You are on page 1of 2

CYBER SECURITY (ASSIGNMENT 2)

1. https://www.techopedia.com/definition/2387/cybercrime

2. http://www.lawyersclubindia.com/articles/Classification-Of-CyberCrimes--1484.asp

3. https://www.faronics.com/news/blog/7-types-of-cyber-criminals

4. Left

5. https://www.incapsula.com/web-application-security/social-engineering-attack.html

6. https://searchsecurity.techtarget.com/definition/cyberstalking
https://nordvpn.com/blog/cyberstalking/ https://www.quora.com/Is-cyber-stalking-illegal-in-India

7. https://www.pandasecurity.com/mediacenter/security/what-is-a-botnet/

8. https://www.bitsight.com/blog/attack-vectors-types-of-security-breaches

9. Left

10. https://www.kaspersky.co.in/resource-center/threats/top-seven-mobile-security-threats-smart-
phones-tablets-and-mobile-internet-devices-what-the-future-has-in-store

11. https://auth0.com/blog/ten-mobile-security-threats-and-what-you-can-do-to-fight-back/

12. Left

13. https://hackercombat.com/the-different-phases-of-a-cyber-attack/

14. Left

15. https://password-managers.bestreviews.net/the-different-types-of-password-cracking-
techniques/

16. https://itstillworks.com/use-keyloggers-cyber-crime-2827.html

17. https://www.pandasecurity.com/mediacenter/malware/worms-vs-viruses-whats-difference/

18. https://www.techopedia.com/definition/1678/virus-hoax

19. Left

20. https://techdifferences.com/difference-between-steganography-and-cryptography.html
https://goo.gl/images/soqvcZ

https://goo.gl/images/bhtFVm

https://images.app.goo.gl/9uccXD83KAeciYe8A

https://searchsecurity.techtarget.com/definition/back-door

https://www.google.com/imgres?imgurl=https%3A%2F%2Fwww.researchgate.net%2Fpublication%2F31
1519160%2Ffigure%2Ftbl1%2FAS%3A667625281552388%401536185679488%2FCryptography-vs-
Steganography.png&imgrefurl=https%3A%2F%2Fwww.researchgate.net%2Ffigure%2FCryptography-vs-
Steganography_tbl1_311519160&tbnid=5T9NrAtWPZqfXM&vet=1&docid=Tfi8B1NH5nlFwM&w=850&h
=377&source=sh%2Fx%2Fim

https://searchsecurity.techtarget.com/definition/Trojan-horse

https://itstillworks.com/use-keyloggers-cyber-crime-2827.html

https://www.google.com/imgres?imgurl=https%3A%2F%2Fai2-s2-
public.s3.amazonaws.com%2Ffigures%2F2017-08-
08%2Fe77bb2f5cd9c7065e762e1f3eff17fb115be7062%2F2-Table1-
1.png&imgrefurl=https%3A%2F%2Fwww.semanticscholar.org%2Fpaper%2FA-review-on-steganography-
and-cryptography-Mishra-
Bhanodiya%2Fe77bb2f5cd9c7065e762e1f3eff17fb115be7062&tbnid=63fZOUR-
YhQVJM&vet=1&docid=hiH5wBbPNpVeuM&w=704&h=506&source=sh%2Fx%2Fim

You might also like