Cyber Security - 2 Marks Questions (All Year Papers, Unit-wise)
UNIT 1: Cybercrime & Information Security
1. What is the difference between security and privacy?
-> Security protects data from threats; privacy ensures user control over data.
2. What is meant by information security?
-> It is the protection of information from unauthorized access or alterations.
3. How does cybercrime differ from traditional crime?
-> Cybercrime is technology-driven and borderless, unlike traditional crimes.
4. Define Cyber Crime.
-> Any illegal activity using computers or networks is cybercrime.
5. Why is cyber needed?
-> To protect sensitive data, maintain privacy, and prevent online threats.
6. What is Botnet?
-> A group of infected computers controlled remotely to launch attacks.
7. What is virus and worms?
-> Virus needs a host to replicate; worm spreads independently.
8. What is keylogger and how does it capture keystrokes?
-> It records user keystrokes using malicious software to steal data.
9. What is a keylogger?
-> Malicious software that logs what a user types on their keyboard.
10. Who are cybercriminals (in terms of demographics and skills)?
-> Vary from teenagers to professionals; skilled in coding, hacking, etc.
UNIT 2: Cyber Law & Data Privacy
1. What is the scope of cyber law?
-> It governs digital activities, e-commerce, online crimes, and data protection.
2. What is the importance of data privacy?
-> Protects user rights, builds trust, and prevents data misuse.
3. How are financial institutions adapting to mobile credit card fraud?
-> By using encryption, biometric verification, and fraud detection tools.
4. How do registry settings differ in Android and iOS?
-> Android allows deeper file system access; iOS is more restrictive and sandboxed.
5. What is a patent and its criteria in India?
-> A legal right over inventions; criteria: novelty, inventiveness, and industrial use.
UNIT 3: Attacks & Tools (Phishing, DoS, Malware, Keyloggers)
1. Define phishing and give a common example.
-> Fraud to steal credentials. Example: Fake bank email asking for login info.
2. What is digital evidence?
-> Any electronic data that can be used in court to prove cyber activity.
3. What is Authentication and Authorization?
-> Authentication verifies identity; Authorization grants access rights.
4. What is Identity Theft?
-> Stealing personal info to impersonate someone for fraud.
UNIT 4: Digital Forensics & Investigation
1. What is the 'chain of custody' in forensics?
-> A record of evidence handling from collection to presentation in court.
2. What is digital forensics and how is it different from traditional forensics?
-> Digital forensics deals with electronic data; traditional is physical evidence.
UNIT 5: Cyber Security Policies, IPR, and Legal Frameworks
1. What is the difference between copyright and patent?
-> Copyright protects expression; patent protects inventions.
2. What is a patent and what are its criteria in India?
-> Patent protects inventions; must be novel, non-obvious, and useful.
3. What is Cyber Law?
-> A legal framework to deal with crimes and transactions in cyberspace.