CSL Ut1 Que Ans
CSL Ut1 Que Ans
CSL Ut1 Que Ans
2. What is the Importance of IT ACT? Explain the Objectives and the features of
the IT ACT 2000.
Ans: The Information Technology (IT) Act, 2000, is a pivotal piece of legislation in India that
governs electronic commerce, cybersecurity, and cybercrime. Here’s why it is important:
1. Legal Recognition of Electronic Transactions: The IT Act provides legal recognition to
electronic records and digital signatures, enabling online contracts and transactions. This is
crucial for the growth of e-commerce and digital business in India.
2. Cybercrime Prevention and Punishment: The Act defines and penalizes various
cybercrimes, including hacking, identity theft, and cyberstalking. It provides a legal
framework to prosecute offenders and protect individuals and organizations from cyber
threats.
3. Data Protection and Privacy: The IT Act includes provisions for the protection of
sensitive personal data. It mandates reasonable security practices and procedures for handling
such data, contributing to privacy and security in the digital realm.
4. E-Governance: The Act facilitates e-governance by allowing government agencies to
conduct official business electronically, thus improving efficiency, transparency, and
accessibility of government services.
5. Regulation of Digital Signatures: It establishes the legality of digital signatures, ensuring
secure and authentic electronic communication and transactions, which is vital for business
and government operations.
6. Promoting Confidence in Digital Economy: By providing a legal framework for
electronic activities, the IT Act helps build trust and confidence in digital transactions,
fostering the growth of the digital economy.
7. Addressing Emerging Cyber Threats: The Act is periodically updated to address new
and emerging cyber threats, ensuring that the legal framework remains relevant and effective
in the face of evolving technologies.
3. Case studies on Identity theft, email phishing, DDoS attack.
Ans: Identity Theft: Identity theft occurs when a criminal steals someone’s personal
information, such as Social Security numbers, credit card details, or bank account
information, to commit fraud or other crimes. The stolen information is often used to make
unauthorized purchases, open new accounts, or commit other financial crimes in the victim’s
name, leading to severe personal and financial consequences for the victim.
Email Phishing: Email phishing is a type of cyberattack where attackers send fraudulent
emails that appear to be from reputable sources, such as banks or well-known companies. The
email typically contains a link or attachment designed to trick the recipient into providing
sensitive information, like passwords or credit card numbers, or downloading malware onto
their device. Phishing is one of the most common and effective ways for cybercriminals to
steal information.
DDoS Attack (Distributed Denial of Service): A DDoS attack involves overwhelming a
target’s online service or network with a flood of internet traffic from multiple sources,
rendering it inaccessible to legitimate users. Attackers often use botnets—a network of
compromised computers—to generate massive amounts of traffic, causing significant
disruption to websites, online services, or networks. DDoS attacks are commonly used to
disrupt business operations, extort money, or make a political statement.
11. What are the safety and Security measures while using computer in cybercafé?
Ans:
When using a computer in a cybercafé, it is important to follow safety and security measures
to protect your personal information and privacy. Here are some key precautions:
1. Avoid Sensitive Transactions: Avoid accessing online banking, shopping, or entering
personal information such as passwords or credit card details on a public computer.
2. Use Incognito or Private Browsing: If you must use a browser, enable incognito or
private mode to prevent the browser from storing your browsing history, cookies, or
temporary files.
3. Log Out of All Accounts: Always log out of any accounts you sign into, such as
email or social media, before leaving the computer.
4. Clear Browsing Data: Manually clear the browsing history, cookies, cache, and
autofill data before you leave.
5. Disable Password Saving: Ensure that the browser does not save your passwords or
credentials.
6. Use a Virtual Private Network (VPN): If possible, use a VPN to encrypt your
internet connection and protect your data from being intercepted by others on the
same network.
7. Beware of Shoulder Surfing: Be aware of your surroundings to ensure no one is
watching you enter sensitive information.
8. Check for Malware or Keyloggers: If you can, scan the computer for malware or
keyloggers before using it. Some cybercafés might have security software installed,
but it’s not always reliable.
9. Avoid Downloading Files: Refrain from downloading or installing software, as it
may be infected with malware.
10. Use Two-Factor Authentication (2FA): If possible, enable 2FA on your accounts.
Even if someone gains access to your password, they won’t be able to log in without
the second authentication step.
11. Bring Your Own Devices: If possible, use your own device (like a smartphone or
tablet) to access sensitive accounts rather than using the public computers.
12. Check the Network Security: If using Wi-Fi, ensure it is secured with WPA2 or
WPA3 encryption. Avoid using unsecured or public Wi-Fi networks.