Cyber Security Important Questions Chapter 3, 4, 5 RGPV (CS503 (C) )

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 20

Date

Paga

AsSINHENT3
Q O h a t is II Act 2000. AeSCnbe the salN.
eotunes h II Act 2000

y Act 200O0 olsS9


Jhe in\moton technclag
koown Q s a n Act preposed
tne Sndion Panlioment
Qcrobe 2000

Extronc Comnnce

electaoic, diqito anline ransatianS and


allevate atduce bimes he FâLT
Act os Choprens ond90 5ehans

ine II Act has 2 scheduen i


"Eirst Schele - d e o 1 s t douments to
which

sesan Schedule - densth electrOic Sratne

method

wth The Cmputen Sounce dacInnts


nalty mmscepresEntarino
Dato
Pago

0 rploio the teenage uoeb vonda)


UOndasiSm
destnucticon inguydisgunenen
priuae propenhË eal m
csith out the Consent ol the aoo
peisonS
hauing stody m
VondallSn include uOide wamiehy ohacts
including rabttidamagiag
damaging pcopky sheal iag
street siqns nson homes
toilet papen ing homesand nhen tpes a
mischiet
03) hat Qne tne digent shrateqies tocele
yben cime ?
Paotect YcounMost Vsible Asset - Procduçts eie
matuome Ond äLlnenabiity scannens.
pplicatico
his impntant assel

Fous on EHes = Asøphisthcated detenm1na


woill eventuaay ge n Com poiD
aduensat
shauld\acs an deiechag tnefs ab
and ad uensou actiuit
Delte
Page

Remennbenthot people 01e

euenhon is aluays beten han aime


13 aluoays beHen t o teke
Onneet

>|tentiljcaticoo
educalicor will asSiSE S1esponsible
|Compcnie and cns to neet hesSe
challengs.
A pen Son should neven seno his credit
CCMd nuben i debit cad nunbe
anysitethat S not Seced
guad agsinst tuds

94) ecplain email abusinoA hou) ít canD


minimized?
Cmarl abusealso k/o iunk sa
type elect COnic spam emarlUnsoicitco
messg
Spam nessages
ane com mecia
wbene
Dato
Pago

but nay alsco Contin diguised inks tnot


appem to be omilin websiten but i n
Lact ead o phishing weh
e hosing malu0ne
siteD

everotLon3
>USe an emo checken
>Aucoid punchasiag cmal lists
1me yaun Campoigns iook egitimate
Use tbe double mptin method to colec emas
oddresses
|> Maintgn CConsiStent sending schedule

95) iscss tne


gt means
tenm ynn tfauda
tne pen son oho is dong the ad cheating
bn crime ie stealing passuond c dato
has done i t tn nouing guilty mind
Stucoge
which Seods +a \raud a cheating

6)Jescribe the tenm copyright 0ct & potent hw?


tothe
CspHignto intellecuc popenhy
Jhis
tenmS Copycigt is the cignt to capy
ncas That tne origaa Creator S o pducds
Cate
Pene

and anyoneney give athoriratiog


ane the ony ones ith the
right to reproduce tne uogk eccuSie
Capyright lau gus creaors origngl
motenia0 tne ercusive ight
USe and duplicore that
t motenicl ntha
.a
given omount time
epiceotheCoDyigbrd
public
domain
iten beconeb

Poteot Lau
A patent is a fmmoh
erchswe ighrs
00_iovegtol
tonteaya soveneigo stote to
n their imited penicd o
tnne in
assigree
erchane n tre oublic discioSne

t
pateot is o gal mcon spolhicn
rante d a Qimited time
couny
to the cOonee huentioO Heely
to USe patented
tne
Dolo
Pago

what ane tne dinent tpes oh haceging


tools?

>Ettencap
anllgsis St gt tne Capabith
an sSS SS H CODnectcno.

2>Netsnken i S+ outomatical0 detecs.


Uylaenablis

3 Bunp Suite i St helps in Secumty tests


iS. handy testing coeb app
the Rippen -
strength a tne passcOCnd
Brute Lmce ís
is used ta hock
possSnds
Dete
Puga

AssiCaN HENT - H

onescribe the Bndian Eus dence Act


1872 VS I I Act 20oO?

Bodian Euidence Act 1812. vS II ACt 20OO

gt n0S een Seen tht the eVCluOtiao o eectroOC


deviees evidence in cden to its thetcihg
in he
iLeQweS speciolized erpent traioing
eid ot ybenspace
lJne 9ndion Evidence wshic has been amended
La conSeaence o 9ecticon 92 o) IT Act
Svidence AC include
Jne Omendment ne

o tneOMds elechronic cecnd!


the additoo
the
neneby paniHing admissibilty
lectrOnic VIdence

Rega-dng
seccon 59, uhich incaporoten doanmntg
tne wods " Contents a) documents"
evidence"
have been Subat tojed

setion 65À 65B wene


Sn addution to tnis provide
insate d by ay o Omend met evidence
adn3Sibility s Clech Canic
-nthe
Dsta

the
Funthen secthiun 79D a
sectitn 45 o ne indionEude
Section 45 , tne IEA prauLde
Aet
Cpunin erpents

te gtotus o
plechooic Ghelmds as
electroniC
II Act 2000?
eudence belne ajn.
cectronic secacds
Beoxe TT ACE 2000
euicdence

spcalies n
ngian Eidence ac sectian 65 euLdence i
Ladmsihlit secandamy
Eechioo 650 spechs
the contears t
mce duzeapag
eletconiC1eCords uhich noue hee0.
laidde

unde SCctian 65R


Essentia elemeatsy
gndian Evidence Act

1) snould ne produced hu tne pens


authrired to baue

pace du
inlo must toke
tne
thot peSGo
Dete
Page

L3)Jnot stared
ed ino has bee
electCOOic device
duning day
geneoo pensn

Ayen I* Act 200O electronc


eideoe
AD Leqol seCognítion a eletOnic Records

2) Use a electronic ceCords ig Gouenme


and its agentes CseeHon 6
Retenionoelectro Cecords

corite short about digto) sigghMe ?


note
A digitol sqrotlei ye
atachment tnat qiues proo That tne
dacuent le bos been mmded
Since creatian Jhey Qme some as. honductte
Slaqtunes

Cer toin Degol ccitnig


sigotuhe Youn
itnessed by mtnen
othe
Pago
Loo our
attoched sigogtuneis oho signed
the (ontent uenibLotenthe
Used
to
authenticity
Jhe
original digto)Sigatune is
moteni ola atached to the
tne
matenial
Data
ttiosh}essage
Hessage
HOSb
Sendens
Sig Privae

ohe use m publíc &pcivote SignatuHe


Reys detenmíne tnot Loho
Creote the
ahoCan wenitsignotue
it
d Dota

uhat ab7e rule


ab digtalendence ?
Jnere ane 5 genenal rle euidence
Admssi b)e atdigita
Authentic
Compie
Reliable
Belieyeable
Deto
Pego

rule
Admi9si ble - most basC Fete& meoSe
evidence uaidity ond in portonce the evideoce
must e pressuned ond gathenod in Such a coay
tnat tcan he used

Authenic i- dne euidenc e isAresented jt must


|be tied to tne incident
prove SameThing Jhe nensiC er ominen must

be accauntale the oigin tne evLdence

|Complete i- cinen evidence is presented tmusE


ihen evidence
be clea and complete should retect the
loshole stoy g+ is ngt enough to ccOllecE
ouieoce aat ust shcaus
Hhe tne incident peese nhag incomplete evidene

Reliable i- evidece device must

De audi ble hiS deends


methodolhogt used.

Be)reueoble- A mensiC ecominen must be able


t er plaln hich cloniy and concisenesS olhat
pccecesSe s tney used ano the uoy the integy
Oevid ence was preseNed
Data
Paga

95) hat do yo undenshond


elrroniC afa
ga ogreements.
Pcoo electronic agreement cets to
|the een evidence
tuxo mne pantien
documentatíon
have enteed ito
a egall binding conbtruct grees Met
thraphelec+oonic

ElectrConiC Recond Record the eletr ooic


aommunicatio intenaction Such
email diqta signchge chat

Electronic Iroils. gn sONeCase> he ekctooC


discUSS iOOs
Jcoadi p to the agreerent
be consídend as Cvidence

3) Obtencone
Jimestomps electrOnic agreements
whe the
with je time stamp indiCating
AgreemeGt uos made

igitol Sigmahuo - digitol signctue


wyo Conirm me identit
thei )nteotiO
Dete

into an agreement

Comlance oith Jegol Reyuirements- tcoco


he electionic agreenent Cornol ieS
Tegegulaions Such as
e-sigoatuelaws
Dete

procy senNe? Hco atocken Ottach


pocy Senuen ?

in temediating blus the ceqyieSt ma de b


ClietS panticulam SenuS Senvre
ests
equests so
SOMe cesowICeD

Purpose

Reeps the sstem seAAS hiddeoit maynco


be secune
> gt usen catching to spee up acces
speed up access to cesoiO
>uowanted contents ane tened by SoSe
speciao pory env
>> Jo enable the coDncct numbem ol computens
inte net
Senue Can be
anly
Ie acdd multiplecers

2 cite short Dote an SPHOane?


MaiciouS

in usens compute gathens data


deuice anÎ uses & Senctst
& third panio
their COnsOt
Pogs

IneURL
D0TS Py
Visite

b4 this spy haspoucnu

)e-RlGSten : t is apooenu) spPA 9


emoLsent ond eueued uouGus
e deLonlaoded uplsaded nudA
atha actidite)
besides the beylogging and wbsile.
atching
&)Spector Pro: All ne chts 6 instont MSSapo

9ecie ved maIS Beside tnis S t


also captgeD uehSte yisiked

eSCribe uonious types oy atacks?

Creotion 9otenot

Qnotne op ystm
Dete

Sucl Atoc k ASmurl atoce


denia0 col Senvíce CoDOS)
atachen Qttach to tazgeed
witt Sotenet COntrol
paceeS
message
3 TeOrdrop Attock i Jhe teandc op aOck seS a
pcogcom that Causes ogentanoO JCe
pacee ts e-0 S5emblyA cause
the uictim Systemto

BenElouo Attac k ottac2s


COmnog Cybenattoces tho+ dei beotely
bubgn sUnlous lneabli
ohee USen- control led data aoritten

Lo corite dibtenent metnods a pniShing


NuneNOuS dibent typen ay phising atocks
bove nobeeO
peueOt mehadsi
idented

Han-in-he middlephishing
etec tnan monyothe ms
8n tnese ockens pohoo
ish ing
Data
Paga.

Ahemselwebbl he Usen A the eoi HimaBe


the
websie msyste
ntened
ahey
ba but Contribute
intnmah
bea e tronsactiics
Qnto that

URL Qbjechon AHocks is dhe gecre iny


phishinG atacas. attaiOS. to
get the

message cipeies to
to tne aHackens
lollo0 a hypnlink
Oithout trem
Lmecying that they have been dumoed

Sescri be tne phaseS ol U mS propagohion?


Docmant Phase Vicus is jde Tbe VICUS
eUentualy he aciuated by S0me
eent Such dote

Otne disk
pragram ylla the Capucty

|Pcopagation Pnae wicus place


plac on ideotaa
nto
int
anotho pragrOm
centoín uS tern +ne disk
Dete
Puge.

Phase:he
Origaenig Phase Vius is acHJared
vir
pelnm tne
w0S intented Asuaíth TNe dorGAt
phase

erecicon Pnase i dae nction Is penled t


may be hannlesS Such as mesSage
Screen m demandiag Such as the deStrrtioo

01) Eploin d g e t tpe af uinuses in detoul ?

he
-Stealth Vicus
Palyma phic icus
Panosthc WifuS
Hencyesidcat vicas
Bcoot Setar Virus

Stea lth Vas ALm af uirus epicitly desigcd


derection byt
sOne
Vicus AviuS That manpulat co
DLumccphi
mutoreihay ihleh moking
Secror
virus
Boct iemory Hhuositic
dehctioby

-Resident
4omdisk
the andpcagcontha Eram
eveny ponhat
Vicus. Virus
he
sprenà
detaches
MeplicotesroditOnoIhe
yirus
cantaingdisk
wben a uiruses
mo}
reSideo
a odqes
whentne
CrcCAte
boGted is
te
mimuy
main in
Sysfem
tne CLeutable Pogs Dale

Gecind
boot

paan

You might also like