Professional Documents
Culture Documents
Ans: 1. Hacking: Unauthorized access to computer systems or networks to gain control, steal
data, disrupt operations, or carry out malicious activities.
2. Malware: Malicious software, including viruses, worms, trojans, ransomware, and spyware,
designed to infect computers, steal data, or disrupt operations.
3. Identity theft: Stealing personal information to assume another person's identity and carry out
fraudulent activities, such as making unauthorized transactions or applying for credit.
4. Online fraud: Engaging in various fraudulent schemes, such as online scams, fake auctions,
investment fraud, or pyramid schemes, to deceive individuals or organizations for financial gain.
5. Cyberstalking and harassment: Using electronic communication channels to stalk, harass,
intimidate, or threaten individuals, often through social media platforms, emails, or messaging
applications.
6. Online piracy: Illegally sharing copyrighted content, such as movies, music, software, or
books, through file-sharing networks or streaming platforms.
7. Cyberbullying: Using electronic communication to harass, intimidate, or threaten individuals,
particularly targeting minors, often through social media platforms or online messaging.
Q8) What are different types of attack on wireless and mobile networks./ Q18) Explain
attacks on WiFi and its prevention.
Ans:
● SMiShing : Smishing has become common now as smartphones are widely used.
SMiShing uses Short Message Service (SMS) to send fraud text messages or links.
● War driving : War driving is a way used by attackers to find access points wherever they
can be. With the availability of free Wi-Fi connection, they can drive around and obtain a
very huge amount of information over a very short period of time.
● Bluejacking : Bluetooth is a high-speed, short-range wireless technology that allows data
to be exchanged between desktop and mobile computers and other devices.
● Bluesnarfing : When an attacker steals the victim's information from his device, this is
known as bluesnarfing.
● Replay attack : An attacker spies on information being transmitted between a sender and
a recipient in a replay attack.