Information Technology & Cyber Laws 32
#1

Software Piracy
*Unauthorized copying, reproduction, use or manufacture of product is called Software piracy

Password Sniffer
*It is a small program that monitor and retrieve the user name or password of network users during their login.

Cyber Stalking (e-stalking)
*Practice of using internet to harass or threaten some one
*This can be avoided by not disclosing any personal information, avoid sending photographs to strangers and chat friends, proper disconnection of internet after its use.

Extra Info
*Cyber stalking is also known as Cyber Bullying

Web Jacking
*Hacking of websites by password cracking and alteration of contents for fulfilling political objectives or for money.Web Jacking punishes the offender under IPC 383

Data Diddling
*Data Diddling is the unauthorized changing of data before or during their input to a computer system.
egs  Forgery, exchanging valid records with prepared replacement etc.

Identity theft
*Procurement of identifying information without permission and using it fraudulently to obtain goods and services is called identity theft.

Hacking
*Process of unauthorized access of information system is known as 
Ans : Hacking 
*One who does hacking is called 
Ans :  Hacker 
*Hacker destroys, defects or alters the information in a computer resource.Hacking comes under section 66 of IT Act 2000
*Hackers are of different categories such as White Hat Hackers, Black Hat Hackers, Gray Hat Hackers
*White Hat hackers hack system for good reason.  
*They are also known as Ethical Hackers.
*Black Hat Hackers hack system for malicious reasons.
*Gray Hat Hackers hack system sometimes for good reason and sometimes for malicious reasons.
*Banking and credit card related crime, E-commerce and investment frauds, online sale of illegal articles, online gambling etc also comes under cyber crime.
*Unauthorized use of internet hours paid for by another person is known as theft of internet hours.
*A computer connects to the internet that has been compromised by a hacker, computer virus or Trojan horse and can be used for malicious tasks is called 
Ans : Zombie

Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  Information Technology & Cyber Laws 36 amrutha735 0 512 26-12-2017, 10:42 AM
Last Post: amrutha735
  Information Technology & Cyber Laws 35 amrutha735 0 462 26-12-2017, 10:42 AM
Last Post: amrutha735
  Information Technology & Cyber Laws 34 amrutha735 0 483 26-12-2017, 10:42 AM
Last Post: amrutha735
  Information Technology & Cyber Laws 33 amrutha735 0 532 26-12-2017, 10:42 AM
Last Post: amrutha735
  Information Technology & Cyber Laws 31 amrutha735 0 493 26-12-2017, 10:41 AM
Last Post: amrutha735
  Information Technology & Cyber Laws 30 amrutha735 0 554 26-12-2017, 10:41 AM
Last Post: amrutha735
  Information Technology & Cyber Laws 29 amrutha735 0 472 26-12-2017, 10:41 AM
Last Post: amrutha735
  Information Technology & Cyber Laws 28 amrutha735 0 524 23-12-2017, 04:34 PM
Last Post: amrutha735
  Information Technology & Cyber Laws 27 amrutha735 0 527 23-12-2017, 04:33 PM
Last Post: amrutha735
  Information Technology & Cyber Laws 26 amrutha735 0 491 23-12-2017, 04:33 PM
Last Post: amrutha735

Forum Jump: