Page 72 - MILITARY-STUDIES-2
P. 72
Module -V
Cyber Warfare
Warfare and
2. Differentiate between adware and spyware. Its Types
3. What is cyber propaganda?
4. Explain the emergence of cybercrimes and measures to check them.
5. Explain the National Cyber Security Policy.
Note
Answers to Intext Questions
15.1
1. (a) Cyber Security.
(b) Propaganda
2. Cyber warfare has been defined "actions by a nation-state to penetrate another
nations computers or network of or the purpose of causing damage or destruction.
3. Cyber crime is committed where the use or knowledge of computer is required
to cause damage.
4. (i) Cyber attacks
(ii) Cyber espionage
(iii) Cyber sabotage
(iv) Cyber propaganda
15.2
1. (a) Knobots.
(b) Hacker.
(c) Cracker
(d) Trojan Horses.
(e) False
2. (i) Fraud and Forgery
(ii) Damage to or modification of computer
3. Viruses and Worms, Trojan Horses, Logic/Knowledge Bomb, Knobots, Adware,
Spyware.
15.3
1. (a) Computer Emergency Response Team (CERT)
(b) Information and Communication Technology (ICT)
65
MILITARY STUDIES 65