Download as pdf or txt
Download as pdf or txt
You are on page 1of 16

GED Finale Question Suggestions

1. What do you mean by Cyber Law?


Ans:
Cyber law is the area of law that deals with the Internet's relationship to
technological and electronic elements, including computers, software, and
hardware and information systems. Cyber law means the laws that prevent or
reduce large scale damage from cybercriminal activities by protecting information
access, privacy, communications, intellectual property (IP) and freedom of speech
related to the use of the Internet, websites, email, computers, cell phones, software
and hardware, such as data storage devices.
The increase in Internet traffic has led to a higher proportion of legal issues
worldwide. Because cyber laws vary by jurisdiction and country, enforcement is
challenging, and restitution ranges from fines to imprisonment. Cyber law may
also be called as internet law.
2. What is Cyber Crime?
Ans:
Cybercrime is when people use computers or the internet to do bad things. It's like
regular crime, but it happens in the digital world. For example, stealing someone's
personal information online, spreading computer viruses, or hacking into a
computer system are all types of cybercrime. It's not a good thing because it can
hurt people and cause a lot of problems. That's why there are rules and laws in
place to stop and punish those who commit cybercrimes.
3. Classification of Cyber Crime?
Ans:

1
4. Examples of Cyber Crime.
Ans:
1. Hacking:
Someone secretly getting into your computer to see your personal pictures or
information without your permission.
2. Identity Theft:
Pretending to be you online and using your name and details to trick others or steal
money.
3. Online Fraud:
Creating a fake online store, taking people's money for products, and never
sending anything.
4. Phishing:
Sending fake emails that look real, asking for your password or credit card
information.
5. Cyber Bullying:
Sending mean messages or spreading hurtful rumors about someone on social
media.
6. Malware:
Sending a computer virus to someone's device that can damage or control it
without them knowing.
5. Nature and scope of Cyber Crime.
Ans:
Nature of Cyber Crime:
Cybercrime is like sneaky digital trouble. It happens when people misuse
computers or the internet to do bad things. The nature of cybercrime includes:`1
1. Secrecy: Cybercriminals try to do things secretly, like entering someone's
computer without them knowing.

2
2. Trickery: They use clever tricks to fool people into giving away their
personal information or money.
3. Digital Sabotage: Some cybercrimes involve damaging or disrupting
computers, like spreading harmful viruses.
4. Online Bullying: Cybercrime can also be like being a digital bully, being
mean to others on the internet.
Scope of Cyber Crime:
1. Global Reach: Cybercrime can happen anywhere in the world. Someone on
one side of the planet can cause trouble for someone on the other side.
2. Many Forms: It comes in different forms, from stealing information to
spreading fake websites or emails, making it diverse and hard to stop.
3. Targets Everyone: Anyone using the internet can be a target – regular people,
businesses, or even governments. No one is entirely safe.
4. Always Changing: As technology grows, so does cybercrime. New types of
digital trouble keep appearing, making it a constantly evolving challenge.
6. Reasons of Cyber Crime.
Ans:
1. Easy Access to Technology:
Nowadays, many people have easy access to computers and the internet. When
technology is easily available, some individuals might misuse it for bad things.
2. Anonymity on the Internet:
People can hide their real identity online. Being anonymous makes it tempting for
some to do things they wouldn't do in real life.
3. Lack of Cyber Awareness:
Not everyone knows how to stay safe online. If people are not aware of online
dangers, they might unintentionally fall into cyber traps.
4. Financial Motives:
Some cybercriminals want to make money illegally. Stealing information or
tricking people online can be a way for them to gain money without getting caught
easily.

3
5. Global Connectivity:
The internet connects people worldwide. Cybercriminals can target anyone,
anywhere, making it difficult to trace and catch them.
6. Constantly Evolving Technology:
Technology keeps changing rapidly. As new tech emerges, so do new ways for
cybercriminals to exploit it for their benefit
7. What are the Cyber laws in Bangladesh?
Ans:
Here's cyber laws in Bangladesh :
1. Information and Communication Technology Act, 2006,
2. Bangladesh the Penal Code, 1860
3. The Pornography Control Act, 2012
4. The Digital Security Act, 2018
5. The Bangladesh Telecommunication Act, 2001.

These laws are meant to keep the internet and digital activities safe and fair for
everyone in Bangladesh.

8. What do you mean by Pornography?


Ans:
Pornography is pictures, videos, or words that show private parts of the body or
sexual activities. People make or use these things to create a feeling of excitement
or interest in sex. Different places have different rules about what's okay and
what's not okay when it comes to pornography.

4
9. Which Section prohibit pornography activities. Describe the procedure of
investigation, caesar and trial of pornography activities.
Ans:
Section prohibit pornography activities:
Laws related to pornography can vary by country, and there may not be a single
section universally applicable. In many legal systems, restrictions on pornography
are often found in different parts of the law, such as obscenity laws or regulations
related to indecent or explicit materials.
As an example, in some jurisdictions, you might find regulations within the
criminal or penal code that address the creation, distribution, or possession of
explicit content. However, the specific sections and wording can differ.
To know which section prohibits pornography activities in a particular country,
you would need to check the relevant legal documents or consult with legal experts
familiar with the laws of that specific jurisdiction. Laws can change, so it's
important to refer to the most current legal information.
The procedure of investigation, caesar and trial of pornography activities:
The procedure of investigating, charging, and prosecuting individuals involved in
pornography activities can vary depending on the legal system and jurisdiction.
Here's a general overview of the process, but keep in mind that details may differ:
Investigation:
1. Complaint: Someone tells the police about suspected pornography
activities.
2. Check: The police look into the information to see if there's a reason to
investigate.
3. Permission: If needed, the police get permission from a court to search for
evidence.
4. Collect Evidence: The police collect things like explicit materials or
computers that might have evidence.
Charging (Caesar):

5
1. Decide Charges: The police, with legal experts, decide what charges to
bring based on the evidence.
2. Legal Approval: The charges are reviewed and approved by legal experts,
known as prosecutors.
Trial:
1. Court Time: The accused people go to court to have their case heard.
2. Show Proof: The lawyers show evidence to prove if the accused are guilty
or not.
3. Talk in Court: Lawyers on both sides talk about what happened.
4. Judge Decision: The judge decides if the accused are guilty or not guilty
based on the evidence.
Sentencing:
1. Decide Punishment: If guilty, the judge decides what punishment is
suitable.
2. Penalties: Punishments could be fines, going to jail, or other consequences.

10. What are the punishments for pornography activities?


Ans:
The punishments for pornography activities are:
1. Fines: People might have to pay money as a punishment. The amount can
depend on the seriousness of the situation.
2. Going to Jail: In more severe cases, someone might have to go to jail. The
length of time can vary based on how serious the offense is.
3. Probation: Instead of jail, some individuals might be watched by the
authorities while living in the community. They have to follow certain rules
during this time.
4. Community Service: Offenders might be asked to do work for the
community for a set number of hours.

6
5. Registering as a Sex Offender: In some places, those found guilty of
certain offenses might have to register as a sex offender. This means they
have to share their information with the community.
6. Losing Gained Money: If someone earned money through illegal activities
related to pornography, the authorities might take away those earnings.

11. What is Digital signature?


Ans:
A digital signature is like a virtual autograph for things on the internet. It shows
that someone has given their approval or agreed to something online. It's a secure
way of saying, "Yes, this is really from me," and it helps ensure that online
documents or messages are genuine and haven't been altered by someone else. So,
it's kind of like a special online seal to verify the authenticity of stuff on the web.
12. What are the authorities of Digital Signature?
Ans:
The authorities or capabilities of a digital signature include:
1. Authentication:
 Verifies the identity of the person or entity signing a document or
message.
2. Integrity:
 Ensures that the content of a document or message has not been altered or
tampered with.
3. Non-Repudiation:
 Prevents the signer from denying their involvement or approval of the
content.
4. Security:
 Protects against forgeries using cryptographic techniques.
5. Verification:
 Allows easy confirmation of the authenticity of the digital signature.
7
6. Efficiency:
 Streamlines electronic transactions, making them quicker and more
convenient.
7. Legal Recognition:
 Holds legal validity in many jurisdictions, equivalent to handwritten
signature
13. How Digital Signature is granted as authentication?
Ans:
Digital signatures use a process called public-key cryptography to grant
authentication. Here's a simplified explanation of how digital signatures provide
authentication:
1. Secret Code:
 Imagine you have a secret code that only you know. This is like your "super
secret key."
2. Creating a Stamp:
 When you want to say, "Yes, I approve this," you use your secret code to
create a special stamp. This stamp is your digital signature.
3. Sharing a Code:
 You also have another code that you're okay with everyone knowing. It's like
a magic decoder that can read your special stamp. This is your public key.
4. Checking the Stamp:
 When others receive your signed message, they use the magic decoder (public
key) to check if your stamp is real. If it is, they know you truly approved it.
5. Authentication:
 Because only your secret code can create that special stamp, and everyone can
use the magic decoder to check it, people trust that the message is really from
you.

8
14. How Electronic records are granted as authentication?
Ans:
Electronic records can be granted authentication through various methods, and one
common approach involves the use of digital signatures. Here's how it works in
simple words:
1. Digital Signatures:
Think of it like putting a unique stamp on a digital paper. It shows who sent it and
makes sure it hasn't been changed.
2. Authentication Tokens:
Using a special code from a device, like a secret key, to confirm that the person
trying to use the record is really allowed to.
3. Biometric Authentication:
Using unique things like fingerprints or face scans to make sure only the right
person can access or approve the record.
4. Multi-Factor Authentication (MFA):
Asking for more than one thing to make sure it's really you, like a password and a
special code sent to your phone.
5. Blockchain Technology:
Imagine a super-secure ledger that keeps track of records. Once something is
added, it's really hard for anyone to change or fake it.
6. Time Stamping:
Putting a time stamp on a record to show exactly when it was made or changed,
helping to confirm its authenticity.
15. Who are Controllers? How they are appointed? What are their functions?
Ans:
In legal or regulatory contexts, the term "controllers" is often associated with data
protection and privacy regulations, where a "controller" is an entity that determines
the purposes and means of processing personal data. For example, in the General
Data Protection Regulation (GDPR), a controller is a natural or legal person, public

9
authority, agency, or other body that, alone or jointly with others, determines the
purposes and means of the processing of personal data.
They are appointed:
1. Identification of Controllers:
 Organizations need to identify whether they fall under the definition of a
data controller. This involves assessing their role in determining how
and why personal data is processed.
2. Legal Designation:
 In some legal frameworks (e.g., GDPR in the European Union), the
appointment of a controller may be a legal designation based on the
entity's role in data processing.
3. Internal Decision-Making:
 Organizations typically decide internally which individuals or
departments will take on the responsibilities of being a data controller.
This decision may be influenced by the nature of the organization's
activities and data processing practices.
4. Documentation:
 Once appointed, the organization may document the appointment of
controllers in internal policies, procedures, or official documents. This
documentation helps clarify roles and responsibilities.
5. Communication:
 The appointment of controllers may be communicated internally within
the organization, making relevant employees aware of their
responsibilities in handling personal data.
6. Compliance with Legal Requirements:
 Organizations need to ensure that their appointment of controllers
complies with the specific legal requirements outlined in applicable data
protection laws and regulations.
7. Training and Awareness:

10
 Individuals appointed as controllers may receive training on data
protection laws, privacy policies, and best practices to ensure they fulfill
their roles effectively.
Their functions:
1. Decide Why Data is used:
• Controllers decide why and how personal information is used.
2. Follow the Rules:
• They make sure that using the data follows the laws and rules.
3. Ask for Permission:
• When needed, they ask people if it's okay to use their information.
4. Collect Information:
• They gather the necessary information for specific reasons.
5. Keep Data Safe:
• Controllers make sure personal data is kept safe and secure from
unauthorized access.
6. Check Data Accuracy:
• They ensure that the information is correct and up-to-date.
7. Use Only Necessary Data:
• Controllers only use the data that's necessary for the reasons they decided
on.
8. Delete Old Information:
• They decide when to delete or no longer use information that's not needed.
9. Help People with Requests:
• Controllers assist individuals who want to access, correct, or delete their
own data.
10. Think About Privacy:
• They consider privacy when creating and using systems and processes.

11
16. Who are certifying authorities? How are they appointed? When their
license can be cancelled?
Ans:
Certifying authorities, also known as certificate authorities (CAs), are trusted
entities responsible for issuing digital certificates that verify the authenticity of
online entities, such as websites, servers, or individuals. These certificates play a
crucial role in establishing secure and encrypted connections over the internet.
Examples of certifying authorities include:
1. DigiCert
2. Let's Encrypt
3. Sectigo (formerly Comodo)
4. GlobalSign
5. Entrust
6. Symantec (now part of DigiCert)
Certifying authorities are like special security guardians for the internet. They
get appointed or recognized through a few simple steps:
1. Following Rules:
 They need to follow important rules and standards for online safety.
2. Legal OK:
 They must obey the laws and rules in the places where they work.
3. Getting Trusted:
 Big internet companies decide which certifying authorities are
trustworthy. They include the good ones in their systems.
4. Regular Checks:
 Certifying authorities might be checked regularly to make sure they
are doing things securely.
5. People Trust:
12
 By doing their job well and being reliable, certifying authorities earn
the trust of people who use the internet.
In general, there are common reasons and situations that might lead to the
cancellation or revocation of a certifying authority's license:
1. Breaking Rules:
• If they don't follow the important rules and laws for online safety.
2. Security Problems:
• If there's a big security problem, like information getting into the
wrong hands.
3. Not Doing the Job Right:
• If they make mistakes or do things that are not trustworthy, like giving
out permissions when they shouldn't.
4. Not Passing Checks:
• If they don't pass regular checks to make sure they're doing their job
securely.
5. Losing People's Trust:
• If people stop trusting them because they keep making mistakes or
doing things that aren't safe.

17. Who is subscriber? What are their duties?


Ans:
A subscriber is a person who signs up for something regularly. It could be for a
magazine, internet service, or a YouTube channel. They agree to get or use that
thing on a regular basis and might pay for it, like when you subscribe to a
magazine and get it delivered to your home every month.
"Subscriber duties" refer to things that people need to do when they sign up for
different services. Here are some simple explanations:
1. Pay on Time: If you get a phone or internet service, you must pay your bills
when they are due.

13
2. Follow the Rules: Read and follow the rules that come with your service.
These could be about how to use it or what you're allowed to do.
3. Cancel if Needed: If you don't want the service anymore, you might need to
cancel it. There could be specific steps to do this.
4. Read and Agree: When you sign up for things like newsletters or online stuff,
make sure to read what they send you and agree to their terms.
5. Give Correct Information: If you sign up for anything, make sure to give the
right information so you get what you want.

18. What are their works Digital Security Agency, Forensic Lab, Emergency
response team? How they are made?
Ans:
Their works are:
1. Digital Security Agency:
 Keep computer and online things safe.
 Watch for bad computer activities.
 Stop hackers and computer problems.
 Teach people how to stay safe online.
2. Forensic Lab:
 Solve computer crimes and find evidence.
 Look at computers to find clues.
 Get back lost or deleted information.
 Help in legal cases by telling what they found.
3. Emergency Response Team:
 Help when there's a big problem or danger.
 Quickly help in accidents or disasters.
 Plan and practice for emergencies.

14
 Talk to others and work together to keep people safe.
They are made:
1. Digital Security Agency:
 Make a Plan: Decide that you need a team to keep computers safe.
 Get the Right People: Hire smart people who know a lot about
computer safety.
 Use Good Tools: Set up computers and tools to watch and stop any
bad things happening online.
 Teach Everyone: Tell people how to stay safe on computers.
2. Forensic Lab:
 Decide Why You Need It: Think about why you need a lab to solve
computer problems or crimes.
 Follow the Rules: Make sure to do things the right way, following the
laws about finding evidence.
 Find Smart People: Get experts who know how to look at computers
and find clues.
 Get Tools: Set up a lab with computers and tools to find lost or
deleted information.
3. Emergency Response Team:
 Think About Dangers: Figure out what kinds of big problems or
dangers might happen.
 Work Together: Talk to others like police or firefighters and plan
how to help in emergencies.
 Practice a Lot: Train your team to be ready. Do pretend emergencies
to get better.
 Get Things Ready: Have the right equipment and plans to help in
emergencies

15
19. What are the functions of Cyber Tribunal and Cyber Appellate Tribunal?
How are these constituted?
Ans:
Here are the functions of a Cyber Tribunal and Cyber Appellate Tribunal explained
in simple terms:
1. Handling Cyber Crimes: These tribunals deal with crimes that happen on
the internet or through computer systems, like hacking or online fraud.
2. Reviewing Decisions: If someone disagrees with a decision made by a lower
court about a cyber-related issue, they can ask the Cyber Appellate Tribunal
to review it.
3. Explaining Laws: These tribunals help explain and interpret laws related to
cybersecurity and online crimes, making it easier for everyone to
understand.
4. Making Rules: They may create rules and guidelines to make sure people
and organizations follow cybersecurity laws properly.
5. Solving Disputes: If there's a disagreement related to cyber activities, these
tribunals can help find solutions outside of traditional courts.
6. Teaching and Helping: They also educate people about cyber laws and how
to stay safe online, and provide support to law enforcement agencies dealing
with cybercrimes.
The constitution or formation of a Cyber Tribunal and Cyber Appellate Tribunal can
vary depending on the legal system and jurisdiction. Here's a simplified explanation:
1. Laws Create Them: The government makes rules to set up these tribunals.
2. People Are Chosen: Experts in law and technology are picked to be part of
these tribunals.
3. Experts Needed: They need to know about laws and technology stuff.
4. How Long They Work: There are rules about how long they can work there.
5. They're Independent: They're kept separate from other stuff so they can be
fair.
6. They Get Help: They have people to assist them and tools they need.
7. Rules They Follow: They have guidelines on how they handle cases.

16

You might also like