This document contains 20 questions about various topics in cyber security and artificial intelligence. It asks about definitions of cyber security concepts like CIA and attributes, different types of cybercrimes and attacks such as phishing, social engineering, and ransomware. It also asks about vulnerabilities, threats, types of hackers, and how machine learning and AI are used for threat detection and strengthening cyber security defenses.
This document contains 20 questions about various topics in cyber security and artificial intelligence. It asks about definitions of cyber security concepts like CIA and attributes, different types of cybercrimes and attacks such as phishing, social engineering, and ransomware. It also asks about vulnerabilities, threats, types of hackers, and how machine learning and AI are used for threat detection and strengthening cyber security defenses.
This document contains 20 questions about various topics in cyber security and artificial intelligence. It asks about definitions of cyber security concepts like CIA and attributes, different types of cybercrimes and attacks such as phishing, social engineering, and ransomware. It also asks about vulnerabilities, threats, types of hackers, and how machine learning and AI are used for threat detection and strengthening cyber security defenses.
This document contains 20 questions about various topics in cyber security and artificial intelligence. It asks about definitions of cyber security concepts like CIA and attributes, different types of cybercrimes and attacks such as phishing, social engineering, and ransomware. It also asks about vulnerabilities, threats, types of hackers, and how machine learning and AI are used for threat detection and strengthening cyber security defenses.
School of Computer Science, Engineering and Applications
Assignment 1 (Based on unit 1)
Basics of AI and CS
1. What is cyber security?
2. What does CIA stand for in cyber security? 3. What are the attributes of cyber security? 4. Define cybercrime and enlist cybercrime. 5. Explain salami slicing attack with an example. 6. What is phishing? 7. Write a note on Social engineering. 8. How do you find out whether a system is compromised or vulnerable? 9. What is a computer virus? Give its type. 10.What is cybercrime? Give some examples of cybercrime committed against an individual. 11.Describe Threats and Vulnerability. Do they refer to the same thing? 12.Distinguish between cyberstalking and Cyberbullying 13. What do you mean by a cybercriminal? Differentiate Gray, black and white hacker. 14.How do you mitigate the risk of Cross-Site Request Forgery (CSRF)? 15. Give some examples of nonmalicious program errors. 16.How does a Ransomware attack work? 17. What are the drawbacks and Limitations of Using AI for Cybersecurity? 18.Explain how AI-powered threat detection works? 19.How AI is applicable in Cybersecurity, explain with real-time example. 20. What Is Machine Learning and How Is it Used in Cybersecurity?