സൈബർ സെക്യൂരിറ്റിയുമായി ബന്ധപ്പെട്ട പ്രധാന ത്രെറ്റുകൾ, കമ്പ്യൂട്ടർ വൈറസ്, മാൽവെയർ, ട്രോജൻ ഹോഴ്സ് എന്നിവയുമായി ബന്ധപ്പെട്ട ചോദ്യങ്ങളാണ് ഇന്നത്തെ പാഠത്തിൽ ഉൾപ്പെടുത്തിയിരിക്കുന്നത്
(To be Continued...)
- Unauthorized copying, reproduction, use or manufactute of product is called
- Small program that monitor and retrieve the user name or password of network users during their login
- Practice of using internet to harass or threaten some one is called
- How to avoid Cyber Stalking
- Hacking of websites by password cracking and alteration of contents for fulfilling political objectives or for money is called
- Unauthorized changing of data before or during their input to a computer is called
- Procurement of identifying information without permission and using it fraudulently to obtain goods and services is called
- Unauthorized access of information system is called
- One who does hacking is called
- Hacking comes under which section of IT Act 2000
- Hackers who hacking system for good reason
- Hackers who hacking system for malicious reasons
- Hackers who hacking system sometimes for good reason and sometimes for malicious reasons
- Unauthorized use of internet hours paid for by another person is known as
- A computer connects to the internet that has been compromised by a hacker, computer virus or Trojan hourse and can be used for malicious tasks is called
- Intellectual property rights refers to
- Intellectual property right violations include
- Theme of World Intellectual property day 2017
- Position of India in Intellectual property index 2017
- An attack meant to shut down a machine or network, making it inaccessible to its intended users
- In cyber law, DOS stands for
- Examples of Debial of service
- The person who defined the term Computer Virus
- A computer program that can damage the operations of a computer system
- The term VIRUS stands for
- First computer virus
- First computer virus for MS DOS
- First computer virus affected on ARPANET (ancient form of internet)
- Creeper was developed by
- First micro computer virus
- First virus affected personal computer
- First mobile phone virus
- Virus program writing programmers
- Examples for computer viruses
- Recently happened cyber attack across 150 countries in the world
- Wanna Cry spread through
- First country in which Wanna Cry attack reported for the first time
- Wanna Cry is an example of
- Program that make the user unable to access the system and demanding some form of payments to unlock
- Operating system being attacked by Wanna Cry
- Ransomware that affect different countries including India recently
- Examples of Ransomwares
- Ad click malware that affect Google play applications recently
- Computer software which is used to prevent, delete and detect the presence of Virus in Computer
- Examples of antivirus programs
- Subclass of computer virus that can replicate itself through network connections to any machine without human intervention
- Malware which appears to be useful applications but allow hacker to take control of the system
- Facts about Trojan horse
- Trojans which are activated on certain time are called
- Peace of code inserted into a software that will execute its malicious function when the specified conditions are met
- Program that automatically renders advertisements in order to generate revenue for its author
- Software that can record every keystroke we make using keyboard
(To be Continued...)
No comments:
Post a Comment