MARKS QUESTIONS
1. Give the meaning of Cyber Space?
Cyberspace can be defined as an intricate environment that involves
interactions between people, software, and services. It is maintained by
the worldwide distribution of information and communication
technology devices and networks.
2. What is meant by Cryptography?
Cryptography is the process of hiding or coding information so that only
the person a message was intended for can read it. The art of
cryptography has been used to code messages for thousands of years and
continues to be used in bank cards, computer passwords, and
ecommerce.
3. What do you mean by Encryption and Decryption?
Encryption is the process by which a readable message is converted to
an unreadable form to prevent unauthorized parties from reading it.
Decryption is the process of converting an encrypted message back to
its original (readable) format.
4. What is World Wide Web (WWW)? World Wide Web or ‘www’ is a
collection of webpages which can easily be published on the Internet and
read by millions of its users. In other words, the World Wide Web—
commonly referred to as WWW, W3, or the Web—is a system of
interconnected public webpages accessible through the Internet.
5. Define the terms Network and Network Security.
A network is a group of two or more computers or other electronic
devices that are interconnected for the purpose of exchanging data and
sharing resources. It can be private, such as within a company, and
others which might be open to public access.
Network Security protects your network and data from breaches,
intrusions and other threats. It is involved in organizations, enterprises,
and other types of institutions. It secures the network, as well as
protecting and overseeing operations being done.
6. Write notes on Communication and Web Technology.
Web-based communication is a type of communication that happens
over the internet through Emails, social media, reading an online article
or blog. Web Technology refers to the various tools and techniques that
are utilized in the process of communication between different types of
devices over the Internet using mark-up language. It involves
communication across the web and create, deliver or manage web
content using hypertext markup language (HTML). Web technology can
be classified as follows,
• World Wide Web (WWW)
• Web server
• Web browser
• Web pages
7. What is Communication in Cyber Security?
Effective communication is a crucial component of any cybersecurity
strategy. Clear and consistent communication, collaboration, information
sharing, transparency and accountability, and effective communication
during a cyber-attack are all key components of effective
communication in cybersecurity law.
8. What is information and Communication technology in Cyber Security?
Information and communication technologies (ICT) is defined as a
diverse set of technological tools and resources used to transmit, store,
create, share or exchange information. ICT security measures are
necessary to protect confidential information from unauthorized use,
modification, loss or release.
9. Give four examples for Web Technology.
• Web browser: Browsers request information and then they show
us in the way we can understand. (ex- google chrome)
• Programming languages: computers need a different way to
communicate.(ex- javascript)
• Protocols: The instructions for how to pass information back and
forth between computers and devices. (ex- http)
• Web server: The clients make requests to the servers. The servers
then respond to those requests after gathering the requested
information.
10.Distinguish between Internet and Intranet.
The Internet is a global computer network that allows for information
exchange between devices. An intranet is a private network that is only
accessible to members of an organization.
11.Mention the elements of Internet Infrastructure.
Hardware infrastructure typically includes routers, switches, hubs,
repeaters, gateways, bridges, and modems. Software infrastructure
includes monitoring and management tools and operating systems.
Network services include networking protocols such as TCP, UDP, and
IP addressing.
12.Mention any Four Regulations of cyberspace.
a. Privacy Regulations:
b. Online Content Regulations:
c. E-Commerce Regulations:
d. Cybersecurity Regulations:
14.What do you mean by Cyber Security?
Cyber security is the practice of defending computers, servers, mobile
devices, electronic systems, networks, and data from malicious attacks.
It's also known as information technology security or electronic
information security.
15.Briefly explain any two types of cyber security.
1. Network Security – Focuses on securing computer networks from
unauthorized access, data breaches, and other network-based threats.
It involves technologies such as Firewalls, Intrusion detection
systems (IDS), Virtual private networks (VPNs), and Network
segmentation.
2. Application Security – Concerned with securing software
applications and preventing vulnerabilities that could be exploited by
attackers. It involves secure coding practices, regular software
updates and patches, and application-level firewalls.
16.What is Phishing?
Phishing is a form of social engineering and scam where attackers
deceive people into revealing sensitive information or installing malware
such as ransomware.
17.What is Ransomware?
Ransomware is a type of malware that gets unknowingly installed on a
person’s device through various means such as through phishing scams.
When ransomware infects a device, it prevents individuals from being
able to access the files and data they have stored on their devices until
they have paid a “ransom.”
18.State any two ways of protection from cyber-attacks.
A. Secure your device - Secure your devices by:
• installing anti-virus software
• setting a password, gesture or fingerprint that must be entered to
unlock
B. Trust no one(on emails) –
Remember:
• don't open email from unknown email addresses
• trash attachments in unexpected emails
23.Mention any four types of Cyber Crimes.
Identity Theft -This cybercrime occurs when a criminal gains
access to a user’s personal information to steal funds, access
confidential information. They can also open a phone/internet
account in your name, use your name to plan a criminal activity
and claim government benefits in your name.
Cyber Stalking – It means repeated acts of harassment or
threatening behavior of the cybercriminal towards the victim by
using internet services. Both kind of Stalkers i.e., Online &
Offline – have desire to control the victims life.
Salami attack: These attacks are used for the commission of
financial crimes and that would go completely unnoticed. E.g. a
bank employee inserts a program, into the bank’s servers, that
deducts a small amount of money from the account of every
customer. No account holder will probably notice this
unauthorized debit.
Email spoofing:
Email spoofing refers to email that appears to originate from
one source but actually has been sent from another source.
Email spoofing can also cause monetary damage.
24.Mention any four organizations that deal with cyber security in India.
National Cyber Security Coordinator (NCSC) -
Indian Computer Emergency Response Team (CERT-In) -
Data Security Council of India (DSCI) -
Indian Computer Emergency Response Team -
25.Write a short note on Challenges of Cyber Security.
Constantly Evolving Threat Landscape: Cyber threats are
constantly evolving, and attackers are becoming increasingly
sophisticated. This makes it challenging for cybersecurity
professionals to keep up with the latest threats and implement
effective measures to protect against them.
Lack of Skilled Professionals: There is a shortage of skilled
cybersecurity professionals, which makes it difficult for
organizations to find and hire qualified staff to manage their
cybersecurity programs.
Insider Threats: Insider threats can be just as damaging as
external threats. Employees or contractors who have access to
sensitive information can intentionally or unintentionally
compromise data security.
Complexity of Technology: With the rise of cloud computing,
IoT, and other technologies, the complexity of IT infrastructure
has increased significantly. This complexity makes it challenging
to identify and address vulnerabilities and implement effective
cybersecurity measures.
26. What do you mean by cloud computing?
Cloud computing is the delivery of computing services—including
servers, storage, databases, networking, software, analytics, and
intelligence—over the Internet (“the cloud”) to offer faster innovation,
flexible resources, and economies of scale.
27. What do you mean by Architecture of cyber space?
The architecture of cyberspace refers to the underlying structure and
organization of the digital realm, which encompasses the internet,
computer networks, and virtual environments. It involves various
components and layers that enable the transmission, storage, and retrieval
of information. But buildings in cyberspace are constructed from
programming language and not bricks and mortar.
28.What do you mean by network protocols?
Network protocols are a set of rules outlining how connected devices
communicate across a network to exchange information easily and safely.
Protocols serve as a common language for devices to enable communication
irrespective of differences in software, hardware, or internal processes.
30.What is Spyware?
Spyware is malicious software that enters a user's computer, gathers data
from the device and user, and sends it to third parties without their consent.
A commonly accepted spyware definition is a strand of malware designed to
access and damage a device without the user's consent.
31.What is online content regulations?
The Internet brought a substantial improvement in global connectivity, with
increased access to information and forums and this also came with easier
ways to access and spread illegal and harmful content. Large online
platforms have engaged in efforts to reduce online abuse by developing
advanced tools to moderate content. They have developed technology that
automatically analyzes and removes content that violates their policies. The
pressure for effective removal of illegal and harmful content online has
already materialized into law in several jurisdictions. major platforms share
their moderation tools with smaller companies and cooperate in industry-
wide efforts to tackle illegal and harmful content.
32.Briefly explain Cybercrime. It can be defined as “The illegal usage of
any communication device to commit or facilitate in committing any illegal
act”. It is explained as a type of crime that targets or uses a computer or a
group of computers under one network for the purpose of harm or illegal
ends, such as committing fraud, intellectual property, stealing identities, or
violating privacy.
33. What is Social Engineering?
Social engineering is the tactic of manipulating, influencing, or deceiving a
victim in order to gain control over a computer system, or to steal personal
and financial information. It uses psychological manipulation to trick users
into making security mistakes or giving away sensitive information.
34. What are the classifications of Cybercrime?
There are 4 classifications:
1. Against Individuals: These include e-mail spoofing, spamming,
cyber defamation, cyber harassments and cyber stalking.
2. Against Property: These include credit card frauds, internet time
theft and intellectual property crimes.
3.Against Organisations: These include unauthorized accessing of
computer, denial Of service, computer contamination / virus attack, e-mail
bombing, salami attack, logic bomb, trojan horse and data diddling.
4. Against Society: These include Forgery, CYberTerrorism,WebJacking.
35. What are Cyber offences?
Cyber offences are the illegitimate actions, which are carried out in a classy
manner where either the computer is the tool or target or both.The offences
included in the I.T. Act 2000 are as follows −
• Tampering with the computer source documents.
• Hacking with computer system.
• Publishing of information which is obscene in electronic form. Penalty
for misrepresentation
36.Who are CyberCriminals?
A cybercriminal is a person who conducts some form of illegal activity
using computers or other digital technology such as the Internet. The
criminal may use computer expertise, knowledge of human behavior, and a
variety of tools and services to achieve his or her goal.
MODULE-2
TWO MARKS QUESTIONS
1. What are the top five cybercrimes?
1. Phishing - is a technique used by cyber criminals to trick people into
installing some malicious software, most likely through a link.
2. Ransomware –It works when criminals steal something of great
value and demand payment in exchange for its return.
3. Hacking - Hacking occurs when accounts and passwords are
compromised.
4. Website Spoofing- The word spoof means to trick, or deceive.
Website spoofing is when a website is designed to look like a real one
and deceive you into believing it is a legitimate site.
5. Identity theft - Identity theft happens when a person pretends to be
someone else to commit fraud. Cybercriminals steal your personal
information, like identity cards, credit cards and the like, to make
transactions.
2. Give examples of common cybercrimes that individuals or organizations
may encounter?
Cybercrimes against individuals:
1. Phishing and Scam
2. Theft of Identity
3. Malware Attacks
4. Cyberstalking
5. Web Jacking
Cybercrimes against organizations:
1. Unauthorized Accessing of Computer
2. Denial Of Service
3. Computer contamination / Virus attack
4. Email Bombing
5. Data diddling
6. Salami Attack
5. Differentiate between personal cybercrimes and property cybercrimes?
Cybercrime against personal/individual involves targeting person’s
computer, data, identity such as hacking phishing or identity theft.
Cybercrime against property involves damaging or stealing a person’s or
an organization’s property such as malware, ransomware or piracy.
6. What is Cyber terrorism? Give example.
It is often defined as any premeditated, politically motivated attack
against information systems, programs and data that threatens violence
or results in violence.
Or
It is the use of the Internet to conduct violent acts that result in, or
threaten, the loss of life or significant bodily harm, in order to achieve
political or ideological gains through threat or intimidation
Examples:
• Unauthorized access-
• Cyberespionage:
9. What is Cyber Extortion? Give example.
Cyber extortion is an online crime in which hackers hold your data,
website, computer systems, or other sensitive information hostage until
you meet their demands for payment. It often takes the form of
ransomware and distributed denial-of-service attack.
One of the most common cyber extortion examples is ransomware.
During a ransomware attack, a hacker breaches your network and hijacks
your data, or other critical element of your network and demands that
you pay them money, typically in cryptocurrency, before they allow you
to access your digital assets again.
10.What is Cyber Warfare? Give example.
Cyber warfare is a cyberattack or series of cyberattacks launched
against a country or state with the aim of gaining a strategic or military
advantage.
Example:
Malware attacks
Communications blackouts or significant power grid or public
utilities shut-downs can be caused by malware such as viruses and
worms that are used as cyberweapons to attack critical infrastructure
networks or industrial control systems.
11.What is Internet Fraud? Give example.
Internet fraud is a type of cybercrime fraud or deception which makes use
of the Internet and could involve hiding of information or providing
incorrect information for the purpose of tricking victims out of money,
property and inheritance.
Example: LOTTERY SCAM
12.What is Cyber Stalking? Give example.
Cyberstalking is a type of cybercrime that uses the internet and
technology to harass or stalk a person. It can be considered an extension
of cyberbullying and in-person stalking. However, it takes the form of
text messages, e-mails, social media posts.
Example:
Message the target repeatedly
Continue the harassing behavior even after being asked to stop
Use technology to threaten or blackmail the target
Follow the target online by joining the same groups and forums
Hack into or hijack the target's online accounts
Posting offensive, suggestive, or rude comments online
13.What are the challenges involved in addressing cybercrimes?
The increasing technology of the Internet has provided various
advancements in human beings’ daily life. But this advancement of
technology is facing various challenges as follows,
Mixed attack- Cybercriminals are very creative as they are
always busy in making a new variant of existing cyberattack or
forming a new cyberattack. This type of dynamic environment of
cybercrimes gives a very hard challenge for security researchers to
defend the data and information on the Internet from the various
types of cyberattacks.
Huge Increase in the Cybersurface
(Cybersurface- It constitutes desktops, laptops, mobiles, tablets, and
smartwatches that can be connected to the Internet with the help of
hardware and software.)
The increased cybersurface gives rise to the difficult level of defending
data on the cybersurface by security professionals.
16. What is meant by Cyber Financial Frauds and give examples of
protection against it.
Cyber financial frauds involve unauthorized access, theft, or
manipulation of financial data or transactions using digital platforms.
Examples:
Guard your online information
Monitor your accounts.
17. What is meant by Denial of Service (DoS) attack?
A denial-of-service (DoS) attack is a type of cyber attack in which a
malicious actor aims to render a computer or other device unavailable to
its intended users by interrupting the device's normal functioning.
18. What is malware? Give two examples of malware types.
Malware, short for malicious software, refers to any intrusive software
developed by cybercriminals (often called hackers) to steal data and
damage or destroy computers and computer systems.
Examples of common malware include viruses, worms, Trojan viruses,
spyware, adware, and ransomware.
19. Describe two common social engineering techniques used in cybercrime.
Computer based social engineering techniques:
Phishing- an attacker uses a message sent by email, social media,
instant messaging clients, or SMS to obtain sensitive information
from a victim or trick them into clicking a link to a malicious
website.
Pretexting: attackers create a fake identity and use it to manipulate
their victims into providing private information.
Human based social engineering techniques:
Impersonation helps attackers in tricking a target to reveal
sensitive information.
Posing as a legitimate end user: Give identity and ask for the
sensitive information.
Posing as an important user: Posing as a VIP of a target company,
valuable customer, etc.
20. What is meant by zero-day attacks?
These are cyber-attacks that exploit software vulnerabilities that are
unknown to the software vendor or have not been patched yet. Or
"Zero-day" is a term that describes recently discovered security
vulnerabilities that hackers can use to attack systems. The term
"zeroday" refers to the fact that the vendor or developer has only just
learned of the flaw – which means they have “zero days” to fix it. A
zero-day attack takes place when hackers exploit the flaw before
developers have a chance to address it.
21.What is Crypto jacking?
Cryptojacking is a type of cybercrime that involves the unauthorized use
of people's devices (computers, smartphones, tablets, or even servers) by
cybercriminals to mine for cryptocurrency. the motive of this crime is
profit, but unlike other threats, it is designed to stay completely hidden
from the victim.
22.Define Data breaches and mention two consequences of such incidents.
A data breach is a cyber attack in which sensitive, confidential or otherwise
protected data has been accessed or disclosed in an unauthorized fashion.
The consequences of data breach can be far-reaching and often long-term.
Reputational Damage:
Loss of Sales:
24. How to report cybercrime?
Complaints can be reported through helpline number 1930 or on
National Cybercrime Reporting Portal.
25. What is meant by zero-click attacks?
Zero-click attacks are a sophisticated class of cyber threats that exploit
software vulnerabilities without any action or input from the targeted
user. Zero-click attacks operate covertly, often targeting messaging
apps, email platforms, and other software with remote code execution
capabilities.
26.What is Web based threats?
Web-based threats, or online threats, are a category of cybersecurity
risks that may cause an undesirable event or action via the internet. Web
threats are made possible by end-user vulnerabilities, web service
developers/operators, or web services themselves.
27. Define cyberbullying and provide two ways to prevent cyberbullying
incidents.
Cyberbullying is a type of bullying in which one or more individuals
use digital technologies to intentionally and repeatedly cause harm
to another person. Cyberbullies use mobile phones, computers or
other electronic devices to send texts, emails or instant messages;
post comments on social media or in chat rooms; or in other ways
use private or public forums to attack their victims. There are ways
to prevent cyberbullying incidents.
1. Protect Accounts/Devices With Passwords:
2. Don’t Share Personal Information:
28. What is online scams and give two examples of common online scams.
Internet scam or online scam is a type of cybercrime or deception which
makes use of the Internet and could involve hiding of information or
providing incorrect information for the purpose of tricking victims out of
money, property, and inheritance.
Example:
banking, credit card and online account scams
job and employment scams
charity and medical scams
29. What is Forensic Investigation?
Forensic investigation in cybersecurity refers to the practice of
collecting, analyzing, and preserving digital evidence after a cyberattack
or cybercrime. The goal of a forensic investigation is to uncover details
about how an attack occurred, who was responsible, and what was
accessed or stolen.
30.Define encryption. Write its importance in protecting sensitive data.
Encryption is a way of scrambling data so that only authorized parties can
understand the information. In technical terms, it is the process of
converting human-readable plaintext to incomprehensible text, also known
as cipher text. It’s important to protect sensitive data because if attackers
manage to access your system data, these methods ensure they can't see,
read, or do much with the information.
32. What is the main legislation governing cyber law in India?
In India, cyber laws are contained in the Information Technology Act,
2000 (IT Act) which came into force on October 17, 2000. The main
purpose of the Act is to provide legal recognition to electronic commerce
and to facilitate filing of electronic records with the Government.
33. What is the role of the Cyber Crime Investigation Cell (CCIC) in India?
It is responsible for investigating cybercrime cases and providing
technical support to other law enforcement agencies.
36. How can individuals report cybercrimes in India? Provide one reporting
channel.
Visit the nearest police station immediately.
To report cybercrime complaints online, visit the National Cyber
Crime Reporting Portal.
1930 is national cybercrime helpline. If you fall victim to a
financial fraud, you can call this number with necessary details,
such as your name, contact information, your account number
along with the details of the account that you transferred the
money to.
Report any adverse activity or unwanted behavior to CERT-IN
using following channels E-mail : [email protected]
37. Write the difference between virus and worms.
Both computer virus and worm can equally harm a computer device.
However, these two aren’t the same completely.
A computer virus is a kind of malicious computer program, which
when executed, replicates itself and inserts its own code. A virus
spreads from one software or device to another. It includes boot sector
virus, file infector virus.
On the other hand, a computer worm is a stand-alone malicious
program which can spread itself to other parts of any device. It includes
internet worms, email worms. However, one similarity is that both
virus and worms are a subcategory of malware.
38. Name the organisation for cyber-crimes against women and children in
India.
The Ministry of Home Affairs stated that the main objective of the
Cyber Crime Prevention Against Women and Children (CCPWC)
scheme is to develop effective mechanisms to handle cyber-crimes
against women and children in the country.
MODULE-3
TWO MARKS QUESTIONS
1. What is social media and social network?
Social media is defined as a website or application that enables us to
create and share content. A social network is alternatively a website or
application that enables us to communicate with one another by posting
information, comments, and messages.
2. List any four types of social media.
Social networks – Facebook, twitter, Instagram
Discussion forums - Reddit, quora
Image sharing networks – photobucket, flickr
Consumer review networks – TripAdvisor, Yelp
3. List any four social media platforms for social networking.
Facebook, LinkedIn, X (formerly Twitter),Instagram
4. List two examples each for social networking sites and photo-video
sharing apps.
Social networking sites: Facebook, LinkedIn photo-
video sharing apps: Snapchat, Instagram
5. Explain the difference between social networking sites and
microblogging platforms.
A social network is a platform that allows users to connect with each
other and share content. Examples of social networks include Facebook,
Instagram, and LinkedIn. A microblog, on the other hand, is a platform
that allows users to share short-form content, such as text, photos, and
videos.
6. How do live streaming platforms differ from traditional social media
platforms?
In comparison to traditional broadcasting methods, live streaming is
much more cost-effective. Anyone can stream their content live with the
help of a camera and their device. You no longer need any expensive
equipment to reach out to your audience. Live streaming allows you to
receive realtime input from your audience, allowing you to measure their
reactions and preferences.
7. Why is social media monitoring important for businesses and
brands?
Social media monitoring is a great strategic tool to improve and measure
the effectiveness of your communications. You can closely monitor how
much media attention your actions fetch. It helps in estimating your
reach to your target customers and analyze their response towards your
product or service.
8. Write notes on any two tools or methods used for monitoring social
media activity.
Keyhole: helps you monitor your Twitter and Instagram accounts
- you can look at keywords, hashtags, URLs, and usernames. You
can both see data in real-time and historical information, while
you can also view heat maps that show you activity levels in
certain parts of the world.
Hootsuite: It is a very popular, freemium, social media
monitoring software that can track activity across a number of
social networks and platforms - those networks and platforms
include LinkedIn, Twitter, Facebook. You can also manage social
media accounts by scheduling posts across multiple platforms.
9. What are Blogging Platforms? List any two blogging platforms. Blogging
platforms are broadcast-style communications systems that enable
authors to publish articles, opinions or product reviews, which can be
delivered through stand-alone websites, email, feed syndications systems
and social networks. The important two blogging platforms are
Blogger
Wordpress
10. What are video hosting platforms? List any two video hosting
platforms.
Video hosting is a digital service that includes uploading and storing
videos on a third-party platform. These platforms — hosts — are tasked
with keeping the videos on their servers secure and enabling easy
distribution to your desired audience.
YouTube for its existing viewership.
Vimeo for collaboration on videos.
11. What is ‘hashtag’? What is the purpose of using hashtags in social
media posts?
A word or phrase with a # sign in front of it, to show that it is the
topic of a message on social media. They provide a label for
users to easily search for other posts with that hashtag.
The point of using hashtags on social media is that you
are indicating to a follower/user and algorithm that your content
relates to a specific topic or category. Ultimately, it helps users to
find relevant content easily across platforms so your content is
discoverable to a wider audience.
12.Define viral content and provide examples of content that has gone viral.
Viral content is online content that achieves a high level of
awareness due to shares and exposure on social media networks,
news websites, aggregators, email newsletters and search engines.
Example: Motivational Content, Personality Quizzes,
controversial content
13.What factors contribute to the virality of content on social media?
To have a chance of going viral, your content needs to be
unique,interesting, and engaging and other factors are
Emotional
Quality
Creative
Influencers
14.Write notes on the concept of social media marketing and its role in
promoting products or services.
Social media marketing is a powerful way for businesses of all
sizes to reach prospects and customers. People discover, learn
about, follow, and shop from brands on social media. It efficiently
fosters communications between customers and marketers, besides
enabling activities that enhance brand awareness.
• It is a top channel for increasing traffic to your website where
you can convert visitors into customers.
• Increase your brand awareness
• You can build relationships with the followers by gathering
feedback about products and can directly with the individual
about product or service.
15.What is social media privacy? Give any two examples.
Social media privacy refers to the personal and sensitive information that
people can find out about you from your accounts. This information can
be purposefully shared (such as in public profiles and posts) or
unknowingly shared (such as the data sites share with other companies
and social media marketing agencies).
Examples on privacy issues: Shared location data, Hacking and account
takeovers, Social media phishing scams.
1. Explain any two challenges associated with social media?
Content creation: The biggest concerns with creating content for
social media are not knowing what content to create, how to grab
attention, and how to scale social media content.
Engagement or Reach: the struggle with engagement and
reaching their target audience in an ever-more-competitive
environment.
2. Describe any two common security threats associated with social media
platforms.
Identity Theft: It is a common social media threat that can happen to
anyone who has shared images or personal information online.
Impersonation happens when someone uses public information and
pictures to create a fake online profile to pretend either they are that
person or create a new persona entirely. The impersonator gains
access to your bank accounts or tricks others into sending
them money.
Cyberbullying: It includes harmful and damaging posts, messages or
content shared either directly to a user or publicly. To better protect
yourself against online harassment, keep your account in private mode
and be selective of your online followers or friends.
5. What is Phishing Attack and Malware Distribution?
Phishing is online scam enticing users to share private information using
deceitful or misleading tactics. Malware distribution is the process of
distribution of malware through malicious websites, emails, and software.
Malware can also be hidden in other files, such as image or document
files, or even in seemingly innocuous files, such as .exe files.
6. Describe any two steps that users can take to protect themselves from
social media-related security breaches?
Create strong, unique passwords: Practice good password
hygiene. Use different passwords for your social media
accounts, and also make sure each password is complex and
unusual
Use two-factor authentication: a security measure that
requires a one-time code, either from an app on your phone or
a text message. Since these codes are only valid for a few
minutes, they’re more secure.
7. What does "2FA" stand for in the context of social media security? Two-
factor authentication (2FA) is an identity and access management security
method that requires two forms of identification to access resources and
data. 2FA gives businesses the ability to monitor and help safeguard their
most vulnerable information and networks. The first factor is a password
and the second commonly includes a text with a code sent to your
smartphone, or biometrics using your fingerprint, face, or retina
8. Write any four opportunities in social media.
Promote your brand- Sales and marketing professions are
continuously using social media to introduce and promote new
products and services that increase their potential target market
Engage Customers: Social media allows your organization to
listen to the customer’s wants, needs, and demands in order for
your organization to satisfy the customer and continue to create
and growing and healthy relationship
Recruiting: It also has the potential to improve recruiting
techniques because it allows you to post information about
recruiting opportunities, different events for people to attend, as
well as posting job interviews and how to apply for positions so
that you are able to reach out to a wide range of potential
candidates.
24. Describe any two ways you can protect your personal information on
social media.
Stay Safe on Social Media With Strong Passwords and Secure
Accounts: Strong passwords will protect online accounts from being
hacked, which help a great deal in terms of identity theft, social
media scams, and account takeovers by hackers.
Watch out for Social Media Scams and Phishing
Social media scams and social media phishing are two of the most
common problems on social media platforms today. The links used
for these types of attacks normally attempt to steal either your
identity, steal money, or work to spread a bot or virus to your
network of colleagues, friends, and family.
Be mindful of what you post: Before posting anything online, think
carefully about what you're sharing and who might be able to see it.
Consider whether the post reveals any personal information that you
wouldn't want to be made public.
25. What are the pitfalls in online social network?
Bandwidth and storage consumption:
Exposure to malware:
Disclosure of personal information:
26. Describe the process of flagging and reporting inappropriate content on
a social media site.
The flag is now a common mechanism for reporting offensive content to
an online platform, and is used widely across most popular social media
sites. A mechanism for reporting harmful or offensive content to an
online social media platform or company. Content can be flagged by an
algorithm, content moderator, or another user.
Laws regarding posting of inappropriate content:
1. Defamation Laws:
2. Harassment and Cyberbullying Laws:
3. Hate Speech and Incitement Laws:
4. Child Protection Laws:
5. Privacy Laws:
6. Copyright Infringement:
7. Obscenity Laws:
8. Cybersecurity Laws:
9. Platform-Specific Rules:
27. Describe any two legal regulations concerning the posting of
inappropriate or harmful content on social media.
Harassment and Cyberbullying Laws: Harassing or cyberbullying
individuals online can be subject to legal consequences. Although
there are no specific laws to regulate cyberbullying in India, we do
have Section 66A of the Information Technology Act. This Act
prescribes the punishment for sending annoying, offensive, and
insulting communication through digital and information
communication technology.
Hate Speech and Incitement Laws: Many countries have laws
against hate speech and incitement to violence or discrimination.
Although there is
28. List any four best practices for the use of social media.
Establish a clear social media strategy-
Engage with your followers-
Be consistent:
Be visual:
29.Define Defamation and Hate Speech.
Defamation, in law, the act of communicating to a third party false
statements about a person that result in damage to that person's
reputation. Libel and slander are the legal subcategories of defamation.
Hate speech refers to offensive discourse targeting a group or an
individual based on inherent characteristics (such as race, religion or
gender) and that may threaten social peace.