Sunday, March 11, 2018

Information Technology and Cyber Law 10

സൈബർ സെക്യൂരിറ്റിയുമായി ബന്ധപ്പെട്ട പ്രധാന ത്രെറ്റുകൾ, കമ്പ്യൂട്ടർ വൈറസ്, മാൽവെയർ, ട്രോജൻ ഹോഴ്സ് എന്നിവയുമായി ബന്ധപ്പെട്ട ചോദ്യങ്ങളാണ് ഇന്നത്തെ പാഠത്തിൽ ഉൾപ്പെടുത്തിയിരിക്കുന്നത്
  • Unauthorized copying, reproduction, use or manufactute of product is called
                   Software Piracy
  • Small program that monitor and retrieve the user name or password of network users during their login
                   Password Sniffer
  • Practice of using internet to harass or threaten some one is called
                   Cyber Stalking (e-stalking or Cyber Bullying)
  • How to avoid Cyber Stalking
                   Do not disclose any personal information, avoid sending photographs to strangers and chat friends, proper disconnection of internet after its use
  • Hacking of websites by password cracking and alteration of contents for fulfilling political objectives or for money is called
                   Web Jacking
  • Unauthorized changing of data before or during their input to a computer is called
                   Data Diddling
  • Procurement of identifying information without permission and using it fraudulently to obtain goods and services is called
                   Identity Theft
  • Unauthorized access of information system is called
                   Hacking
  • One who does hacking is called
                   Hacker
  • Hacking comes under which section of IT Act 2000
                   Section 66
  • Hackers who hacking system for good reason
                   White hat hackers or Ethical hackers
  • Hackers who hacking system for malicious reasons
                   Black hat hackers
  • Hackers who hacking system sometimes for good reason and sometimes for malicious reasons
                   Gray hat hackers
  • Unauthorized use of internet hours paid for by another person is known as
                   Theft of internet hours
  • A computer connects to the internet that has been compromised by a hacker, computer virus or Trojan hourse and can be used for malicious tasks is called
                   Zombie
  • Intellectual property rights refers to
                   Property rights through patents, copyrights and trademarks
  • Intellectual property right violations include
                   Trademark violations, computer source code theft, patent violation and software piracy
  • Theme of World Intellectual property day 2017
                   Innovation-Improving Lives
  • Position of India in Intellectual property index 2017
                   43
  • An attack meant to shut down a machine or network, making it inaccessible to its intended users 
                   Denial of Service
  • In cyber law, DOS stands for
                   Denial of Service
  • Examples of Debial of service
                   Flood a network thereby preventing legitimate network traffic, disrupt connections between two machines, preventing an individual from accessing a service
  • The person who defined the term Computer Virus
                   Fred Cohen
  • A computer program that can damage the operations of a computer system
                   Virus
  • The term VIRUS stands for
                   Vital Information Resource Under Siege (Virtual InformationResources Under Seize)
  • First computer virus
                   Creeper (As per PSC)
  • First computer virus for MS DOS
                   Brain
  • First computer virus affected on ARPANET (ancient form of internet)
                   Creeper
  • Creeper was developed by
                   Bob Thomas
  • First micro computer virus
                   Elk cloner
  • First virus affected personal computer
                   Apple
  • First mobile phone virus
                   Cabir
  • Virus program writing programmers
                   Vickser
  • Examples for computer viruses
                   TEXAS, Blaster, Nimda, I Love you, Guppy, Melissa, Slammer
  • Recently happened cyber attack across 150 countries in the world
                   Wanna Cry
  • Wanna Cry spread through
                   Email
  • First country in which Wanna Cry attack reported for the first time
                   Panama (1989)
  • Wanna Cry is an example of
                   Ransomware
  • Program that make the user unable to access the system and demanding some form of payments to unlock
                   Ransomware
  • Operating system being attacked by Wanna Cry
                   Windows
  • Ransomware that affect different countries including India recently
                   Petya
  • Examples of Ransomwares
                   Golden Eye, Cryptolocker, Locky, Crysis, ZCrypt, Powerware, Hydra Crypt, Cerber, Cryptowall
  • Ad click malware that affect Google play applications recently
                   Judy, Skinner, False Guide
  • Computer software which is used to prevent, delete and detect the presence of Virus in Computer
                   Antivirus
  • Examples of antivirus programs
                   Avast, Avira, AVG, Kasperesky, Norton, MaAfee
  • Subclass of computer virus that can replicate itself through network connections to any machine without human intervention
                   Worm
  • Malware which appears to be useful applications but allow hacker to take control of the system 
                   Trojan Horse
  • Facts about Trojan horse
                   They are not viruses, it does not replicate itself
  • Trojans which are activated on certain time are called
                   Time bombs
  • Peace of code inserted into a software that will execute its malicious function when the specified conditions are met
                   Logic Bomb
  • Program that automatically renders advertisements in order to generate revenue for its author
                   Adware
  • Software that can record every keystroke we make using keyboard
                   Keyloggers
                                                                          (To be Continued...)

No comments:

Post a Comment