Categories
Assistant IT & Cyber Laws

Cyber Laws – 13

സൈബർ സെക്യൂരിറ്റിയുമായി ബന്ധപ്പെട്ട പ്രധാന ത്രെറ്റുകൾ, കമ്പ്യൂട്ടർ വൈറസ്, മാൽവെയർ, ട്രോജൻ ഹോഴ്സ് എന്നിവയുമായി ബന്ധപ്പെട്ട ചോദ്യങ്ങളാണ് ഇന്നത്തെ പാഠത്തിൽ ഉൾപ്പെടുത്തിയിരിക്കുന്നത്.

  • Unauthorized copying, reproduction, use or manufacture of product is called

Software Piracy

 

  • Small program that monitors and retrieve the username or password of network users during their login

Password Sniffer

 

  • Practice of using the internet to harass or threaten someone is called

Cyber Stalking (e-stalking or Cyber Bullying)

 

  • How to avoid Cyber Stalking

Do not disclose any personal information, avoid sending photographs to strangers and chat friends, proper disconnection of internet after its use

 

  • Hacking of websites by password cracking and alteration of contents for fulfilling political objectives or for money is called

Web Jacking

 

  • Unauthorized changing of data before or during their input to a computer is called

Data Diddling

 

  • Procurement of identifying information without permission and using it fraudulently to obtain goods and services is called

Identity Theft

 

  • Unauthorized access to information system is called

Hacking

 

  • One who does hacking is called

Hacker

 

  • Hacking comes under which section of IT Act 2000

Section 66

 

  • Hackers who hacking system for good reason

White hat hackers or Ethical hackers

 

  • Hackers who hacking system for malicious reasons

Blackhat hackers

 

  • Hackers who hacking system sometimes for good reason and sometimes for malicious reasons

Gray hat hackers

 

  • Unauthorized use of internet hours paid for by another person is known as

Theft of internet hours

 

  • A computer connects to the internet that has been compromised by a hacker, computer virus or Trojan horse and can be used for malicious tasks is called

Zombie

 

  • Intellectual property rights refer to

Property rights through patents, copyrights and trademarks

 

  • Intellectual property right violations include

Trademark violations, computer source code theft, patent violation and software piracy

 

  • Theme of World Intellectual property day 2017

Innovation-Improving Lives

 

  • Position of India in Intellectual property index 2017

43

 

  • An attack meant to shut down a machine or network, making it inaccessible to its intended users

Denial of Service

 

  • In cyber law, DOS stands for

Denial of Service

 

  • Examples of Denial of service

Flood a network thereby preventing legitimate network traffic, disrupt connections between two machines, preventing an individual from accessing a service

 

  • The person who defined the term Computer Virus

Fred Cohen

 

  • A computer program that can damage the operations of a computer system

Virus

 

  • The term VIRUS stands for

Vital Information Resource Under Siege (Virtual InformationResources Under Seize)

 

  • First computer virus

Creeper (As per PSC)

 

  • First computer virus for MS DOS

Brain

 

  • First computer virus affected on ARPANET (ancient form of internet)

Creeper

 

  • Creeper was developed by

Bob Thomas

 

  • First microcomputer virus

Elk Cloner

 

  • First virus affected personal computer

Apple

 

  • First mobile phone virus

Cabir

 

  • Virus program writing programmers

Vickser

 

  • Examples for computer viruses

TEXAS, Blaster, Nimda, I Love you, Guppy, Melissa, Slammer

 

  • Recently happened cyber attack across 150 countries in the world

Wanna Cry

 

  • Wanna Cry spread through

Email

 

  • First country in which Wanna Cry attack reported for the first time

Panama (1989)

 

  • Wanna Cry is an example of

Ransomware

 

  • Program that makes the user unable to access the system and demanding some form of payments to unlock

Ransomware

 

  • Operating system being attacked by Wanna Cry

Windows

 

  • Ransomware that affected different countries including India recently

Petya

 

  • Examples of Ransomware

Golden Eye, Cryptolocker, Locky, Crysis, ZCrypt, Powerware, Hydra Crypt, Cerber, Cryptowall

 

  • Ad click malware that affected Google play applications recently

Judy, Skinner, False Guide

 

  • Computer software which is used to prevent, delete and detect the presence of Virus in Computer

Antivirus

 

  • Examples of antivirus programs

Avast, Avira, AVG, Kaspersky, Norton, McAfee

 

  • Subclass of computer virus that can replicate itself through network connections to any machine without human intervention

Worm

 

  • Malware which appears to be useful applications but allows the hacker to take control of the system

Trojan Horse

 

  • Facts about Trojan horse

They are not viruses, it does not replicate itself

 

  • Trojans which are activated at a certain time are called

Time bombs

 

  • Peace of code inserted into a software that will execute its malicious function when the specified conditions are met

Logic Bomb

 

  • Program that automatically renders advertisements in order to generate revenue for its author

Adware

 

  • Software that can record every keystroke we make using keyboard

Keyloggers


(To be Continued…)