E Commerce Security Law

Download as xlsx, pdf, or txt
Download as xlsx, pdf, or txt
You are on page 1of 19

Question

The principal risk arises when a party loses the__________ involved in a transaction.
_________ risk is the risk of loss caused by unexpected application of law or regulations.
__________________ is protection against denial of order or denial of payment.
Trojan Horse is a program come in two parts, a Client part and a ___________.
____________ is the mechanism of associating an incoming request with a set of identifying credentials.
Firewall is a _____________ that monitors network traffic and decides whether to allow or block specific traffic.
_________ is a protocol designed to ensure the security and integrity of online communications and purchases.
Peer-to-peer networks that enable unauthorized transfer of copyrighted programs is one of the example of _________
____is an attempt to exploit a computer system or a private network inside a computer.
________ software device which is protecting a computer device from the hackers.
The full form PCI is _____ _______ ________.
__________firewall is similar to a packet filtering firewall.
_________ acts on behalf of the user and prevent an attacker from invading a private network.
____________ (CGI) program is one of the biggest threats to server security is badly written CGI programs
_________is a proper plan to approach perfectly to the potential customers
Industrial designs, and geographical indications are the examples of _______________.
__________ is a general way of electronic payment method to transfer money.
There are __________ primary models for mobile payments.
___________it is an electronic device which helps to make electronic payment transactions.
________ risk arises when a party loses the full value involved in a transaction.
Electronic payment refers to _____________ transactions.
__________ is an example of Plastic Card.
_________ is a secured 3 digit number required for credit card payments.
EFT stands for Electronic ________ .
____________ is one of the elements in IP
Intellectual property law protects against disclosure of ___________of the company.
Encryption is the conversion of electronic data into another form, called _____________.
A ____________system is using two keys a public key known to everyone and a private key.
________ uses a single key that needs to be shared among the people who need to receive the message
A _______ ________ ______ policy is a means of assigning access rights based on rules specified by users.
In 2001 the European Commission published a communication titled creating a ______________
____ _____ refers to sending an email to trick the receiver into believing that it has been sent by a trusted person.
____ ______ can prevent an user from receiving new email messages.
A Blue Hat Hacker is invited by Microsoft to find vulnerabilities in ___________.
In 2005 the USA passed the ______________ which added two new crimes to the US Code.
When a person publishes offensive matter about someone on a website or sends e-mails called _____________.
ECOWAS means "The ___________of West African States".
_______________ means one criminal person is taking forceful control of another person’s website.
Web Vandals often use as hacking techniques to deface a website, so sometimes referred to as ________________.
_______ is defined as a crime in which a computer is the objects of the crime.
_____________refers to the unsolicited sending of spam, third party advertisements via electronic mail.
Criminals who perform illegal activities on internet referred as_____
Australia is a country designed __________________ law
Cyber word is taken from ____________, means "steersman".
Cyber word was first used in cybernetics, a word coined by ______and his colleagues
Section 65 of the IT Act 2000 provides for the punishment for ____________.
The virtual world of internet is known as___________ and the laws governing this area are known as Cyber Law.
By adopting Cyber Legislation, _________ became the 12th nation in the world to adopt a Cyber Law regime.
The full form of SSL is _____________ Certificate.
____________is an unskilled hacker who breaks into computer systems by using automated tools written by others.
“Encryption” word has taken from the Greek Word Kryptos which mean ____________.
_______________ prefix is used to describe a person, things, or idea as part of the computer and information age.
______________ country designed Homeland Security Act of 2002 law.
I.T. act 2000 law is imposed by Government of India to control _____________.
______________ country designed Information and Communication Technology Act,2006 law
An __________(IP) address is a unique numerical label assigned to a device.
In cyber crime "Cr.P.C." stand for
National Infrastructure ____________ Act (NIPA) of 1996 is one of the cyber laws.
If an online platform is not charging the users, the _________may not apply.
_________________, solved the problems of cryptography, how to securely distribute the encryption key

Answer in Brief
Module 1
1.Explain in detail meaning of E-commerce security.
2.Explain various sources of threats in E-commerce security.
3.Explain risk management process with reference to e-commerce security.
4.Explain security issues in E-Commerce.
5.Explain in detail different E-commerce security solutions.
6.Explain meaning and types of firewell.

Module 2
1.Explain meaning and types of cryptography.
2.Explain in detail public key infrastructure.
3.What do you mean by Certificate based authentication.
4.Explain meaning and benefits of electronic payment system.
5.Explain concept of Cryptography and its types.
6.Distinguish between symmetric and asymmetric cryptosystem.

Module 3
1.Explain different types of cybercrime in detail.
2.Write note on cyber law in India.
3.Explain in detail various threat to computer system.
4.Explain in detail concept of hacking and web vandals.
5.Write a note on E-mail abuse.
6.Explain laws relating to electronic evidence.

Module 4
1.Explain penalties under cyber crime.
2.Explain different offences in cyber crime in India.
3.Explain compensation for offending cyberspace in India.
4. Explain consumer protection in cyberspace in India.
5.Explain in detail concept of IP address.
6.Explain client server network security.\
Answer1 Answer2 Answer3
Benefited value Half value Full value
Operational Credit Principal
Coding Encryption Non-Repudiation
Server part Service part Consumer part
Non-Repudiation Encryption Authentication
Network issue Web Camera Network security device
Firewall Authentication DMCA
Internet piracy Film Piracy Visual piracy
virus social crime trojan horse
Firewall Payment software Microsoft office
Payment Card Information Payment Card Industry Private Card Industry
National Stateful Wiseful
Firewall Up server Filtering
Consumer Go In Committee Gateway Internet Common Game Internal
Prospecting and Qualifying Pre-approach Approach
Patent Building property Intellectual property
Debit Card Credit Card EFT
five seven six
Cash Cheque Demand Draft
Debit Credit Insurance
Paperless money Offline Money Cash
Ration card Identification card Smart card
ATM Pin CVV OTP
Foreign Technology Fund Transfer Fight Tentative
Trademark Logo Registration
Property Annual income Trade secrets
Cipher text Word Written text
Kybernetes Cryptographic  Encryption
Data Mining Software Piracy Asymmetric encryption
Discretionary Access Control Secure Sockets Layer CertificaSoftware Access Control
Secure Electronic TransactionSoftware Distribution Safer Information Society
Web Hacking Email Spoofing Email Bombing
Email Spoofing Email Phishing Email Bombing
Windows Computer Mobile
Public Insert Act Product Install Litigation Act Anti-Phishing Act
Hacking Online Gambling Cyber Stalking
Economic Committee External Communication Economic Community
Web Hijacking Bombing Web Stalking
Neophyte Hostile Applets. Script Kiddie
social crime I.T. crime computer crime
E-mail Abuse E-mail Hack E-mail Proof
Data Criminals Hacker Information Criminals
Web Vandal Act 2002 Anti-Phishing Act 2001 Cyber Security Act 2015
Cybernet Arpanet Internet
Norman winter William Stanton Norbert Wiener
Software Piracy Email Bombing Data Diddling
Cyberspace Computerspace Machinespace
China Nepal Japan
Software Sockets Layer Secure Sockets Layer Secure Stocks Layer
Script Kiddie  Neophyte Hacktivist
Write or Written Hidden or Secret. Small or Micro
computer technology cyber I.T.
USA UK Japan
Cyber bulling Computer crime Cyber crime
UK USA Bangladesh
Indian Penal International Protocol Internet Protocol
Criminal Procedure Code Crime Product Case Control Process code
Protection Primary Provisional
CPA 2004 CPA 1986 CCT 1986
Norman winter & Martin William Stanton & Whitfield Norbert Wiener
Answer4 Answer5 CorrectOption
Difficulty Level
Marks Image Audio File
Liquid value Answer3 3 1
Legal Answer4 4 1
Authentication Answer3 3 1
Agent part Answer1 3 1
Authorization Answer3 2 1
Traffic wallet Answer3 3 1
SET Answer4 3 1
None of these Answer1 2 1
hacking Answer4 2 1
Google pay Answer1 2 1
Private Card Information Answer2 2 1
Localful Answer2 2 1
Proxy server Answer4 3 1
Common Gateway Interface Answer4 3 1
Presentation Answer2 1 1
Design Answer3 1 1
Smart Card Answer3 3 1
four Answer1 5 1
Digital Wallet Answer4 4 1
Principal Answer4 4 1
Traditional Answer1 1 1
Cash card Answer3 2 1
Password Answer2 2 1
Fund Threshold Answer2 1 1
Digital Answer1 1 1
Capital Answer3 2 1
Domain text Answer1 4 1
Decryption Answer2 4 1
Symmetric encryption Answer4 2 1
Secure Electronic Transfer Answer1 2 1
Error Correction Code Answer3 4 1
Email Phishing Answer2 2 1
Email Hacking Answer3 2 1
E-commerce Answer1 2 1
Criminal Procedure Act Answer3 2 1
Cyber Defamation Answer4 4 1
External Community Answer3 2 1
Web Computing Answer1 2 1
Masking Answer2 2 1
cyber crime Answer4 2 1
E-mail Crack Answer1 3 1
Data operator Answer2 2 1
Cybercrime Act 2001 Answer4 3 1
Kybernetes Answer4 1 1
Peter Drucker Answer3 3 1
Tampering With Computer Source Documents Answer4 2 1
Crimespace Answer1 2 1
India Answer4 1 1
Software Sockets Limited Answer2 2 1
Elite hacker Answer1 4 1
Crypt or Crime Answer2 2 1
media Answer2 2 1
Sweden Answer1 2 1
Cyber security Answer3 3 1
Australia Answer3 2 1
Indian Protection Answer3 2 1
Content Process code Answer1 4 1
People Answer1 1 1
CMA1986 Answer2 2 1
B. Whitfield Diffie & Martin
Answer4 1 1
Hellman
Video File Topic Question Type
Topic1 MCQ
Topic1 MCQ
Topic1 MCQ
Topic1 MCQ
Topic1 MCQ
Topic1 MCQ
Topic1 MCQ
Topic1 MCQ
Topic1 MCQ
Topic1 MCQ
Topic1 MCQ
Topic1 MCQ
Topic1 MCQ
Topic1 MCQ
Topic1 MCQ
Topic2 MCQ
Topic2 MCQ
Topic2 MCQ
Topic2 MCQ
Topic2 MCQ
Topic2 MCQ
Topic2 MCQ
Topic2 MCQ
Topic2 MCQ
Topic2 MCQ
Topic2 MCQ
Topic2 MCQ
Topic2 MCQ
Topic2 MCQ
Topic2 MCQ
Topic3 MCQ
Topic3 MCQ
Topic3 MCQ
Topic3 MCQ
Topic3 MCQ
Topic3 MCQ
Topic3 MCQ
Topic3 MCQ
Topic3 MCQ
Topic3 MCQ
Topic3 MCQ
Topic3 MCQ
Topic3 MCQ
Topic3 MCQ
Topic3 MCQ
Topic4 MCQ
Topic4 MCQ
Topic4 MCQ
Topic4 MCQ
Topic4 MCQ
Topic4 MCQ
Topic4 MCQ
Topic4 MCQ
Topic4 MCQ
Topic4 MCQ
Topic4 MCQ
Topic4 MCQ
Topic4 MCQ
Topic4 MCQ
Topic4 MCQ
QuestionLang1
Answer1Lang1 Answer2Lang1
Answer3Lang1 Answer4Lang1 Answer5LImageFile
Answer1Marks Answer2Marks Answer3MAnswer4MAnswer5MModelAnswer ModelAnswerImage
Unit wise questions distribution
Unit No. of questions
Unit 1 13
Unit 2 12
Unit 3 13
Unit 4 12
50

You might also like