0% found this document useful (0 votes)
18 views13 pages

Sub Code: Bcc301

The document outlines key concepts and definitions related to cyber security, including types of cyber crimes, the importance of mobile security, and the digital forensics life cycle. It discusses various tools used in cyber crime, the need for information security policies, and classifications of cyber criminals. Additionally, it highlights security challenges faced by wireless devices and preventive measures against cyber threats.

Uploaded by

theunholyblood
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
18 views13 pages

Sub Code: Bcc301

The document outlines key concepts and definitions related to cyber security, including types of cyber crimes, the importance of mobile security, and the digital forensics life cycle. It discusses various tools used in cyber crime, the need for information security policies, and classifications of cyber criminals. Additionally, it highlights security challenges faced by wireless devices and preventive measures against cyber threats.

Uploaded by

theunholyblood
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 13

B.TECH.

(SEM 3) THEORY EXAMINATION 2023-24


CYBER SECURITY SOLUTION
SUB CODE: BCC301

Section A:

1. Define Cyber Crime.


Ans: Cybercrime encompasses a wide range of criminal activities that are carried out
using digital devices and/or networks. These crimes involve the use of technology to
commit fraud, identity theft, data breaches, computer viruses, scams, and expanded
upon in other malicious acts.

2. What is Bot net.


Ans: A botnet (short for “robot network”) is a network of computers infected by
malware that are under the control of a single attacking party, known as the “bot-
herder.” Each individual machine under the control of the bot-herder is known as a
bot.

3. Why mobile needs security?


Ans: Things like your passwords and account numbers, emails, text messages, photos,
and videos. If your phone ends up in the wrong hands, someone could steal your
identity, buy stuff with your money, or hack into your email or social media accounts.

4. Define Authentication and Authorization.


Ans: Authentication is the process of verifying who someone is, whereas
Authorization is the process of verifying what specific applications, files, and data a
user has access to.

5. What is virus and worms.


Ans: A Worm is a form of malware that replicates itself and can spread to different
computers via the Network. A Virus is a malicious executable code attached to
another executable file which can be harmless or can modify or delete data. 2. The
main objective of worms is to eat the system resources.

6. Explain digital evidence?


Ans: Digital evidence in cybercrime cases refers to information transmitted, stored, or
retrieved on digital devices and networks, represented in the binary language of ones
and zeros.

7. Why cyber is needed?


Ans: Cyber security is important because it protects your devices, data, and
confidential information from cyberattacks. It also helps you avoid online scams, stay
compliant with regulations, and protect your reputation. In addition, cyber security
reduces the risk of cyberattacks and helps you recover from a cyberattack.

Section B

1. Explain how the term ‘cybercrime’ originated. State few Cyber Crimes.
Ans: Cybercrime is the use of computers, the internet, or network devices for illegal
activities like fraud, identity theft, or privacy violation. The term "cybercrime"
originated from hackers breaking into computer networks, some for fun, and others to
gain sensitive information. For example, hackers have started infecting computer
systems with viruses, causing breakdowns.
Few Cyber Crimes are discussed below:

1. Phishing and Scam:


Phishing is a type of social engineering attack that targets the user and tricks them by
sending fake messages and emails to get sensitive information about the user or trying
to download malicious software and exploit it on the target system.

2. Identity Theft
Identity theft occurs when a cybercriminal uses another person’s personal data like
credit card numbers or personal pictures without their permission to commit a fraud or
a crime.

3. Ransomware Attack
Ransomware attacks are a very common type of cybercrime. It is a type of malware
that has the capability to prevent users from accessing all of their personal data on the
system by encrypting them and then asking for a ransom in order to give access to the
encrypted data.

4. Hacking/Misusing Computer Networks


This term refers to the crime of unauthorized access to private computers or networks
and misuse of it either by shutting it down or tampering with the data stored or other
illegal approaches.

5. Internet Fraud
Internet fraud is a type of cybercrimes that makes use of the internet and it can be
considered a general term that groups all of the crimes that happen over the internet
like spam, banking frauds, theft of service, etc.

2. Explain wireless devices with example. What are the security challenges faced by
wireless devices?
Ans: Wireless devices are electronic gadgets that can communicate with other devices
or networks without the use of physical cables. They rely on various wireless
communication technologies such as Wi-Fi, Bluetooth, cellular, and infrared, among
others. Here are examples of wireless devices:

Smartphones: These are versatile handheld devices that can connect to cellular
networks, Wi-Fi, and Bluetooth. They enable users to make calls, send messages,
browse the internet, access applications, and much more.

Wireless routers: These devices enable wireless connectivity to the internet, allowing
multiple devices within the vicinity to access the network wirelessly. They typically
use Wi-Fi technology to create a local area network (LAN).
Wireless printers: These printers connect to computers and other devices via Wi-Fi or
Bluetooth, eliminating the need for physical connections. Users can send print
commands to the printer from anywhere within the wireless network range.

Wireless security cameras: These cameras use Wi-Fi or other wireless protocols to
transmit video footage to a connected device or network. They are commonly used for
surveillance purposes both indoors and outdoors.

Wireless speakers: These speakers connect to audio sources such as smartphones,


computers, or home entertainment systems via Bluetooth or Wi-Fi. They allow users
to stream music wirelessly from their devices.

Security Challenges Faced by Wireless Devices:

a. Encryption Vulnerabilities: Wireless communication protocols such as Wi-Fi


and Bluetooth may be susceptible to encryption vulnerabilities that could
potentially expose data to interception by unauthorized parties.

b. Interference and Signal Jamming: Wireless signals can be disrupted by


interference from other electronic devices or deliberate signal jamming,
leading to connectivity issues or loss of service.

c. Unauthorized Access: Wireless networks may be vulnerable to unauthorized


access by hackers who exploit weak passwords or encryption protocols. This
can result in unauthorized use of network resources or theft of sensitive
information.

d. Man-in-the-Middle Attacks: Attackers can intercept wireless communications


between devices and manipulate the data transmitted, potentially leading to
data theft, impersonation, or other malicious activities.

e. Device Theft or Loss: Wireless devices such as smartphones and tablets are
often small and portable, making them susceptible to theft or loss. If these
devices contain sensitive data and are not properly secured, it could lead to
data breaches or identity theft.
.
3. Explain 7 Tools used in Cyber Crime.
Ans:
a. Malware: Malicious software, or malware, is a broad category of software designed
to damage or disrupt computer systems, steal sensitive information, or gain
unauthorized access to networks. Examples include viruses, worms, Trojans,
ransomware, and spyware. Malware is often distributed through phishing emails,
malicious websites, or infected software downloads.

b. Exploit Kits: Exploit kits are tools used by cybercriminals to exploit vulnerabilities in
software applications or operating systems. These kits contain pre-written code that
can automatically detect and exploit vulnerabilities, enabling attackers to install
malware or gain unauthorized access to systems. Common exploit kits include
Blackhole, Angler, and Nuclear.
c. Remote Access Trojans (RATs): Remote Access Trojans are malicious programs that
allow attackers to remotely control infected computers. Once installed on a victim's
system, RATs provide attackers with a range of capabilities, including viewing and
manipulating files, capturing keystrokes, and accessing webcam and microphone
feeds. RATs are often used for espionage, data theft, or launching further attacks
within a compromised network.

d. Botnets: A botnet is a network of infected computers, or "bots," that are remotely


controlled by a central command-and-control server operated by cybercriminals.
Botnets are typically used to carry out distributed denial-of-service (DDoS) attacks,
send spam emails, mine cryptocurrencies, or steal sensitive information through
coordinated attacks on multiple targets.

e. Phishing Kits: Phishing kits are packages of tools and resources used to create and
launch phishing attacks. These kits often include pre-made phishing website
templates that mimic legitimate sites, as well as scripts to collect user credentials or
other sensitive information entered into the fake sites. Phishing kits make it easier for
attackers to deploy phishing campaigns at scale, targeting a large number of users
with minimal effort.

f. Keyloggers: Keyloggers are software or hardware devices designed to capture


keystrokes typed by users on a computer or mobile device. By logging keystrokes,
keyloggers can record usernames, passwords, credit card numbers, and other sensitive
information entered by users, which can then be retrieved by cybercriminals and used
for identity theft, fraud, or unauthorized access to accounts.

g. SQL Injection Tools: SQL injection tools are used to exploit vulnerabilities in web
applications that use SQL databases. These tools allow attackers to inject malicious
SQL queries into input fields on web forms or URLs, bypassing authentication
mechanisms and gaining unauthorized access to the underlying database. With SQL
injection, attackers can steal sensitive data, modify or delete database records, or
execute arbitrary commands on the server hosting the web application.

4. Explain Digital forensics life cycle.


Ans: Digital forensics life cycle
The digital forensics process includes following steps:

a. Identification of Evidence: Recognize potential evidence within digital


systems, including interactions between files, processes, and devices, to ensure
no relevant evidence is overlooked.

b. Collection and Recording: Gather evidence from various sources like


computers, mobile devices, and IoT devices, ensuring proper handling to
maintain integrity. Non-obvious sources, like RFID tags, may also be
considered.

c. Storage and Transportation: Safeguard evidence to prevent alteration or


damage, using write-blocking tools and maintaining a chain of custody. Proper
documentation and adherence to established procedures are critical.

d. Examination/Investigation: Forensically analyze digital evidence, ensuring


legal authority is obtained. Dead analysis examines data at rest, while live
analysis deals with data in active memory. Imaging tools like DCFLdd are
used to create copies, ensuring preservation of the original evidence.

e. Analysis, Interpretation, and Attribution: Analyze evidence using forensic


tools such as FTK or EnCase, identifying relevant information like files,
registry entries, and passwords. Different types of analysis include media, file
system, and network analysis.

f. Reporting: Generate comprehensive reports detailing the investigation process,


findings, and conclusions. Reports must include identifying information,
examination steps, and results, ensuring clarity and accuracy.

g. Testifying: Expert witnesses may testify in legal proceedings, presenting


findings based on reliable principles and methods. Precautions must be taken
to preserve evidence integrity and adhere to legal requirements.

5. What is the need of Information Security policy?


Ans: The importance of an information security policy
Information security policies can have the following benefits for an
organization:

1. Facilitates data integrity, availability, and confidentiality - effective


information security policies standardize rules and processes that protect
against vectors threatening data integrity, availability, and confidentiality.
2. Protects sensitive data - Information security policies prioritize the protection
of intellectual property and sensitive data such as personally identifiable
information (PII).
3. Minimizes the risk of security incidents - An information security policy helps
organizations define procedures for identifying and mitigating vulnerabilities
and risks. It also details quick responses to minimize damage during a security
incident.
4. Executes security programs across the organization - Information security
policies provide the framework for operationalizing procedures.
5. Provides a clear security statement to third parties - Information security
policies summarize the organization’s security posture and explain how the
organization protects IT resources and assets. They facilitate quick response to
third-party requests for information by customers, partners, and auditors.
6. Helps comply with regulatory requirements - Creating an information security
policy can help organizations identify security gaps related to regulatory
requirements and address them.

Section C

1. Who are Cyber Criminals? Classify Cybercrimes.


Ans: Cybercrime is taken very seriously by law enforcement. In the early long
periods of the cyber security world, the standard cyber criminals were teenagers or
hobbyists in operation from a home laptop, with attacks principally restricted to
pranks and malicious mischief. Today, the planet of cyber criminals has become a lot
of dangerous. Attackers are individuals or teams who attempt to exploit vulnerabilities
for personal or financial gain.

Types of Cyber Criminals:

1. Hackers: The term hacker may refer to anyone with technical skills, however, it
typically refers to an individual who uses his or her skills to achieve unauthorized
access to systems or networks to commit crimes. The intent of the burglary
determines the classification of those attackers as white, grey, or black hats. White hat
attackers burgled networks or PC systems to get weaknesses to boost the protection of
those systems. The owners of the system offer permission to commit the burglary, and
they receive the results of the look at. On the opposite hand, black hat attackers make
the most of any vulnerability for embezzled personal, monetary, or political gain.
Grey hat attackers are somewhere between white and black hat attackers. Grey hat
attackers could notice a vulnerability and report it to the owners of the system if that
action coincides with their agenda.

(a). White Hat Hackers – These hackers utilize their programming aptitudes for a
good and lawful reason. These hackers may perform network penetration tests to
compromise networks to discover network vulnerabilities. Security vulnerabilities are
then reported to developers to fix them, and these hackers can also work together as a
blue team. They always use the limited number of resources which are ethical and
provided by the company, they basically perform pen testing only to check the
security of the company from external sources.
(b). Gray Hat Hackers – These hackers carry out violations and do seemingly
deceptive things, however not for individual addition or to cause harm. These hackers
may disclose a vulnerability to the affected organization after having compromised
their network and they may exploit it.
(c). Black Hat Hackers – These hackers are unethical criminals who violate network
security for personal gain. They misuse vulnerabilities to bargain PC frameworks.
These hackers always exploit the information or any data they got from the unethical
pretesting of the network.
2. Organized Hackers: These criminals embody organizations of cyber criminals,
hacktivists, terrorists, and state-sponsored hackers. Cyber criminals are typically
teams of skilled criminals targeted on control, power, and wealth. These criminals are
extremely subtle and organized and should even give crime as a service. These
attackers are usually profoundly prepared and well-funded.

3. Internet stalkers: Internet stalkers are people who maliciously monitor the web
activity of their victims to acquire personal data. This type of cybercrime is conducted
using social networking platforms and malware, that can track an individual’s PC
activity with little or no detection.

4. Disgruntled Employees: Disgruntled employees become hackers with a particular


motive and commit cybercrimes. It is hard to believe that dissatisfied employees can
become such malicious hackers. In the previous time, they had the only option of
going on strike against employers. But with the advancement of technology there is an
increase in work on computers and the automation of processes, it is simple for
disgruntled employees to do more damage to their employers and organization by
committing cybercrimes. The attack by such employees brings the entire system
down. Please refer for: Cyber Law (IT Law) in India

2. What is the fuel for cybercrime. How may a criminal plan cybercrime?
Ans: 1. Use antivirus and anti-Spyware software and keep it up to date: It is important
to remove and/or quarantine the viruses. The settings of these software’s should be
done during the installation so that this software gets updated automatically daily.

2. Set the OS to download and install security patches automatically: OS companies


issue the security patches for flaws that are found in these systems.

3. Use a firewall to protect the system from hacking attacks while it is connected on
the Internet: A firewall is a software and/or hardware that is designed to block
unauthorized access while permitting authorized communications. It is a device or set
of devices configured to permit, deny, encrypt, decrypt, or proxy all (in and out)
computer traffic between different security domains based upon a set of rules and
other criteria. A firewall is different from antivirus protection. Antivirus software
scans incoming communications and files for troublesome virus’s vis-a-vis properly
configured firewall that helps to block all incoming communications from
unauthorized sources.

4. Disconnect from the Internet. when you are away from your computer: Attackers
cannot get into the system when the system is disconnected from the Internet.
Firewall, antivirus, and anti-Spyware software’s are not foolproof mechanisms to get
access to the system.

5. Downloading the freeware only from websites that are known and trustworthy: It is
always appealing to download free software(s) such as games, file-sharing programs,
customized toolbars, etc. However, one should remember that many free software(s)
contain other software, which may include Spyware.

6. Check regularly the folders in the mail box- "sent items" or "outgoing"-for those
messages you did not send: If you do find such messages in your outbox, it is a sign
that your system may have infected with Spyware, and maybe a part of a Botnet. This
is not foolproof; many spammers have learned to hide their unauthorized access.
7. Take immediate action if your system is infected: If your system is found to be
infected by a virus, disconnect it from the Internet immediately. Then scan the entire
system with fully updated antivirus, and anti-Spyware software. Report the
unauthorized access to ISP and to the legal authorities. There is a possibility that your
passwords may have been compromised in such cases, so change all the passwords
immediately.

3. Explain the security measures and policies taken for mobile devices.
Ans:
Securing mobile devices involves:

Clear Policies: Establish and enforce policies regarding device usage, OS levels, data
access, and remote wiping.

Password Protection: Encourage strong, unique passwords and avoid using the same
password for multiple accounts.

Biometrics: Utilize biometric authentication methods such as fingerprint or face


recognition for enhanced security.

Avoid Public Wi-Fi: Educate employees about the risks of using public Wi-Fi
networks and discourage their use.

App Awareness: Train employees to recognize and avoid malicious apps, and
consider implementing restrictions on app downloads.

Device Encryption: Enable built-in encryption features on mobile devices to protect


data from unauthorized access in case of theft or loss.

4. State some attacks on Mobile devices. What are the security implications for
organizations.
Ans: Some attacks on Mobile devices are stated below:
1. Data Leakage: Unintentional transmission of personal or corporate data from
mobile apps to remote servers, often exploited by advertisers or cybercriminals.
Users should limit app permissions and avoid granting unnecessary access.

2. Unsecured Wi-Fi: Vulnerability of mobile devices when connected to unsecured


wireless networks, risking compromise of sensitive information like banking
details. Users are advised to limit use of free Wi-Fi for confidential activities.

3. Network Spoofing: Cybercriminals create fake Wi-Fi access points in public areas
to trick users into connecting, enabling theft of personal information. Caution is
advised when connecting to free Wi-Fi, and users should avoid providing personal
information.

4. Phishing Attacks: Manipulative attempts to deceive mobile users into divulging


personal information through fraudulent emails or messages. Users should refrain
from clicking on unfamiliar links and postpone non-urgent actions until accessing
a secure device.
5. Spyware: Software installed on mobile devices without consent, often by
individuals seeking to monitor others' activities. Also known as stalkerware, it
poses a threat to privacy and security.

6. Broken Cryptography: Weak implementation of encryption algorithms in mobile


apps, leaving vulnerabilities that can be exploited by attackers. Developers must
ensure the proper use of encryption standards to safeguard sensitive data.

7. Improper Session Handling: Failure of mobile apps to securely manage user


sessions, leading to unauthorized access and impersonation. This occurs when
session tokens are unintentionally shared, often due to sessions remaining open
after users navigate away from the app.

The security implications for organizations from mobile security threats are:

a. Data Breaches: Potential leaks of sensitive corporate information due to


data leakage and broken cryptography, leading to financial losses and
damage to reputation.

b. Compliance Risks: Failure to comply with regulations such as GDPR or


HIPAA due to inadequate protection of data on mobile devices, resulting
in hefty fines and legal consequences.

c. Reputational Damage: Loss of customer trust and business due to security


incidents, impacting the organization's reputation and bottom line.

d. Operational Disruption: Disruption of business operations caused by


security incidents like network spoofing or phishing attacks, leading to
downtime and increased IT support costs.

e. Intellectual Property Theft: Risk of intellectual property theft through


mobile malware and spyware, undermining the organization's competitive
advantage.

f. Legal Liability: Potential legal liability for security incidents resulting


from negligence in implementing proper security measures, leading to
lawsuits and financial penalties.

g. Supply Chain Risks: Exposure to mobile security threats in the


organization's supply chain, compromising its security posture and
increasing overall risk.

8. What is Identity Theft. How it is done and how ID Theft can be handled?
Ans: Identity theft is the crime of using the personal or financial information of
another person to commit fraud, such as making unauthorized transactions or
purchases.
Identity theft is committed in many different ways and its victims are typically left
with damage to their credit, finances, and reputation.
Thieves can attempt to obtain your personal information in various ways. For
instance, some sift through trash bins looking for bank account and credit card
statements.

Identity thieves increasingly use computer technology to obtain other people's


personal information for identity fraud.

To find such information, they may search the hard drives of stolen or discarded
computers; hack into computers or computer networks of organizations and
corporations; access computer-based public records; use information-gathering
malware to infect computers; browse social networking sites; or use deceptive emails
or text messages. Once identity thieves have the information they are looking for, they
can ruin a person's credit rating and the standing of other personal information.

Handling ID Theft involves:

a. Monitor Accounts: Check bank statements, credit card bills, and credit reports
for unauthorized transactions or accounts.
b. Place Fraud Alerts: Contact credit bureaus to set alerts, requiring verification
before opening new accounts
c. Freeze Credit: Consider freezing credit reports to prevent unauthorized
account openings.
d. Report Theft: File reports with FTC and local authorities to document the
theft.
e. Contact Financial Institutions: Notify banks and credit issuers, close
compromised accounts, and dispute charges.
f. Update Security: Improve online security with strong passwords, multi-factor
authentication, and vigilance against phishing.
g. Seek Legal Help: Consider legal aid or identity theft resolution services for
assistance.

9. What is steganography. Explain in detail.


Ans: A steganography technique involves hiding sensitive information within an
ordinary, non-secret file or message, so that it will not be detected. The sensitive
information will then be extracted from the ordinary file or message at its destination,
thus avoiding detection. Steganography is an additional step that can be used in
conjunction with encryption in order to conceal or protect data.

Steganography is a means of concealing secret information within (or even on top of)
an otherwise mundane, non-secret document or other media to avoid detection. It
comes from the Greek words steganos, which means “covered” or “hidden,” and
graph, which means “to write.” Hence, “hidden writing.”

Different Types of Steganography are defined below:


1. Text Steganography − There is steganography in text files, which entails secretly
storing information. In this method, the hidden data is encoded into the letter of each
word.
2. Image Steganography − The second type of steganography is image steganography,
which entails concealing data by using an image of a different object as a cover. Pixel
intensities are the key to data concealment in image steganography.
3. Audio Steganography − It is the science of hiding data in sound. Used digitally, it
protects against unauthorized reproduction. Watermarking is a technique that encrypts
one piece of data (the message) within another (the "carrier"). Its typical uses involve
media playback, primarily audio clips.
4. Video Steganography − Video steganography is a method of secretly embedding
data or other files within a video file on a computer. Video (a collection of still
images) can function as the "carrier" in this scheme. Discrete cosine transform (DCT)
is commonly used to insert values that can be used to hide the data in each image in
the video, which is undetectable to the naked eye. Video steganography typically
employs the following file formats: H.264, MP4, MPEG, and AVI.

10. What is Email. Explain Email forensics can be done.


Ans: Email, or electronic mail, is a way to send messages between computers using
the internet. It is often used for business, education, technical communication, and
document interactions. Email is the electronic equivalent of a letter, but with
advantages in timeliness and flexibility.
Email forensics is exactly what it sounds like. The analysis of emails and the content
within to determine the legitimacy, source, date, time, the actual sender, and
recipients in a forensically sound manner. The aim of this is to provide admissible
digital evidence for use in civil or criminal courts. Email data should always be
extracted by digital forensic professionals. This is highly recommended as they do so
in a forensically sound manner ensuring that:

• The email data is extracted in full and there is no question whether all data has
been recovered.
• The validity of the data can be relied upon in both civil and criminal courts as
admissible evidence.
• Ensures that no changes are made to the email metadata.
• It is compliant with the ACPO guidelines, and the quality standards set out
within the ISO17025 documentation and Forensic Science Regulator’s Codes
of Good Practice and Conduct.
• Any deleted emails and files are recovered where possible.

11. What are privacy threats? What are the challenges faced?
Ans: Privacy threats pose significant risks to individuals' personal information and
data privacy. These threats, ranging from data breaches and surveillance to social
engineering and IoT vulnerabilities, can lead to the unauthorized access and
exploitation of sensitive data. Challenges in addressing these threats stem from factors
such as limited awareness among individuals, the complex nature of technology,
inadequacies in legal and regulatory frameworks, and the pervasive data sharing
practices of organizations. Moreover, the rise of data monetization, coupled with
cybersecurity threats and government surveillance programs, further complicates
efforts to protect individuals' privacy rights in the digital age.

To mitigate privacy threats effectively, a comprehensive approach is required. This


approach should involve educating individuals about privacy risks and best practices,
implementing robust technological solutions to safeguard personal data, advocating
for stronger privacy laws and regulations, promoting transparency and accountability
in data collection and sharing practices, and enhancing cybersecurity measures to
prevent unauthorized access and breaches. By addressing these challenges and
implementing proactive measures, both individuals and organizations can work
towards ensuring the privacy and security of personal information in an increasingly
interconnected and data-driven world.

12. What is Cyber Law, state a few Cyber law in India.


Ans: Cyber law is an integral part of the legal system. It deals with the legal issues of
cyberspace. Cyber law is also referred to as the Law of the Internet. These cyber laws
help businesses prevent identity and data theft, privacy violation and fraud. The
Information Technology Act, of 2000, as per the Indian Penal Code, addresses
Cyberlaw and includes laws related to e-commerce, e-contracts, digital signatures,
intellectual property rights, and cyber security.

Cyber laws in India cover the following statutes, rules, and guidelines:
a. Information Technology Act, 2000: This act regulates cyber laws in India and
came into effect in 2000. It provides legal recognition to electronic commerce
and makes it easier to register real-time records with the government. The act
also includes amendments that outline the definition and punishment of cyber
crime.
a. Section 65: This section deals with tampering with computer source
documents.
b. Section 66: This section deals with hacking with computer systems.
c. Section 66B: This section deals with receiving stolen computer or
communication devices.
d. Section 66C: This section deals with using another person's password.
e. Section 66D: This section deals with cheating using computer resources.
f. Section 66E: This section deals with publishing private images of others.
g. Section 69-A: This section deals with blocking public access of any
information through any computer resources.
h. Section 69-B: This section deals with the power to monitor or collect traffic
data or information generated transmitted, received or stored in any computer
resource.

13. Give an Overview of Intellectual Property related Legislation in India.


Ans: Intellectual property (IP) refers to the creations of the human mind that have or
could potentially have a commercial value. These creations can take many forms and
can serve as an intangible yet financially viable asset for their owners, individuals and
businesses alike.

Types of Intellectual Property:


Trademarks: These include names, labels, Copyrights: These include
logos, slogans, theme music, website original visual art, performing
domain names, etc representing the identity art, and literature works.
of an individual or a business entity
Patents: These include newly invented Designs: These include specific
products and processes design features of a product
such as a peculiar shape, size,
or a colour combination
India has a robust legal framework for protecting intellectual properties through
various types of Intellectual Property laws such as the Trademark Act, the Copyright
Act, the Design Act, and the Patents Act. The objectives of Intellectual Property laws
is to provide legal protection to different forms of intellectual properties, and
encourage innovation and creativity across various sectors.
Legal protection of intellectual property can encourage innovation and creativity by
giving individuals and businesses a financial incentive to invest in new ideas and
creations. Without this protection, individuals and businesses may be less likely to
invest time and resources into developing new and innovative ideas, since others
could easily copy and profit from their creations without any repercussions.

Different Types of Intellectual Property Rights


1. The Trademark Act
The Trademark Act is a law that regulates the registration and legal protection of
trademarks in India. Trademarks are symbols, words, phrases, or device marks used to
identify and distinguish the identity of an individual or business entity. Examples of
Trademarks include brand names, trade names, legal names, logos, domain names,
label marks, slogans, and even typical sounds or combinations of colors.
2. The Copyright Act
The Copyright Act is a law which regulates the registration and legal protection of
copyrights in India. Copyrights are defined under the Act as an exclusive right to
reproduce, distribute, and perform an original work of authorship, be it an original
piece of literature, music, song, script, drama, art, cinematographic film, or audio
tune.

You might also like