the information technology act internet pharmacy
TRANSCRIPT
The Information Technology Actin India was passed in the year2000
The IT Act 2008 has been notifiedonOct 27 2009
The Information Technology Actis being opposed mainly bySave your Voice
The Information Technology Actin India came into effective fromOct 17, 2000
The Information technology Act2000 has been substantiallyamended through theIT (Amendment) Act 2008
Information technology Act 2000
passwords, and credit card detailsby masquerading as a trustworthyentity in an electronic communi-cationPhishing
Phishing is typically carried out by.............or instant messaging.email spoofing
The first recorded use of the term‘phishing’ was made in1995
A form of Phishing where afraudster uses the phone to lurepeople in revealing their confiden-tial banking details etc. is knownasVishing
VoIP stands forVoice Over Internet Protocol
The activity of a culture of peoplewho study experiment with, or ex-plore telecommunication systemsconnected to public telephonenetworksPhreaking
Intellectual property rights doesnot includetrade secrets
..........is an error, flaw, mistake, fail-ure, or fault in a computer programor system that produces an incor-rect or unexpected result, or causesit to behave in unintended waysSoftware bug
The Internet is a global system ofinterconnected computer net-works that use the standardInternet protocol suite (TCP/IP)
. ...............is the process of recover-ing passwards from data that hasbeen stored in or transmitted by acomputer systemPassward Cracking
Pornography or porn is the explicitportrayal of ..............subject mat-terSexual
Which is not defined in any legis-lation in India ?Cyber Crime
The United Nations Commissionon International Trade Law(UNCITRAL) adopted the ModelLaw on e-commerce in1996
The first legislation in the nationon technology, computers andecommerce and e-communicationIT Act 2000
Sections 91 to 94 in the ITA 2000dealt with the amendments to thefour Acts namely the Indian PenalCode 1860, The Indian EvidenceAct 1872, The Banker’s Books Evi-
dence Act 1891 and theReserve Bank of India Act 1934
The phrases ‘communication de-vices’ & ‘cyber cafe’ were insertedin theITAA 2008
‘Indian Computer response Emer-gency Team’ was included in theITAA 2008
Which is known as the ‘authenti-cation of electronic record ‘Digital signature
Section 3 which was originally‘Digital Signature’ was later re-named as ..............in ITAA - 2008Digital Signature and ElectronicSignature
.........of the IT Act deals withpenalities and compensation fordamage to computer, computersystem etc.Section 43
..........of the IT Act is the first ma-jor and significant legislative stepin India to combat the issue of datatheftSection 43
Criminality in the offence of datatheft is being separately dealt un-der Sections65 and 66
The new section ...........dealingwith compensation for failure toprotect data was introduced in theITAA - 2008
43 A Tampering with source documents
is dealt with under .........sectionSection 65
Computer related offences aredealt with under .............SectionSection 66
Sending offensive messagesthrough communication service,causing annoyance etc through anelectronic communication or send-ing an email to mislead or deceivethe recipient about the origin ofsuch messages (commonly knownas IP or email spoofing) are all cov-ered under SectionSection 66-A
Privacy violation ie, Publishing ortransmitting private area of anyperson without his or her consentetc comes underSection 66-E
Punishment for cyber terrorism iscomes underSection 66-F
Section 67 of IT Act deals withpublishing or transmittingobscence material in electronicform
...........has been exclusively dealtwith under Section 67Bchild pornography
The power of intercepting, moni-toring and blocking something forwhich the Government is repre-
consisted of ................sectionssegregated into ...............chapters94 and 13
Which issues does not addressthe Information Technology Act2008Justice Dispensation Systems forCyber Crimes
The Government of India hasbrought major amendments to ITA-2000 in form of theInformation Technology Amend-ment Act, 2008
A set of Rules relating to Sensi-tive Personal Information and Rea-sonable Secuity Practices (men-tioned in section 43A of the ITAA,2008) was released inApril 2011
..............is attempting to acquire in-formation (and sometimes, indi-rectly, money) such as usernames,
Most countries extend copyrightprotections to software againstsoftware piracy
HOT TIP
INTERNET PHARMACY
It is the use of internet as a tool to sell orpurchase the drugs or psychotropic sub-stances which are either illicit or are notreadily available in a country.eg: drug like Ketamine which is easily avail-able in India at very nominal prices is soldthrough illegal networks over internet toSouth Asian countries where it is banned andis used for drug abuse.
FIRST COMPUTER SPECIFIC LAWThe World’s First Computer Specific Law was enacted in the year 1970 bythe German state of Hesse in the form of Data Protection Act, 1970 with theadvancement of cyber technology.This years survey of Norton Cyber Crime Report 2012 shows an increasein new forms of cybercrime compared to last years.In India one in three adults online (32%) has been a victim of either socialor mobile cyber crime in the last 12 months and 51% of social network usershave been victims of social cyber crime specifically 22% of social networkusers reported some one had hacked into their profile and pretended to bethem. 15% of social network users said they had fallen victim to a scam orfake link on social network platforms.
DR. VIJAY P. BHATKARfather of Indian Super Comput-
ers. The architect of param series
of computers.
9
sented by a national nodal agencyas nominated in Section 70 B ofITAA. The agency is named asIndian Computer Emergency Re-sponse Team (CERT)
Critical Information Infrastructureand Protected System have beendiscussed in Section.........70
The Indian Computer EmergencyResponse Team (CERT) comingunder the Ministry ofInformation Technology
Liability of intermediaries and theconcept of Due Diligence has beendiscussed inSection 79
ITA 2000 has amended the sec-tions dealing with records anddocuments in the ................by in-serting the word ‘electronic’thereby treating the electronicrecords and documents on a parwith physical records and docu-mentsIndian Penal Code 1860
Health Insurance Portability andAccountanbility Act popularlyknown as HIPAA is a law inUSA
HIPAA regulatesAll Health and Insurance RelatedRecords
The unlawful acts where in thecomputer is either a tool or a tar-get or both is calledCyber Crime
Cyber Crime is regulated by CyberLaws orInternet Laws
................means gaining entry into,instructing or communicating withthe logical, arithmetical, or memoryfunction resources of a computer,computer system or computer net-workAccess
.............means any kind of accesswithout the permission of eitherthe rightful owner or the person incharge of a computer, computersystem or computer networkUnauthorised access
Every act committed towardsbreaking into a computer and / ornetwork ishacking
By hacking web server taking con-trol on another person’s websiteis called asweb hijacking
The program that act like some-thing useful but do the things thatare quiet damping. The programsof the kind are calledTrojans
Some functions of the trojans usethe ............... ProtocolUser Datagram
A program that has capability toinfect other programs and makecopies of itself and spread intoother programme is calledVirus
Programs that multiply like viruses
but spread from computer to com-puter are called ..............Worm
...............refers to email that appearsto have been originated from onesource when it was actually sentfrom another sourceEmail spoofing
................refers to sending email tothousands and thousands of us-ers similar to a chind letterSpamming
...........are used to send viruses,Trojans etc through emails as anattachment or by sending a like ofwebsite which on visiting down-
HOT TIP
threatening ) on the bulletinboards etcCyber Stalking
Persons who intentionally preyupon children on the internet iscalledPedophiles
Identity theft is the fastest grow-ing crime in countries likeAmerica
Changing information by a person/ a virus while typing the data, fromthe way it should beData didding
..................refers to the right of anindividual / individuals to deter-
HOT TIP
loads malicious codeemails
...........is characterized by abusersrepeatedly sending an identicalemail message to particular ad-dressEmail bombing
A .............attack is accomplished byusing the Internet to break intocomputers and using them to at-tack a network.distributed denial of service (DoS)
Software piracy, copyright in-fringement, trademarks, violations,theft of computer source code,patent violations etc. come underIPR violation
.............can be understood as theintentional infringement of anotherperson’s right to his good nameCyber defamation
Cyber Defamation occurs whendefamation takes place with thehelp of computers and / orinternet
Cyber defamation is also calledCyber smearing
...................is to follow a person’smovements across the Internet byposting messages (sometimes
mine when, how and to what ex-tent his or her personal data willbe shared with othersPrivacy
Breach of ..............means unautho-rized use or distribution or disclo-sure of personal information likemedical records, sexual prefer-ences, financial status etcPrivacy
...........means non disclosure of in-formation to unauthorized or un-wanted persons.Confidentiality
Information Technology (Certify-ing Authority)Regulations, 2001came into force on9 July 2001
The Cyber Regulations AppellateTribunal (Procedure) Rules, 2000came into force on17th Oct 2000
Secretary, Department of...................of each of the State orof Union Territory of India is theadjudicating officer or CyberRegulations Appellate TribunalInformation Technology
An important order relating toblocking of websites was passedon27th Feb 2003
Computer Emergency ResponseTeam (CERT-IND) can instruct De-partment of ............to block awebsiteTelecommunications (DOT)
Digital Evidence is to be collectedand proven in court as per the pro-visions of the .............The Indian Evidence Act 1872
IP address is given by ..............val-uesnumerical
TLD in Cyber Space stands forTop level Domain name
In a domain name ‘.in’ denotesIndia
The domain names are given onthe basis ofFirst come, first served
IRC stands forInternet Relay Chat
The domain names were initiallyregistered byNetwork Solutions
...............is the practice by meansof which a person or legal entitybooks up the trade mark, businessname or service mark of anotheras his own domain name for thepurpose of holding on to it andthereafter selling the same domainname to the other person for valu-able premium and considerationCybersquatting
What is the latest most effectiveremedy against Cybersquatting ?Uniform Domain Name DisputeResolution Policy
Which key is used to rename aslected file or iconF2
What type of software is used forcreating letter papers and otherdocumentsWord Processor
Which process checks to ensurethe components of the computerare operating and connected prop-erlyBooting
Which key is used to refresh thecontent of a fileF5
The CPU and memory are locatedon theMotherboard
What is the process of connect-ing to the internet account calledlog in
IP address is currently4 bytes long
CYBER CRIME
Direct IndirectViruses Cyber StalkingMalware FraudDenial-of Services Attack PhishingAdware Information Warfare
Internet Pharmacy Cyber Terrorism Spam
The first recordedcybercrime in 1820 Jo-seph-Marie Jacquard ofFrance, produced theloom, this resulted in a fearamongst Jacquard’s em-ployees that their tradi-tional employment andlivelihood were beingthreatened. They commit-ted acts of sabotage todiscourage Jacquard fromfurther use of the newtechnology. This is thefirst recorded cybercrime.
NETCRIMEAs in the case of the offences relatedto the internet pharmacy of narcoticdrugs or psychotropic substances. Atthe times such crimes are also referredto as netcrime which are basically re-lated with the criminal exploitation ofInternet.
C Y B E R S TA L K I N GCyber stalking is the use of the internet or other electronic means to stalk orharass an individual, a group of individuals or an organization.
ITA 69 A - Power to issuedirections for blocking public
access of any Informationthrough any computer resource
ITA Section 80 - Power of police of-ficer and other officers to enter,search etc.
ITA Section 70 B - Indian computeremergency response team toserve as national agency for in-cident response.
HOT TIP
IT ACT Section 75 -To apply foroffence or contravention commit-ted outside India.
www.brilliancecollege.com
DIRECT COACHING HIGH POWER TRAININGBrilliance College \ v tI c-f -̄ nse F Ãm {] [ m\ Ø e-§ -f nepw t\ cn-«pÅ t I m̈n§ v ¢mÊp-I Ä. ¢mÊv k a-b-§ Ä : Morning, Day, Evening &Holiday Batches. ] pXnb _ m̈n\ v A Uvan-j ³ B cw-̀n-̈ p. Brilliance Col-lege sâ sXm«-Sp̄ {_ m© nte¡ v I S-¶ p-h¶ v D¶ X k À¡ mÀ DtZymKwDd-̧ m-¡ p-I .