You are on page 1of 2

Crim.

Elective 2 (cybercrime)
1-3. Classification of Cyber Crimes
4-9. Crimes against their property of an individual
10-15. Crimes against individuals
16-17. Crimes against Organization
18-24. Crimes against Society at large
25-33. Give me the Digital Crimes
34-38. Havens of Computer Crimes
39-43. Computer as a tool for committing Crimes
44-45. Two types of Computer Network Attacks
46-48. Three major types of internet securities fraud
49-50. Examples of Scam
51-61. Mode and manner of committing Cybercrimes.
62-65. Existing computer Fraud Investigating Bodies.
66. It focuses on intercepting data such as passwords, user names, e-mail messages, and even secret data
using sniffing software.
67. An electronic machine, operating under the control of instructions stored in its own memory that can
accept data (input) manipulate the data according to specified rules (process, product results (output) and
store the results for future use.
68-74. Most important areas involving Internet crime.
75. This is an investment schemes in which investors are promised abnormally high profits on their
investments.
76. This is a global array of computers connected by a high speed reliable network.
77. It attempts to cause harm to computer systems by explaining system faults and vulnerabilities.
78. It is one of the most lucrative business that are growing today in cyber space.
79. Means as deliberately destroying or damaging property of another.
80. An act of imputing any person with intent to lower the person in the estimation of the right-thinking
members of society generally or to cause him to be shunned or avoided or to expose him to hatred,
contempt or ridicule.
81. It includes the hosting of web site containing these prohibited materials.
82. This is done by gaining access to the login ID and the password.
83. This term is derived from the term hi jacking.
84. Programs that attack themselves to a computer or a file and then circulate themselves to other files
and to other computers on a network.
85. This offense, the hacker gains access and control over the website of another.
86. It involves following a person’s movement across the internet by posting messages on the bulletin
boards frequented by the victim, entering the chat-rooms frequented by the victim, constantly bombarding
the victims with emails.
87. Any lawful act by which the owner is deprived completely or partially of his rights.
88. Occurs when a person uses the internet to steal someone’s identity and/or impersonate them to open a
new credit card account or conduct some financial transactions.
88. This means as an unauthorized programme, which passively gains control over another’s system by
representing itself as an authorized programme.
89. It is a program created to do something only when a certain event occurs.
90. It is an act of harassing through e-mails.
91-95. Explain briefly what is hacking.
96-100. What is unauthorized access?

You might also like