Cile
Cile
SET1
11) i)Discuss the major cyber crimes that are happening frequently in
cyberspace.
ii)List the preventive measures that can be taken against those Cyber attacks
14) What measures can individuals take to protect themselves from online
stalking?
2. Credential-Based Attacks
These attacks focus on stealing or guessing user credentials to access systems.
a) Brute Force Attacks
• Attackers use automated tools to try multiple password combinations.
• Dictionary attacks use common passwords to speed up the process.
• Example: Using leaked password lists from data breaches.
b) Credential Stuffing
• Attackers use previously stolen usernames and passwords to log into
multiple accounts.
• Example: If a user reuses the same password across platforms, a breach
on one can compromise others.
c) Keylogging
• Malicious software records keystrokes to steal login credentials.
• Example: Hidden keyloggers installed through malware-infected
downloads.
4. Network-Based Attacks
Attackers intercept or manipulate network traffic to gain access.
a) Man-in-the-Middle (MITM) Attacks
• Attackers secretly intercept communication between two parties.
• Example: Capturing login credentials over unsecured Wi-Fi networks.
b) Session Hijacking
• Attackers steal a user’s session token to gain unauthorized access.
• Example: Using stolen cookies to bypass authentication.
c) DNS Spoofing
• Attackers redirect victims to fake websites by altering DNS records.
• Example: Users believe they are logging into a bank website but are
entering credentials into a fraudulent site.
SET 2
11) Classify and explain various types of cyber crimes and provide
examples for each category and discuss the evolving nature of cyber
threats.
12) i)What is cyber crime? Discuss the motivation and techniques used by
the cyber criminals.
ii)Define Social Engineering attack. List the tools and techniques used in
Social Engineering attacks.
13) Identify the impact of cyber security against cyber crime in the
corporate world.
15) Explain the concept of mail bombing. Discuss the motives behind mail
bombing and its impact on individuals, organizations and network systems
16) Analyze the role of social engineering in cyber crimes. Discuss how
attackers exploit human psychology to manipulate individuals and gain
unauthorized access to systems.