observed in cybercafés can vary, but some common ones include:
1. Hacking and Unauthorized Access: Using cybercafé computers to attempt
unauthorized access to networks, systems, or accounts, including hacking into
personal or corporate networks.
2. Piracy and Copyright Infringement: Downloading, sharing, or distributing pirated
software, movies, music, and other copyrighted materials without authorization.
3. Fraud and Identity Theft: Engaging in fraudulent activities such as phishing,
scamming, or stealing personal information to commit identity theft or financial fraud.
4. Cyberstalking and Harassment: Using cybercafé computers to stalk, harass, or
threaten individuals online, including through social media or email.
5. Spamming and Phishing: Sending large volumes of unsolicited emails (spam) or
phishing emails designed to deceive recipients into revealing sensitive information.
6. Viewing and Distributing Illegal Content: Accessing or distributing illegal content,
such as child pornography or other banned materials.
7. Cyberbullying: Engaging in or facilitating cyberbullying by posting harmful, false, or
malicious content about others.
8. Online Gambling: Participating in or facilitating illegal online gambling activities,
especially in regions where online gambling is prohibited.
9. Money Laundering: Using cybercafé networks to conduct financial transactions for
money laundering purposes, often involving cryptocurrency.
10. Terrorism-Related Activities: Using cybercafé resources to plan, coordinate, or
communicate terrorist activities, including the use of encrypted communication
channels.

11. What are the safety and Security measures while using computer in cybercafé?
Ans:
When using a computer in a cybercafé, it is important to follow safety and security measures
to protect your personal information and privacy. Here are some key precautions:
1. Avoid Sensitive Transactions: Avoid accessing online banking, shopping, or entering
personal information such as passwords or credit card details on a public computer.
2. Use Incognito or Private Browsing: If you must use a browser, enable incognito or
private mode to prevent the browser from storing your browsing history, cookies, or
temporary files.
3. Log Out of All Accounts: Always log out of any accounts you sign into, such as
email or social media, before leaving the computer.
4. Clear Browsing Data: Manually clear the browsing history, cookies, cache, and
autofill data before you leave.
5. Disable Password Saving: Ensure that the browser does not save your passwords or
credentials.
6. Use a Virtual Private Network (VPN): If possible, use a VPN to encrypt your
internet connection and protect your data from being intercepted by others on the
same network.
7. Beware of Shoulder Surfing: Be aware of your surroundings to ensure no one is
watching you enter sensitive information.
8. Check for Malware or Keyloggers: If you can, scan the computer for malware or
keyloggers before using it. Some cybercafés might have security software installed,
but it’s not always reliable.
9. Avoid Downloading Files: Refrain from downloading or installing software, as it
may be infected with malware.
10. Use Two-Factor Authentication (2FA): If possible, enable 2FA on your accounts.
Even if someone gains access to your password, they won’t be able to log in without
the second authentication step.
11. Bring Your Own Devices: If possible, use your own device (like a smartphone or
tablet) to access sensitive accounts rather than using the public computers.
12. Check the Network Security: If using Wi-Fi, ensure it is secured with WPA2 or
WPA3 encryption. Avoid using unsecured or public Wi-Fi networks.

12. Explain various security Challenges posed by mobile devices.


Ans: Here are some key security challenges associated with mobile devices:
1. Loss and Theft: Mobile devices are small and easily lost or stolen, which can lead to
unauthorized access to sensitive data, accounts, and applications stored on the device.
2. Malware and Viruses: Mobile devices are vulnerable to malware, viruses, and
spyware, often introduced through malicious apps, phishing links, or compromised
websites.
3. Unsecured Wi-Fi Networks: Mobile devices frequently connect to public Wi-Fi
networks, which may be unencrypted or unsecured, making them susceptible to man-
in-the-middle attacks, where hackers intercept data transmitted between the device
and the network.
4. Data Leakage: Apps may access and share personal or sensitive information without
user consent, leading to unintentional data leakage. This can include contact lists,
location data, or even sensitive business information.
5. Phishing and Social Engineering: Mobile users are often targeted with phishing
scams via SMS (smishing), email, or messaging apps, tricking them into revealing
sensitive information or installing malicious software.
6. Insecure Apps: Many apps may have security flaws or lack proper encryption,
making it easier for attackers to exploit vulnerabilities and gain unauthorized access to
data.
7. Inconsistent Updates: Mobile devices and apps may not always receive timely
security updates, leaving them vulnerable to known exploits and attacks.
8. BYOD (Bring Your Own Device) Risks: In workplace environments, employees
using their personal devices for work (BYOD) can create security risks, as personal
devices may not have the same level of security controls as corporate devices.
9. Physical Security Risks: Unlike desktop computers, mobile devices can be easily
misplaced or left unattended in public places, exposing them to tampering or
unauthorized access.
10. Weak Authentication: Many users rely on weak passwords, PINs, or biometrics that
can be easily compromised, making it easier for attackers to gain access to the device
and its contents.
11. Bluetooth Vulnerabilities: Mobile devices often have Bluetooth enabled, which can
be exploited by attackers to connect to the device and access data or install malware
without the user's knowledge.
12. Privacy Concerns: Mobile devices collect a vast amount of personal data, including
location, contacts, and browsing history. If not properly secured, this data can be
accessed or exploited by malicious actors or intrusive apps.

13. Global perspective of Cybercrime.


Ans:

14. What is Cloud computing?


Ans:

 Cloud computing is a model for enabling convenient, on-demand network access to a


shared pool of configurable computing resources (e.g., networks, servers, storage,
applications, and services.
 It can be rapidly provisioned and released with minimal management effort. •It
provides high level abstraction of computation and storage model.
 Cloud computing provides shared services as opposed to local servers or storage
resources • Enables access to information from most web-enabled hardware
 Allows for cost savings – reduced facility, hardware/software investments, support •It
has some essential characteristics, service models, and deployment models.

15. What is cybercrime? Who are cybercriminals? Explain


Ans:
Cybercrime refers to criminal activities that involve the use of computers, digital devices, or
networks. These crimes can target individuals, organizations, or governments, and they often
involve the theft of data, money, or personal information, as well as the disruption of
services. Cybercrime can range from simple attacks, such as phishing or identity theft, to
more sophisticated operations, including hacking, ransomware, and cyber-espionage.
Cybercriminals are individuals or groups who engage in cybercrime for various motives,
including financial gain, political objectives, personal grudges, or simply the challenge of
breaking into systems. They can range from lone hackers to organized crime syndicates, and
even state-sponsored groups.

You might also like