Cs 2maeks
Cs 2maeks
Answer:
A zombie is a computer that has been compromised by a hacker or malware and is used to
perform malicious tasks under remote direction, such as participating in Distributed Denial of
Service (DDoS) attacks.
Diagram: Typically involves a flowchart showing a hacker, Command-and-Control (C&C)
server, the compromised zombie computer, and the victim receiving the attack.
Answer:
Cyber Squatting: The practice of registering domain names similar to popular brands or
trademarks with the intent to sell them for profit or exploit them.
Cyber Space: The virtual environment in which communication over computer networks
occurs, including the internet, social media, and online platforms.
Answer:
Answer:
Answer:
Answer:
Answer:
Answer:
Answer:
(j) Mention the consequences of not addressing the weakness in the information
technology act.
Answer:
Answer:
Cybercrime refers to illegal activities conducted using computers, networks, or the internet. It
includes crimes such as hacking, identity theft, phishing, and spreading malware, all aimed at
exploiting individuals or organizations.
Answer:
Cybersecurity is essential to protect sensitive data, prevent unauthorized access, and ensure the
integrity, confidentiality, and availability of information systems. It safeguards individuals and
organizations from financial losses, reputational damage, and legal consequences.
Answer:
Active Attacks: Modify or disrupt data or systems, such as hacking or injecting malware.
Passive Attacks: Monitor or intercept data without affecting the system, such as
eavesdropping or traffic analysis.
Answer:
Social engineering is a technique used by cybercriminals to manipulate individuals into revealing
confidential information, such as passwords or financial details, often by exploiting trust or fear.
Answer:
Mobile devices store sensitive data and are vulnerable to threats like malware, phishing, and theft.
Protecting them ensures data security, prevents unauthorized access, and safeguards personal and
organizational information.
Answer:
Mobility types refer to ways devices and users can access resources:
Answer:
Keyloggers record keystrokes entered on a device, allowing attackers to steal passwords, PINs, and
other sensitive information, leading to identity theft, unauthorized access, or financial fraud.
Answer:
Steganography: Hides information within other files (e.g., images) without encryption.
Cryptography: Encrypts information so that it can only be accessed with a decryption key.
Answer:
Data privacy involves ensuring that personal and sensitive information is collected, stored, and used
securely, with access limited to authorized individuals, preventing unauthorized exposure or
breaches.
Answer: