Page 146 - DCAP306_DCAP511_E-COMMERCE_AND_E-BUSINESS
P. 146

Unit 11: Cyber Security and Crime



                    (b)  Virus is hidden and propagates by infecting a copy of itself into another program.
                    (c)  Worm is part of a program whereas a virus is a complete program in itself.
                    (d)  IP Spoofing is used by intruders to gain unauthorized access to computers.

                    (e)  CERT is an organization which provides incident response services to victims of cyber attack.
                    (f)  CERT-In has the power to give directions to the service providers, intermediaries, and data
                        centers.
               2.   Fill in the blanks:
                    (a)  ____________ is a forum that was set up in 2001 by high power delegations from both US and
                       India.
                    (b)  ____________ attack is a type of denial of service attack in which the offenders are more in
                       number and widespread.
                    (c)  ___________ is a type of attack that involves modifying raw data prior to the computer
                       processing and then changing it back to the original form after the processing is completed.
                    (d)  ____________ is a type of program that is created to do something only when a certain event
                       occurs.

                    (e)  CERT-In was started by the ____________ in 2004.
               3.   Select a suitable choice for every question:
                    (a) Which of the following crime can be committed against an individual’s property?
                        (i)   Cyber stalking
                       (ii)  Defamation
                       (iii)  Computer vandalism
                       (iv)  Forgery
                    (b) Which of the following offence is so small that it would normally go unnoticed?

                        (i)   Salami attack
                       (ii)  Denial of service
                       (iii)  Internet time theft
                       (iv)  Hacking
                    (c) Software piracy is an example of which of the following crime?
                        (i)   Intellectual property crime

                       (ii)  Logic bomb
                       (iii)  Data diddling
                       (iv)  IP spoofing
                    (d) Which of the following crime causes the mail servers to crash?
                        (i)   Hacking
                       (ii)  E-mail bombing
                       (iii)  Logic bomb

                       (iv)  Online gambling
                    (e) Which of the following is responsible for overseeing administration of the Information
                       Technology Amendment Act of 2008?
                        (i)   Indo-US Cyber Security Forum (IUSCSF)



                                    LOVELY PROFESSIONAL UNIVERSITY                          139
   141   142   143   144   145   146   147   148   149   150   151