സൈബർ നിയമങ്ങൾ, സൈബർ കുറ്റകൃത്യങ്ങൾ എന്നീ പ്രധാന ഭാഗങ്ങളുമായി ബന്ധപ്പെട്ട ചോദ്യങ്ങളാണ് ഇന്നത്തെ പാഠത്തിൽ ഉൾപ്പെടുത്തിയിരിക്കുന്നത്
(To be Continued...)
- First cyber law in India
- IT Act 2000 was enacted on
- IT Act 2000 came into force on
- Four types of cyber laws are
- The headquarters of Asian school of cyber laws
- First cyber crime police station in India
- First cyber post office in India
- First cyber forensic laboratory in India
- First cyber police station in Kerala
- No of chapters and sections in IT Act 2000
- Regulatory authority of IT Act 2000
- IT regulations 2001 came into force on
- Cyber offences according to IT Act 2000
- The term Electronic signanture was introduced by
- IT Amendment Act 2008 giving more focus on
- No of chapters and sections in IT Act 2008
- IT Amendment Act 2008 was passed by the houses of parliament on
- IT Amendment Act 2008 received presidential assent on
- IT Amendment Act 2008 came into force on
- According to IT Amendment Act 2008 who is responsible for investigating cyber crimes
- First cyber crime in the World was registered against
- First cyber crime in India was registered against
- First Asian country to enforce cyber laws
- Nodal agency in India that deals with cyber threats
- CERT-IN was established in
- Who is responsible for blocking web sites in India
- CERT-IN serves as
- Tribunal formed to handle the disputes in cyber laws
- CRAT was established in
- Cyber crime is defined as
- Cyber crime in which computer is a target
- Cyber crime in which computer is a weapon
- Unauthorized access to another person's company's data is called
- Act of any intentional false communication that harms reputation of an individual, business, product, government or nation is called
- Practice of sending fake emails in the name of reputed companies to retrieve personal informations such as passwords and credit card numbers
- Counterfeit currency notes, postage and revenue stamps, mark sheets etc can be forged using sophisticated computers, printers and scanners is called as
- Impersonization of another person is considering as
- Repeatedly sending an email message to a particular address to abuses is called as
- Email bombing is considered as a type of
- Use of emails for sending unsolicited bulk emails (spams) and commercial messages over the internet
- Creation of email messages with fake sender address to mislead the recipient
- Email spamming and fishing uses
- Technique commonly used to hide the origin of Email message
- Email spoofing in India charges the offender for forgery under section
- Portrayal of sexual acts for the purpose of sexual excitement
- Persons who are intentionally prey upon children are known as
(To be Continued...)
what is a cyber post office? please respond
ReplyDeleteReally helpful
ReplyDeleteCyber Crime
ReplyDeleteIf you want the best lawyer for Cyber Crime, then We have a strong litigation team, Who represent clients accused of cybercrimes and criminal offenses such as defamation on social media platforms in the United Arab Emirates.
to get more -https://everquest-legal.com/international-disputes/