Professional Documents
Culture Documents
Cyber Security (Assignment 2)
Cyber Security (Assignment 2)
1. https://www.techopedia.com/definition/2387/cybercrime
2. http://www.lawyersclubindia.com/articles/Classification-Of-CyberCrimes--1484.asp
3. https://www.faronics.com/news/blog/7-types-of-cyber-criminals
4. Left
5. https://www.incapsula.com/web-application-security/social-engineering-attack.html
6. https://searchsecurity.techtarget.com/definition/cyberstalking
https://nordvpn.com/blog/cyberstalking/ https://www.quora.com/Is-cyber-stalking-illegal-in-India
7. https://www.pandasecurity.com/mediacenter/security/what-is-a-botnet/
8. https://www.bitsight.com/blog/attack-vectors-types-of-security-breaches
9. Left
10. https://www.kaspersky.co.in/resource-center/threats/top-seven-mobile-security-threats-smart-
phones-tablets-and-mobile-internet-devices-what-the-future-has-in-store
11. https://auth0.com/blog/ten-mobile-security-threats-and-what-you-can-do-to-fight-back/
12. Left
13. https://hackercombat.com/the-different-phases-of-a-cyber-attack/
14. Left
15. https://password-managers.bestreviews.net/the-different-types-of-password-cracking-
techniques/
16. https://itstillworks.com/use-keyloggers-cyber-crime-2827.html
17. https://www.pandasecurity.com/mediacenter/malware/worms-vs-viruses-whats-difference/
18. https://www.techopedia.com/definition/1678/virus-hoax
19. Left
20. https://techdifferences.com/difference-between-steganography-and-cryptography.html
https://goo.gl/images/soqvcZ
https://goo.gl/images/bhtFVm
https://images.app.goo.gl/9uccXD83KAeciYe8A
https://searchsecurity.techtarget.com/definition/back-door
https://www.google.com/imgres?imgurl=https%3A%2F%2Fwww.researchgate.net%2Fpublication%2F31
1519160%2Ffigure%2Ftbl1%2FAS%3A667625281552388%401536185679488%2FCryptography-vs-
Steganography.png&imgrefurl=https%3A%2F%2Fwww.researchgate.net%2Ffigure%2FCryptography-vs-
Steganography_tbl1_311519160&tbnid=5T9NrAtWPZqfXM&vet=1&docid=Tfi8B1NH5nlFwM&w=850&h
=377&source=sh%2Fx%2Fim
https://searchsecurity.techtarget.com/definition/Trojan-horse
https://itstillworks.com/use-keyloggers-cyber-crime-2827.html
https://www.google.com/imgres?imgurl=https%3A%2F%2Fai2-s2-
public.s3.amazonaws.com%2Ffigures%2F2017-08-
08%2Fe77bb2f5cd9c7065e762e1f3eff17fb115be7062%2F2-Table1-
1.png&imgrefurl=https%3A%2F%2Fwww.semanticscholar.org%2Fpaper%2FA-review-on-steganography-
and-cryptography-Mishra-
Bhanodiya%2Fe77bb2f5cd9c7065e762e1f3eff17fb115be7062&tbnid=63fZOUR-
YhQVJM&vet=1&docid=hiH5wBbPNpVeuM&w=704&h=506&source=sh%2Fx%2Fim