Quick Revision

One-Page Summaries and Final Exam Checklist

How to Use This Section

This section provides condensed summaries of all five units for rapid revision before examinations. Each unit summary includes key concepts, important definitions, and essential points in bullet format for easy scanning.

Unit I: Introduction to Cyber Crime - Summary

Key Concepts

  • Cybercrime: Criminal activities using computers/networks as tools or targets
  • CIA Triad: Confidentiality, Integrity, Availability
  • Cybercriminals: Script kiddies, Hackers, Hacktivists, Organized groups, State-sponsored actors, Insiders

Classification of Cybercrimes

Attack Methodology

Social Engineering Types

Botnets

Attack Vectors

Email, Web apps, Network, Removable media, Social engineering, Insider threats, Supply chain

Read full Unit I detail →

Unit II: Mobile and Wireless Security - Summary

Mobile Security Challenges

  • Limited resources (battery, processing)
  • Diverse platforms and OS versions
  • Multiple wireless interfaces
  • BYOD complexity
  • Physical loss/theft risk

Mobile Network Generations

1GAnalog, voice only
2GDigital, SMS, limited data
3GMobile internet, multimedia
4GHigh-speed broadband (LTE)
5GUltra-high speed, IoT support

Mobile Attacks

Bluetooth Attacks

Authentication Methods

PIN/Password, Pattern, Fingerprint, Facial recognition, Iris scan, MFA

MFA Factors: Something you know/have/are

Organizational Measures

Read full Unit II detail →

Unit III: Tools and Methods - Summary

Key Tool Categories

  • Anonymization: Proxies, VPN, Tor
  • Malware: Viruses, Worms, Trojans, Ransomware
  • Attack Tools: DDoS, SQL injection, Buffer overflow
  • Surveillance: Keyloggers, Spyware

Proxy Types

Phishing Types

Email phishing, Spear phishing (targeted), Whaling (executives), Vishing (voice), Smishing (SMS)

Password Cracking

Malware Comparison

VirusWormTrojan
Requires hostStandaloneDisguised as legitimate
User action neededSelf-propagatingNo replication

DoS vs DDoS

SQL Injection

Wireless Security

Steganography vs Cryptography

Read full Unit III detail →

Unit IV: Computer Forensics - Summary

Forensics Principles

  • Minimal handling of evidence
  • Complete documentation
  • Maintain integrity
  • Ensure reproducibility
  • Follow legal compliance

Digital Forensics Life Cycle

  1. Identification: Recognize incident, identify evidence sources
  2. Preservation: Secure scene, prevent alteration
  3. Collection: Gather evidence (volatile first)
  4. Examination: Process and extract data
  5. Analysis: Interpret, correlate, timeline
  6. Presentation: Reports and testimony

Order of Volatility

  1. CPU registers and cache
  2. RAM
  3. Network connections
  4. Running processes
  5. Hard disk
  6. Remote logging data
  7. Archival media

Types of Digital Evidence

Chain of Custody

Forensics Branches

Computer, Mobile, Network, Memory, Database, Cloud forensics

Challenges

Read full Unit IV detail →

Unit V: Security Policies and Cyber Laws - Summary

Key Legislation

  • IT Act, 2000 (Amended 2008)
  • Digital Personal Data Protection Act, 2023
  • Copyright Act, 1957
  • Indian Penal Code provisions

Important IT Act Sections

Section 43Unauthorized access (compensation up to Rs. 1 crore)
Section 65Source code tampering (3 years)
Section 66Computer-related offenses (3 years)
Section 66CIdentity theft (3 years)
Section 66FCyber terrorism (life imprisonment)
Section 67Obscene content (5 years)

DPDP Act, 2023 Key Terms

Data Principal Rights (DPDP)

Right to information, correction, erasure, grievance redressal, nomination

DPDP Penalties

Intellectual Property Types

Security Policy Components

Purpose, Scope, Roles, Policy statements, Compliance, Enforcement, Review procedures

Cybercrime Reporting

Trademark Infringement Remedies

Privacy Threats

Read full Unit V detail →

Final Exam Revision Checklist

Unit I - Introduction to Cyber Crime

Unit II - Mobile and Wireless Security

Unit III - Tools and Methods

Unit IV - Computer Forensics

Unit V - Security Policies and Laws

Important Definitions to Remember

Term Definition
Cybercrime Criminal activity using computers/networks as tools or targets
Social Engineering Psychological manipulation to obtain information or access
Botnet Network of compromised computers controlled remotely
Phishing Fraudulent attempt to obtain sensitive information
DDoS Distributed attack from multiple sources to deny service
SQL Injection Inserting malicious SQL through user input
Computer Forensics Investigation to gather legally admissible digital evidence
Chain of Custody Documentation of evidence handling from collection to court
Digital Evidence Information in digital form usable in legal proceedings
Data Fiduciary Entity determining purpose and means of data processing
Data Principal Individual to whom personal data relates
Cyber Terrorism (66F) Cyber attacks threatening national security

Quick Reference: Penalties Under IT Act

Section Offense Maximum Penalty
43 Unauthorized access/damage Compensation up to Rs. 1 crore
65 Source code tampering 3 years + Rs. 2 lakh
66 Computer-related offense 3 years + Rs. 5 lakh
66C Identity theft 3 years + Rs. 1 lakh
66F Cyber terrorism Life imprisonment
67 Obscene content 5 years + Rs. 10 lakh
67A Sexually explicit content 7 years + Rs. 10 lakh
67B Child pornography 7 years + Rs. 10 lakh
Back to Exam Preparation Back to Home