Information Technology & Cyber Laws 20
#1

Malwares
*Malware is a general term used to refer Malicious Softwares that can harm the computer.

Info Plus
In cyber law malware is known as 
Ans : Computer Contaminants
*Examples of Malware - Computer viruses, Worms, Trojan horses, Spyware etc.
*The most dangerous computer malware Flame (It has a property of Virus)

Spyware
*Spyware is a malware which downloads itself onto the computer system through an email or a downloaded program
*Spyware Scans Computer hard disk automatically for personal information
*Spyware sends the collected secret information to the individuals who created the spyware

Firewall
*Firewall is a protection scheme for data. 
*It protects our information system from unsecured public network.
*Examples of Firewell software - Comodo, Ashampoo, Agnitum Outpost, Zone Alaram etc.

Cryptography
*Cryptography is the science of secret writing.
*Cryptography consists of encrypting and decrypting of data.
*Encrypting is the process of transporting plain text to unreadable scrambled text called cipher text.
*Decryption is the reverse process of encryption. It converts unreadable cipher text to plain text.
*The word cryptography was originated from Greek words ‘Kryptos’ means secret and ‘graphein’ means writing. 

Digital Signature
*Electronic files that are used to identify people and resources over internet.
*It ensures that the credibility of the gender, who sends the data over Internet.
Any electronic signat tire or electronic authentication technique shall be considered reliable: 
    
(a) If the signature creation data or the authentication data are, within the context linked to die signatory or as the case be, the authenticator and of no other person.   
(b) If the signature creation data or  authentication data Were, at the time of Signing; under the control of the signatory or, as the case maybe, the authenticator and made after its authentication by electronic 
(c )If any alteration to the information made after is authentication by electronic signature is detectable
(d) All the above
Ans: (d) All the above

Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  Information Technology & Cyber Laws 36 amrutha735 0 512 26-12-2017, 10:42 AM
Last Post: amrutha735
  Information Technology & Cyber Laws 35 amrutha735 0 463 26-12-2017, 10:42 AM
Last Post: amrutha735
  Information Technology & Cyber Laws 34 amrutha735 0 484 26-12-2017, 10:42 AM
Last Post: amrutha735
  Information Technology & Cyber Laws 33 amrutha735 0 534 26-12-2017, 10:42 AM
Last Post: amrutha735
  Information Technology & Cyber Laws 32 amrutha735 0 466 26-12-2017, 10:42 AM
Last Post: amrutha735
  Information Technology & Cyber Laws 31 amrutha735 0 495 26-12-2017, 10:41 AM
Last Post: amrutha735
  Information Technology & Cyber Laws 30 amrutha735 0 558 26-12-2017, 10:41 AM
Last Post: amrutha735
  Information Technology & Cyber Laws 29 amrutha735 0 474 26-12-2017, 10:41 AM
Last Post: amrutha735
  Information Technology & Cyber Laws 28 amrutha735 0 528 23-12-2017, 04:34 PM
Last Post: amrutha735
  Information Technology & Cyber Laws 27 amrutha735 0 530 23-12-2017, 04:33 PM
Last Post: amrutha735

Forum Jump: