Module2 Q&A
Module2 Q&A
Kalpitha S
Assistant Professor
RR Institute of Management Studies Page 1
RR Institute of Management Studies
Kalpitha S
Assistant Professor
RR Institute of Management Studies Page 2
RR Institute of Management Studies
Kalpitha S
Assistant Professor
RR Institute of Management Studies Page 3
RR Institute of Management Studies
8. Mobile Device Theft and Hacking: Criminals can steal mobile devices
for resale or hack into them to access personal data, financial information, or
install malware.
9. Cyber Extortion:
• Criminals may threaten to release sensitive or embarrassing
information unless a victim pays a ransom.
• This can involve sextortion (threatening to expose explicit content) or
other forms of extortion.
10. Insider Threats:
Employees or individuals with insider access to computer systems and data
may misuse their privileges to steal or manipulate information.
11. Cryptojacking: Cybercriminals use a victim's computer or mobile device
to mine cryptocurrency without their consent, which can slow down the
device and increase energy consumption.
1. Cyberbullying:
• Both women and children can be victims of cyberbullying, which
includes online harassment, threats, and intimidation.
• Perpetrators may use social media, messaging apps, or other
digital platforms to target their victims.
2. Online Harassment:
• This includes sending unsolicited, offensive, or threatening messages,
images, or videos to women or children.
• It can be a form of cyberbullying and may have severe emotional and
psychological effects.
3. Revenge Porn:
• Perpetrators may share explicit or intimate images or videos of women
without their consent, often as an act of revenge.
• This is a violation of privacy and can cause significant harm to
victims.
4. Sexting Exploitation: In cases involving children, sexting can lead to
exploitation when someone coerces or blackmails minors into sharing
Kalpitha S
Assistant Professor
RR Institute of Management Studies Page 4
RR Institute of Management Studies
Identity fraud:
• Identity fraud is common on Internet. Criminals have a few options when
it comes to stealing your sensitive information.
• They might target you with a phishing attack where they email, call, or
text pretending to be from your bank. Or, they could target you with a cyber
attack to get you to install malware on your devices that steals your logins
and passwords.
Kalpitha S
Assistant Professor
RR Institute of Management Studies Page 5
RR Institute of Management Studies
Kalpitha S
Assistant Professor
RR Institute of Management Studies Page 6
RR Institute of Management Studies
Kalpitha S
Assistant Professor
RR Institute of Management Studies Page 7
RR Institute of Management Studies
Types of Malware
1. Adware: Display ads (sometimes malicious ads) to users as they work on
their computers or browse the web.
2. Viruses: A virus infects a computer and performs a variety of payloads.
It may corrupt files, destroy operating systems, delete or move files, or
deliver a payload at a specific date.
Kalpitha S
Assistant Professor
RR Institute of Management Studies Page 8
RR Institute of Management Studies
Kalpitha S
Assistant Professor
RR Institute of Management Studies Page 9
RR Institute of Management Studies
Types of Ransomware
1. Locker ransomware
• It is a type of malware that blocks standard computer functions from
being accessed until the payment to the hackers is not complete.
• It shows a lock screen that doesn't allow the victim to use the
computer for primary purposes.
2. Crypto ransomware
• This ransomware encrypts the local files and documents on the
computers.
• Once the files are encrypted, finding the decryption key is impossible
unless the ransomware variant is old and the keys are already available
on the internet.
Kalpitha S
Assistant Professor
RR Institute of Management Studies Page 10
RR Institute of Management Studies
3. Scareware
• It is a fake software that claims to have detected a virus or other issue
on your computer and directs you to pay to resolve the problem.
• Some scareware locks the computer, while others flood the screen
with pop-up alerts without damaging files.
10) Explain Zero day and Zero click attacks Zero day
• Software often has security vulnerabilities that hackers can exploit to
cause havoc.
• The term "zero-day" refers to the fact that the vendor or developer has
only just learned of the flaw – which means they have “zero days” to
fix it.
• A zero-day attack takes place when hackers exploit the flaw before
developers have a chance to address it.
• Zero-day attackers can steal data, corrupt files, take control of devices,
install malware or spyware, and more.
• Typical targets for a zero-day exploit include:
1. Government departments.
2. Large enterprises.
3. Individuals with access to valuable business data, such as intellectual
property.
4. Hardware devices, firmware and Internet of Things (IoT).
Kalpitha S
Assistant Professor
RR Institute of Management Studies Page 11
RR Institute of Management Studies
Kalpitha S
Assistant Professor
RR Institute of Management Studies Page 13
RR Institute of Management Studies
Kalpitha S
Assistant Professor
RR Institute of Management Studies Page 14
RR Institute of Management Studies
Mitigation Measures:
1. Strong Security Practices:
Implement robust security measures, such as firewalls, antivirus
software, and intrusion detection and prevention systems, to protect
against cyber threats.
2. Regular Updates and Patching:
Keep software, operating systems, and firmware up to date with the latest
security patches to mitigate vulnerabilities that cyber criminals may
exploit.
3. Employee Education:
Provide cybersecurity awareness and training programs to employees to
educate them about common cyber threats, phishing techniques, and safe
online practices.
4. Multi-factor Authentication (MFA):
Implement MFA wherever possible to add an extra layer of security,
making it harder for cyber criminals to gain unauthorized access to
accounts or systems.
5. Data Encryption:
Encrypt sensitive data, both in transit and at rest, to ensure that even if it
is intercepted or stolen, it remains unreadable and unusable for
unauthorized individuals.
6. Regular Security Audits:
Conduct regular security audits and vulnerability assessments to identify
and address any weaknesses or potential entry points for cyber criminals.
Kalpitha S
Assistant Professor
RR Institute of Management Studies Page 15
RR Institute of Management Studies
Kalpitha S
Assistant Professor
RR Institute of Management Studies Page 16
RR Institute of Management Studies
Kalpitha S
Assistant Professor
RR Institute of Management Studies Page 17
RR Institute of Management Studies
Kalpitha S
Assistant Professor
RR Institute of Management Studies Page 18