Assistant IT & Cyber Laws

Cyber Laws – 13

സൈബർ സെക്യൂരിറ്റിയുമായി ബന്ധപ്പെട്ട പ്രധാന ത്രെറ്റുകൾ, കമ്പ്യൂട്ടർ വൈറസ്, മാൽവെയർ, ട്രോജൻ ഹോഴ്സ് എന്നിവയുമായി ബന്ധപ്പെട്ട ചോദ്യങ്ങളാണ് ഇന്നത്തെ പാഠത്തിൽ ഉൾപ്പെടുത്തിയിരിക്കുന്നത്.

  • Unauthorized copying, reproduction, use or manufacture of product is called

Software Piracy


  • Small program that monitors and retrieve the username or password of network users during their login

Password Sniffer


  • Practice of using the internet to harass or threaten someone is called

Cyber Stalking (e-stalking or Cyber Bullying)


  • How to avoid Cyber Stalking

Do not disclose any personal information, avoid sending photographs to strangers and chat friends, proper disconnection of internet after its use


  • Hacking of websites by password cracking and alteration of contents for fulfilling political objectives or for money is called

Web Jacking


  • Unauthorized changing of data before or during their input to a computer is called

Data Diddling


  • Procurement of identifying information without permission and using it fraudulently to obtain goods and services is called

Identity Theft


  • Unauthorized access to information system is called



  • One who does hacking is called



  • Hacking comes under which section of IT Act 2000

Section 66


  • Hackers who hacking system for good reason

White hat hackers or Ethical hackers


  • Hackers who hacking system for malicious reasons

Blackhat hackers


  • Hackers who hacking system sometimes for good reason and sometimes for malicious reasons

Gray hat hackers


  • Unauthorized use of internet hours paid for by another person is known as

Theft of internet hours


  • A computer connects to the internet that has been compromised by a hacker, computer virus or Trojan horse and can be used for malicious tasks is called



  • Intellectual property rights refer to

Property rights through patents, copyrights and trademarks


  • Intellectual property right violations include

Trademark violations, computer source code theft, patent violation and software piracy


  • Theme of World Intellectual property day 2017

Innovation-Improving Lives


  • Position of India in Intellectual property index 2017



  • An attack meant to shut down a machine or network, making it inaccessible to its intended users

Denial of Service


  • In cyber law, DOS stands for

Denial of Service


  • Examples of Denial of service

Flood a network thereby preventing legitimate network traffic, disrupt connections between two machines, preventing an individual from accessing a service


  • The person who defined the term Computer Virus

Fred Cohen


  • A computer program that can damage the operations of a computer system



  • The term VIRUS stands for

Vital Information Resource Under Siege (Virtual InformationResources Under Seize)


  • First computer virus

Creeper (As per PSC)


  • First computer virus for MS DOS



  • First computer virus affected on ARPANET (ancient form of internet)



  • Creeper was developed by

Bob Thomas


  • First microcomputer virus

Elk Cloner


  • First virus affected personal computer



  • First mobile phone virus



  • Virus program writing programmers



  • Examples for computer viruses

TEXAS, Blaster, Nimda, I Love you, Guppy, Melissa, Slammer


  • Recently happened cyber attack across 150 countries in the world

Wanna Cry


  • Wanna Cry spread through



  • First country in which Wanna Cry attack reported for the first time

Panama (1989)


  • Wanna Cry is an example of



  • Program that makes the user unable to access the system and demanding some form of payments to unlock



  • Operating system being attacked by Wanna Cry



  • Ransomware that affected different countries including India recently



  • Examples of Ransomware

Golden Eye, Cryptolocker, Locky, Crysis, ZCrypt, Powerware, Hydra Crypt, Cerber, Cryptowall


  • Ad click malware that affected Google play applications recently

Judy, Skinner, False Guide


  • Computer software which is used to prevent, delete and detect the presence of Virus in Computer



  • Examples of antivirus programs

Avast, Avira, AVG, Kaspersky, Norton, McAfee


  • Subclass of computer virus that can replicate itself through network connections to any machine without human intervention



  • Malware which appears to be useful applications but allows the hacker to take control of the system

Trojan Horse


  • Facts about Trojan horse

They are not viruses, it does not replicate itself


  • Trojans which are activated at a certain time are called

Time bombs


  • Peace of code inserted into a software that will execute its malicious function when the specified conditions are met

Logic Bomb


  • Program that automatically renders advertisements in order to generate revenue for its author



  • Software that can record every keystroke we make using keyboard


(To be Continued…)