14 It & Acts
14 It & Acts
7. REPEATER
A repeater is a device that
regenerates incoming
A bridge is a device used to electrical, wireless or optical
segmentise a network. An signals through a
existing network can be split communication medium.
into different segments and Data transmissions through
can be interconnected using a A gateway is a device that
can interconnect two wired or wireless medium
bridge. This reduces the can travel only a limited
amount of traffic on a different networks having
A router is a device that can different protocols , It can distance as the quality of the
network. When a data packet signal degrades due to noise.
reaches the bridge, it inspects interconnect two networks of translate one protocol to
the same type using the same another protocol. It is a Repeater receives incoming
the incoming packet's data signals, amplifies the
address and finds out to protocol. It can find the network point that acts as an
optimal path for data packets entrance to another network. signals to their original
which side of the bridge it is strength and retransmits them
addressed (to nodes on the to travel and reduce the Its operations are similar to
amount of traffic on a that of a router. It can check to the destination.
same side or the other side).
Only those packets addressed network. Even though its the device address and the
to the nodes on the other operations are similar to a network address and can use
side, will be allowed to pass bridge, it is more intelligent. algorithms to find the best
the bridge. Others will be The router can check the path for packets to reach the
discarded. The packet that device address and the destination. Further, while
network address and can use interconnecting two
Data Terminal a computer to analog signals time in the form of a single,
devices (modulation) for telephone complex signal and then
A data terminal equipment lines. It also converts the recovering the separate
(DTE) is a device that analog signals received back signals at the receiving end.
controls data flowing to or from telephone lines to Multiplexing divides the
from a computer. It is digital signals physical medium into logical
connected to the transmission (demodulation) for the segments called frequency
medium at the end of a computer. The speed of the channels. Multiplexer
telecommunication link. modem determines how fast combines (multiplexes) the
Here we discuss the most it can send and receive inputs from different sources
commonly used DTEs- information through and sends them through
modem and multiplexer. telephone lines. The speed of different channels of a
modem is measured in bits medium. The combined data
1. MODEM per second (bps). travels over the medium
simultaneously.
At the destination, a de
2. MULTIPLEXER multiplexer separates (de
multiplexes) the signals and
sends them to destinations.
1. Bus topology
15
TOPOLOGIES/ ADDRESS
A modem is an electronic
device used for
Network Topologies
communication between
The way in which the nodes
computers through telephone
It is called multiplexing. are physically interconnected
lines. The name is formed
Similar is the case with data to form a network is called a
from the first three letters of
transmission over networks. Topology
the two words modulator and
Multiplexing is sending
demodulator. It converts
multiple signals on a
digital signals received from
physical medium at the same
Characteristics of bus No signal amplification is Failure of hub/switch Transmission Modes
topology:- required as each node leads to failure of entire
Easy to install. amplifies the signal. network.
Requires less cable length Requires less cable length Requires more cable
and hence it is cost and hence is cost length compared to bus
effective. effective. topology.
Failure of a node does not If one node fails, entire
affect the network. network will fail. 4. Mesh topology
Failure of cable (bus) or Addition of nodes to the
terminator leads to a network is difficult.
break down of the entire
network. 3. Star topology
Fault diagnosis is
difficult.
Only one node can
transmit data at a time.
2. Ring topology
Characteristics of mesh
topology:-
Characteristics of star Network will not fail even
topology;- if one path between the
nodes fails.
More efficient compared Expensive because of the
to bus topology. extra cables needed.
Easy to install. Very complex and
Easy to diagnose faults, difficult to manage.
Characteristics of ring Easy to expand depending
topology:- on the specifications of
central hub/ switch.
16 client's request. Client-server devices on the local networks
architecture is an example and the Internet.
NETWORK for centralised software
management.
PROTOCOLS AND
INTERNET Peer to Peer type
A peer-to-peer network has
Logical classification of no dedicated servers. Here a
networks number of computers are
connected together for the
purpose of sharing
information or devices. All
the computers are considered
equal. Any computer can act
as a client or as a server at
any instance.
PROTOCOLS
A network protocol is the
special set of rules to be
followed in a network when
devices in the network
exchange data with each
other.
Client Server type TCP/IP (Transmission
In a network, the client- Control Protocol/I nternet
server architecture consists Protocol)
of high-end computer (called TCP/IP, Transmission
server) serving lower Control Protocol/Internet
configuration machines Protocol, is a suite of
called clients. A server communications protocols
provides clients with specific used to interconnect network
services (responses) upon
POP- POST OFFICE response. This pair of request exchanging of data and
PROTOCOL and response is called an program files across a
IMAP- INTERNET HTTP session . network. FTP is the easiest
MESSAGE ACCESS The response from the server way to transfer files between
PROTOCOL can be static such as a file computers via the Internet. It
DHCP- DYNAMIC already stored on the server, uses TCP and IP to perform
HOST or dynamic, such as, the uploading and downloading.
CONFIGURATION result of executing a piece of A FTP client program
PROTOCOL code by the server as per the installed in the computer can
ARP- ADDRESS request from the client. help in the uploading
RESOLUTION (sending files to another
PROTOCOL computer) and downloading
VOIP-VOICE OVER (receiving files from another
IP(3G) computer) of files.
VOLTE- VOICE FTP uses client-server
OVERLONG TERM architecture in servers with
EVOLUTION(4G) security features, username
and password protection for
VONR-VOICE OVER
The two important file transfer. An FTP client
Protocols NEW RADIO(5G)
characteristics of HTTP program (Filezilla, Cute FTP,
HTTPS- HYPER TEXT are:- etc) installed in the computer
HTTP
TRANSFER HTTP is transmission can help in the easy
HTTP stands for Hypertext
PROTOCOL SECURE medium independent. uploading and downloading
Transfer Protocol. It is a
FTP-FILE TRANSFER HTTP is stateless (The of files.
standard protocol for
PROTOCOL server and client are
transferring requests from
DNS- DOMAIN NAME client-side and to receive aware of each other only DNS
SYSTEM responses from the server- during a request or DNS stands for Domain
UDP- USER side. The HTTP client response. Afterwards, Name System. DNS returns
DATAGRAM (browser) sends a HTTP each forgets the other). the IP address of the domain
PROTOCOL request to the HTTP server name, that we type in our
SMTP-SIMPLE MAIL (web server) and server FTP web browser's address bar.
TRANSFER responds with a HTTP FTP stands for File Transfer (like mobile phone
PROTOCOL Protocol. It is a standard for automatically dialing the
phone number when we the Internet has a unique
select a name from contact URL.. Network resources are Few more points ഹൈപ്പർ ടെക്സ്റ്റ്-
list). files that can be plain web Last 3 parts of MAC സാധാരണ ടെക്സ്റ്റ്
The DNS system has its own pages, other text documents, address indicates (6 char)- കൂടാതെ മറ്റ് ഡോക്യു
network. DNS implements a graphics, programs, etc. Device ID(Serial No) മെന്റിലേക്കുള്ള
database to store domain URL consists of letters, ലിങ്കുകൾ അടങ്ങിയ
names and IP address numbers and punctuations. Largest possible Decimal ഒരു ഡോക്യുമെന്
information of all web sites URL. string can be divided Number in a part of IPV4 FTP:File Transfer
on the Internet. DNS into three parts. address – Protocol
assumes that IP addresses do a) Network protocol (also 8bit 8bit 8bit 8bit IPv4 അഡ്രസ് ഒരു 32
not change (statically called the scheme) XXX.XXX.XXX.XXX } ബിറ്റ് അഡ്രസ് ആണ്
assigned). b) Domain name (Host name =32bit A computer used in
If one DNS server does not or address) Connection oriented internet is identified using
know how to translate a c) File name protocol in TCP/IP- TCP its -IP Address
particular domain name, it For example, the URL Connectionless protocol MAC അഡ്രസ്സിൽ 12
asks another one, and so on, http://www.dhsekerala.gov.in in TCP/IP- UDP
until the correct IP address is /indes.html has three parts. അക്കങ്ങൾ ഉണ്ട്
Protocol focuses on
returned. The detailed description of
dynamic IP allocation-
these three parts are given
DHCP
17 below: 18
Layers of TCP/IP
URL & PYQ 1. Application Layer INTERNET 1
2. Transport Layer
Uniform Resource 3. Internet Layer History Of Internet
http://- PROTOCOL
Locator (URL) 4. Network Access Layer The Internet started as a
URL stands for Uniform small network through a
www.dhsekerala.gov.in – Protocol used by www- project by the United
Resource Locator, URL is a
DOMAIN NAME HTTP States Department of
formatted test string used by
web browsers, email clients SMTP -used for email Defence by the name
//Index.html –FILE transmission across the ARPANET (Advanced
and other software to identify
NAME internet Research Projects Agency
a network resource on the
Internet. Every resource on Network)
ARPANET which used Hyperlinks - A hyperlink within an organisation. BROWSWERS, SEARCH
TCP/IP protocol for is a text or an icon that Extranet -When an ENGINES ETC
communication was you can click on to get to intranet is made
thereafter used for another website. The link, accessible to some
scientific research and which is usually in blue computers that are not
information sharing and is underlined Hyper part of a company's
ARPANET is considered Text - Hypertext is text private network it is
as the first wide area with hyperlinks. called an extranet
network. Vinton Gray
Cerf who was ICANN World Wide Web
instrumental in the In 1998, Internet The World Wide Web
development of Internet Corporation for Assigned (WWW) is a system of
and TCP/IP protocol, is Names and Numbers interlinked hypertext
considered as the father of (ICANN) was established. documents accessed via
Internet. ICANN does not control the Internet. It is a service
the Internet content; on the Internet that uses
Tim Berners Lee rather it develops policies Internet infrastructure.
In 1989, Tim Berners on the Internet's Uniform WWW is a huge client-
Lee, a researcher, Resource Locators server system consisting
proposed the idea of (URL). of millions of clients and
World Wide Web Internet - The Internet is servers connected
(WWW). Tim Berners an interconnected system together. Each server
Lee and his team are of computer networks that maintains a collection of First and Fastest
credited with inventing serves the users all over documents and they can First OS of India- BOSS
Hyper Text Transfer the world. be accessed using a (Bharath OS Solutions)
Protocol (HTTP), HTML Intranet - An intranet is reference called Uniform First Mobile OS of India-
and the technology for a considered as a private Resource Locator (URL). Bharos, Bharath Os (IIT
web server and a web computer network similar Clients can access the Madras) (Jandkops)
browser. Using hyperlinks to Internet that uses documents on the servers first Web browser in the
embedded in hypertext TCP/IP protocol to share using software called world- Nexus
the web developers were information, software or browser.
able to connect web services
pages.
first Web browser of 19 2. The browser then sends a Internet. Each device is
India- EPIC (Hidden request to the DNS server of provided with a unique IP
Reflux) INTERNET 2 the user's ISP to get the IP address which identifies it
address of the URL.. and allows it to transfer data
Programmes used in the
First Search engine in the over Internet without human
Search engine are called -
world- Archie 3. The ISP's DNS server intervention. The huge
CRAWLER
replies with the IP address. increase in the number of IP
PROGRAMMS
First Search engine of addresses due to the
India-GURU 4. The browser then makes a implementation of IPv6
TCP connection to the web supports the introduction of
First Super Computer in server at the IP address this technology. The IoT can
the world- CDC 6600 (www.kerala.gov.in). be used to monitor health of
patients and inform the
First Super Computer of 5. Then it sends a GET doctor about an urgency,
request for the required file applied to things which help
India- PARAM 8000
(web page) to the web server. us reduce wastage like
Fastest Super computer in power, water, etc, and
the world -FORNTIER 6. The web server returns the improve the way we work
web page. and live.
Fastest Super computer of
India- AIRAWAT 7. The TCP connection is Social Media
supercomputer released. Social media refers to the use
of mobile and web-based
AIRAWAT Super 8. The browser processes the technologies through which
computer (75th Rank)- contents of the webpage and individuals and communities
Top 500 (EDAC Pune) displays it. can create, share, discuss and
HOTMAIL (Sabeer modify content.
Bhatia) 1. The browser determines Internet of Things (IoT)
the URL IoT is the concept of 1. Internet forums
(http://www.kerala.gov.in) connecting all devices like An Internet forum is an
entered. mobile phones, fridges, cars, online discussion web site
air conditioners, lamps, where people can engage in
wearable devices, etc. to the conversations in the form of
posted messages. Each their surroundings - text, pictures, videos, etc. Wikipedia itself and other
Internet forum will have sub information about events and and comment to the posts. external resources. Since
forums which may have opinions about topics from a Eg: whatsapp, facebook, users are able to create
several topics. Each wide range of fields. Instagram, Linked in and edit ar- ticles, the
discussion on a topic is Microblogging offers a quality of the content in
called a thread. communication mode that is 6. Content communities the articles depends on
Eg: Ubuntu, Reddit, Quora spontaneous and can Content communities are the person who contrib-
etc influence public opinion. websites that organise and utes and edits it. The
Eg: Twitter, Tumbler, share contents like photos, Malayalam edition of
2. Social blogs Threads videos, etc. Youtube, Tik Wikipedia is available at
A blog (web log) is a Tok, Instagam. ml.wikipedia.org.
discussion or informational 4. Wikis
website consisting of entries Wikis allow people to add Wikipedia is a free online Advantages of Social Media
or posts displayed in the content or edit existing encyclopedia to which Bring people together
reverse chronological order information in a web page, to anyone can add content Plan and organise
i.e., the most recent post form a community and edit. Wikipedia was events
appears first. Some blogs document. Wiki is a type of formally launched on 15th Business promotion
provide comments on a content management system. January 2001 by Jimmy Social skills
particular subject; others Editing done by users is very Wales and Larry Sanger
function as personal online closely monitored by other using the concept and Limitations in use of social
diaries and some others as editors and therefore technology of a wiki. media
online brand advertising for a incorrect information, Wikipedia consists of Intrusion to privacy
particular individual or advertising, etc. are removed over 3 crore articles in Addiction
company. immediately. around 300 languages. Spread rumours
Eg:Blogger.com, Eg:Wikipedia, wikimapia, The english edition alone
Wordpress.com Wikimedia commons includes around 44 lakh Social media interaction
articles and is one of the Best practices
3. Microblogs 5. Social networks most visited websites on Avoid unnecessary
Microblogs allow users to Social networking sites allow Internet. Articles on uploading of personal
exchange short sentences, people to build personal web topics range from very data like e-mail address,
individual images or video pages and then connect with broad to highly specific. telephone num- ber,
links. People use microblogs friends to communicate and Each article consists of a address, pictures and
to share what they observe in share content. We can share number of links to videos.
Setting time schedule for create web pages on the 2. Title Tag 2. Bold Tag
using these sites can save internet. The title tag <title> specifies The <b> tag is used to make
wastage of time. You can use any text the HTML page title, which the text bold.
In social media websites editor to write the HTML is shown in the browser's
like wikis and blogs, code, such as Notepad title bar. 3. Italic Tag
photo and video sharing (PC) or TextEdit (Mac). The <i> tag is used to make
are public. What you Save the file with 3. Body Tag the text italic.
contribute is available for the .html extension, and The body tag <body> is
all to see. Be aware of open it using a web where you insert your web 4. Underline Tag
what you post online. browser of your choice. page's content. The <u> tag is used to set the
Avoid posting content text underline.
you may regret later. Html Tags 4. Paragraph Tag
Set your privacy levels in HTML tags are the A paragraph tag <p> is used Link Tag
such a way that you know keywords on a web page to define a paragraph on a The <a> tag links one page
exactly who can see your that define how your web web page. to another page. The href
posts and who can share browser must format and attribute specifies the
them. The three basic display your web page. 5. Heading Tag location (URL) of the
privacy levels in social Almost all tags contain The HTML heading tag is external resource.
media are private, friends two parts, an opening, and used to define the heading of
and public. a closing tag. For the HTML document. The List Tag
example, <html> is the <h1> tag defines the most The <li> tag is used if you
20 opening tag and </html> important tag, and <h6> want to enter the contents in
is the closing tag. defines the least. the listed order. There are
two types of lists.
INTERNET 3
Basic Html Tags Formatting Tags
i. Ordered list <ol>
Web Designing 1. Emphasis tag
HTML, which stands for 1. Head Tag
The HTML <em> tag is used ii. Unordered list <ul>
Hypertext Markup The head tag <head>
contains all the elements to emphasize the particular
Language, is the language text in a paragraph.
used to describe describing the document.
structured documents and
the language used to
Other Important Tags i) Hub operates on data link Trojan horses, ransome
layer while switch operates ware and spyware.
Tags Description on physical layer. Malware is denoted as
<dl> Definition Computer Contaminant
List ii ) Hub is broadcast type in Indian Cyber Law
<dir> Directory transmission.
List iii) Router operates on VIRUS (Vital Information
network layer. Resource Under Seige)
<select> Dropdown A) (i) only A computer virus is a
List [PYQ.] B) (i) and (ii) program that attaches
<sub> Subscript C) (i), (ii) and (iii) itself to another program
<sup> Superscript D) (ii) and (iii) or file enabling it to
<img> To add spread from one computer
Image [PYQ] What is "Social Media to another without our
<embed> container for Optimization - Creating knowledge and interferes
embedding content which easily 21 with the normal operation
plug-ins creates publicity via of a computer.
(Multimedia) social networks CYBER CRIMES 1 A virus might corrupt or
delete data on our
First line in the html A document containing Social Media computer, replicate itself
document <!DOCTYPE links, in addition to Optimization – Creating and spread to other
html> normal text, to other Content Which Easily computers or even erase
documents is called a - Creates Publicity Via everything in the hard
A computer Hypertext Social Networks disk.
communicates with other The HTML tag used to Almost all viruses are
computers on the internet insert a picture in an Malware attached to executable
through - TCP/IP HTML page is -<img> Malware, or malicious files.
tag software, is any program Viruses spread when the
Q1.Which of the following or file that is intentionally file they are attached to, is
statements is/are false ? harmful to a computer, transferred from one
network or server. Types computer to another using
of malware include a portable storage media
computer viruses, worms, (USB drives, portable
hard disks, etc.), file Worms always slow data Unlike viruses and on the web server from
sharing, or through e-mail traffic on the network by worms, Trojans do not using that service.
attachments. (Host is consuming bandwidth, reproduce by infecting This attack can be done
necessary) whereas viruses almost files nor do they self- using a single computer
always corrupt or modify replicate. called Denial of Service
I LOVE YOU worm files on a computer. (DoS) attack or using
The worm affected The most destructive Ie0199.exe Trojan more than one computer
computers in 2000 by effect that a worm can E-mail users received a called Distributed Denial
overwriting most of the Files cause is through e-mails. message that offered a free of Service (DDoS) attack.
Users received this worm an upgrade to Internet Explorer
email with a subject ne Trojan Horse that contained an executable Distributed Denial of
ILOVEYOU and with a file A Trojan horse, will file Ie0199.exe as Service Attack (DoS)
attachment LOVE LETTER- appear to be a useful attachment. This e-mail
FOR- YOU TXT.vs. Those (appealing) software but instructed the user to
who iced the attachment get will actually do damage download and install this
their computers affected by once installed or run on program for the upgrade. The
the worn and last their flas the computer. users who followed these
When a Trojan is instructions got their files
Computer Worm activated on a computer, infected.
A computer worm is a they can cause serious
stand alone malware damage by deleting files Denial of Service Attack
(malicious software) and destroying (DoS)
program that replicates information on the A Denial of Service(DoS)
itself in order to spread to system. attack is usually aimed at
other computers. Some Trojans create a a web server. An attack in
Worms spread from backdoor on the which the attackers' goal
computer to computer on computer. This gives is to shut down the target
its own. Unlike a virus, it malicious users access to server rather than stealing
does not need to attach confidential or personal data is called DoS attacks.
itself to a program to information in the This prevents genuine A DDoS attack uses
propagate.(Host is not computer through the users of a service/website multiple computers in the
necessary) network. network that it has
previously infected. These
infected computers called Logic Bomb behavior and display White hat hackers
'zombies', work together A logic bomb is a type of personalized ads. Adware White hat hackers, also
and send out large malicious code embedded in can cause problems for known as ethical security
quantities of fake software that remains devices if left unchecked, hackers, identify and fix
messages/requests to the dormant until specific including: Slowing down, vulnerabilities. Hacking into
target server. conditions are met. When Changing settings, Crashing systems with the permission
This increases the amount triggered, a logic bomb virus browsers, Selling data to of the organizations they
of data traffic to the target executes a destructive action, third parties, and Making hack into, white hat hackers
server. This leads to such as deleting files or web browsing worse. try to uncover system
server overload and the disrupting critical systems. weaknesses in order to fix
server is unable to 22 them and help strengthen
provide services to its Ransomware overall internet security.
users. Ransomware is a type of CYBER LAW 2
cryptovirological malware
Spyware that permanently block Cyber Crimes targeting Gray hat hackers
Spyware is malicious access to the victim's Individuals, society, Gray hat hackers may not
software that enters a user's personal data unless a organization have the criminal or
computer, gathers data from ransom is paid. malicious intent of a black
the device and user, and While some simple Hacking hat hacker, but they also
sends it to third parties ransomware may lock the Hacking means an illegal don't have the prior
without their consent. system without damaging intrusion into a computer knowledge or consent of
eg:Pegasus any files, more advanced system and/or network. those whose systems they
malware uses a technique Every act committed towards hack into.
Keylogger called cryptoviral extortion. breaking into a computer
A keylogger, also known as eg: Petya, Wannacry, bad and/or network is hacking. Phishing
keyboard capturing or rabbit, Locky Phishing is a type of fraud
keystroke logging, is a type Black hat hackers that involves stealing
of spyware that records Adware Black hat hackers are personal information
keystrokes and sends them to Adware, or advertising- cybercriminals that illegally (sensitive information)such
a hacker. supported software, is a type crack systems with malicious as Customer ID, IPIN,
of malicious software that intent. Credit/Debit Card number,
displays ads on devices. It Card expiry date, CVV
can also track online number, etc. through emails
that appear to be from a Cyber Slacking Email spamming Data Diddling
legitimate source. Cyber slacking, also known Email spam is the act of Data diddling, also known as
as cyber loafing, is when sending unwanted emails to a false data entry or data
VISHING- Phishing employees use their work large number of people, often manipulation, is a
through Phone Call devices, internet, or other for commercial purposes. cybercrime that involves
SMISHING-Phishing resources for non-work- altering data before or during
through SMS related purposes during Email bombing input to a computer system.
working hours. Email bombing refers to
Defamation sending a large number of Salami Attack
When a person publishes Domain Squatting emails to the victim resulting A salami attack is a type of
defamatory matter about Domain squatting, also in the victim's email account cybercrime where an attacker
someone on a website or known as cybersquatting or (in case of an individual) or steals small amounts of
sends e-mails containing typo squatting, is the practice mail servers (in case of a money from a large number
defamatory information to all of registering, buying, or company or an email service of accounts over time.
of that person's friends, it is using an internet domain provider) crashing.
termed as cyber defamation. name that is similar to Cyber Vandalism
another trademark, brand, or Man-in-the-Middle attack Cyber vandalism is the
Cyber Stalking business name with the intent A man-in-the-middle attack intentional act of damaging
Cyber stalking is the use of of profiting from it or refers to an attack in which or disrupting digital systems,
electronic communication by harming the legitimate an attacker secretly intercepts websites, or online platforms
a person to follow a person, owner. electronic messages between without the intention of
or attempts to contact a the sender and the receiver monetary gain.
person to foster personal Email spoofing and then captures, inserts and Web jacking
interaction repeatedly despite Email spoofing refers to modifies messages during In simplest terms, when
a clear indication of email that appears to message transmission. attackers illegally gain
disinterest by such person; or originate from one source but control of an organisation's
monitors the internet, email actually has been sent from 23 or individual's website is
or any other form of another source. Email known as Web Jacking.
electronic communication spoofing can also cause CYBER LAWS 3
commits the offence of monetary damage. Juice Jacking
stalking. Cyber Crimes targeting Juice jacking is a type of
Individuals, society, cyber attack that uses a USB
organization
charging port to steal data or Pornography accessing, usually by World's very first
infect phones with malware. printed or visual material encrypting the data. antivirus program -
containing the explicit iii) The attacker blackmails Reaper
Cyber Extortion description or display of the victim to pay for getting World's very first virus-
Cyber extortion is sexual organs or activity, access to the data. Creeper
blackmailing an individual or intended to stimulate sexual A) (i) only
organization by threatening excitement comes under B) (i) and (ii) Q2.Which of the following
to release sensitive data or pornography. C) (i), (ii) and (iii) malware types does not clone
launch a cyber attack. According to Section 67 of D) None of these or replicate itself through
the IT Act Whoever infection?
Cyber Terrorism publishes or transmits or A person is continually a. Viruses
Cyber terrorism is usually causes to be published in the chased/followed by b. Worms
defined as any premeditated, electronic form, any material another person or a group c. Trojans
politically motivated attack which is lascivious or of various people - d. Rootkits
against information systems, appeals to the prurient Stalking
programs, and data that interest or if its effect is such
threatens violence or results as to tend to deprave and 24
Antivirus program type
in violence. corrupt persons who are 1. Kaspersky
likely, having regard to all CYBER LAWS 4
2. Quick heal
Intellectual Property relevant circumstances, to 3. McAfee
Rights Violations read, see or hear the matter THE INFORMATION
4. Norton TECHNOLOGY
An intellectual property (IP) contained or embodied in it, 5. AVG
infringement is the shall be punished. ACT.2000
6. Avira
infringement or violation of 7. Bit defender
an intellectual property right. Q1.Which of the following 1. SECTION 43- Penalty
There are several types of and Compensation for
statements about Ransom A Firewall can be a
intellectual property rights, damage to computer,
ware are correct? hardware device or a
such as copyrights, patents, computer system, etc.
i) Ransom ware is a virus software program that
trademarks, industrial 2. SECTION 43A-
which replicate itself. filters all the packets of
designs, and trade secrets. Compensation for failure
ii) Kind of cyber crime data that comes through a to protect data.
where the attacker gains network, the internet, etc.
access to the computer and
blocks the user from
3. SECTION 65-Tampering sexually explicit act, etc IT ACT 2000 to protect g Rs 5
with computer source in electronic form IMPORTANT SECTIONS data crore
documents. 12.SECTION 67B-
4. SECTION 66-Computer Punishment for Important sections Sections relating to
related offences publishing or transmitting relating to Electronic punishment for cyber
5. SECTION 66B - material depicting Records & Digital offences
Punishment for children in sexually Signature Sec crime Maxim Fi
dishonestly receiving explicit act, etc in Section ACT tion um ne
stolen computer resource electronic form 3 Authentication Impris
or communication device. 13.SECTION 72- Penalty of electronic onment
6. SECTION 66C- for breach of records. 65 Tamper 3 2
Punishment for identity confidentiality and 4 Legal ing with YEARS la
theft. privacy. recognition of Comput kh
7. SECTION 66D - 14.SECTION 77B- electronic er s
Punishment for cheating Offences with 3 years records. Source
by personation by using imprisonment to be 5 Legal Docum
computer resources. bailable. recognition of ents
8. SECTION 66E - digital (Source
Punishment for violation signatures. Code)
of privacy. IT ACT 66 Comput 3 5
9. SECTION 66F - Sections relating to er YEARS la
Punishment for cyber IT ACT 2000 compensations for Related kh
terrorism. Came into force - October offences Offence s
10.SECTION 67 - 17, 2000 Se Crime Compen s
Punishment for cti sation (Hackin
publishing or transmitting on g) "43”
obscene material in IT ACT 2008 43 Penalty for Not 66B Dishone 3 1
electronic form. Came into force - October damage to exceedin stly YEARS la
11.SECTION 67A- 27, 2009 computer, g Rs 1 receivin kh
Punishment for computer crore ga s
publishing or transmitting system, etc. stolen
material containing 43 Compensatio Not comput
A n for failure exceedin er
resourc itting khs Sections relating to ഇന്ത്യയിൽ
e or obscen -10 punishment for cyber ഇൻഫർമേഷൻ
commu e lak offences ടെക്നോളജി നിയമം
nication materi hs Sec Crime Maxim fi നിലവിൽ വന്ന വർഷം-
device al in tion um n 2000
66C Punish 3 1 electro impriso e IT Act in India was
ment YEARS la nic nment amended in - 2008
for kh form. 72 Breach 2 Years 1
identity s 67 Cyber 5 years- 10 of la In IT Act 2008, section 65
theft. A pornog 7 years lak confide k deals with -Tampering
66 cheatin 3 1 raphy hs- ntiality h with computer source
D g by YEARS la 10 and documents.
persona kh lak privacy ഐഡന്റിറ്റി മോഷണം
tion s hs 72 Offenc നടക്കുന്നത് തടയുന്ന
67 Child 5 years- 10 B es with ഐ. ടി ആക്ട് - ഐ. ടി
66E Violatio 3 2 B Pornog 7 years lak three ആക്ട് 66 C
n of YEARS la raphy hs- years കമ്പ്യൂട്ടർ വിഭവങ്ങൾ
Privacy kh (Age 10 an ഉപയോഗിച്ച് ആൾമാറാ
s 18) lak above ട്ടം നടത്തിയാൽ (IT Act
hs impris 2000 and 2008) ഏതു
സെക്ഷൻ പ്രകാരമാണ്
Sections relating to 69 Power to onmen
ശിക്ഷ നടപ്പിലാക്കുന്നത്
punishment for cyber intercept/monitor/decr t to be
-66 D
offences ypt any cogniz മറ്റൊരാളുടെ
Sect Crime Maxim Fi communication able – സ്വകാര്യതയിലേക്കുള്ള
ion um ne 69 Power to block Public non കടന്നു കയറ്റം
impriso A Access for Websites, bailabl ഇൻഫർമേഷൻ
nment Apps etc e ടെക്നോളജി
66 Cyber life ആക്ടിന്റെ ഏത്
F terroris impriso സെക്ഷനിൽപ്പെടുന്നു -
m nment സെക്ഷൻ 66E
67 Publis 3 years- Indian IT Act - 2000
hing or 5 lakhs 5 നിയമങ്ങളിൽ സൈബർ
transm La
ടെററിസം ആയി j) Theft, modification and destroy or alter any computer
ബന്ധപ്പെട്ട ശിക്ഷകൾ destruction of source codes source code used for a
25
നിർവചിക്കപ്പെട്ടിരിക്കു Section 43 A computer, computer
ന്നത് ഏത് സെക്ഷനിൽ programme, computer
ആണ് - 66F CYBER LAWS 5 system or computer network,
A Compensation for failure
IT Act Section 66A താഴെ when the computer source
to protect data
പറയുന്നതിൽ ഏത് Section 43 Where a body corporate, code is required to be kept or
സൈബർ Penalty and maintained by law for the
കുറ്റകൃത്യത്തിൻ്റെ
possessing, dealing or
Compensation for damage handling any sensitive time being in force, shall be
ശിക്ഷ നിർദ്ദേശിക്കുന്നു - to computer, computer personal data or information punishable with
തെറ്റായതും system, etc in a computer resource which imprisonment up to three
കുറ്റകരവുമായ വിവര
Computer Contaminant it owns, controls or operates, years, or with fine which
ങ്ങൾ ഇലക്ട്രോണിക്
Malware All kinds of is negligent in implementing may extend up to two lakh
മാധ്യമങ്ങൾ വഴി
malicious software and maintaining reasonable rupees, or with both.
പ്രചരിപ്പിക്കുന്നത്
a) Hacking security practices and
ഇലക്ട്രോണിക്
b) Theft of data procedures and thereby Section 66
രേഖകളുടെ
നിയമപരമായ causes wrongful loss or a) Hacking
c) Deposition of malwares wrongful gain to any person, b) Theft of data
അംഗീകാരം 2000-ലെ
d) Destruction of data and such body corporate shall be c) Deposition of malwares
ഐടി ആക്ടിന്റെ ഏത്
വിഭാഗമാണ്
computer resources liable to pay damages by way d) Destruction of data and
കൈകാര്യം ചെയ്യുന്നത്-
e) Disruption of computer, of compensation, not computer resources
network, server etc ⇒ DoS exceeding five crore rupees, e) Disruption of computer,
Section 4
f) Prevent a person from to the person so affected. network, server etc
using a computer resource ⇒ f) Prevent a person from
DoS Section 65 using a computer resource
24 CHAPTER'S
g) Providing assistance for g) Providing assistance for
COMPLETED
hacking Tampering with Computer hacking
h) Hacking another person Source Documents h) Hacking another person
April 7 for money Whoever knowingly or for money
i) Data destruction, intentionally conceals, i) Data destruction,
correction, thereby reducing destroys or alters or correction, thereby reducing
their value intentionally or knowingly their value
causes another to conceal,
j) Theft, modification and identification feature of any any person without his or her Whoever publishes or
destruction of source codes other person, shall be consent, under circumstances transmits or causes to be
Section 65 punished with imprisonment violating the privacy of that published in the electronic
Section 66 B of either description for a person, shall be punished form, any material which is
term which may extend to with imprisonment which lascivious or appeals to the
Punishment for dishonestly three years and shall also be may extend to three years or prurient interest or if its
receiving stolen computer liable to fine which may with fine not exceeding two effect is such as to tend to
resource or communication extend to rupees one lakh. lakh rupees, or with both. deprave and corrupt persons
device who are likely, having regard
Whoever dishonestly Section 66 D Section 66F to all relevant circumstances,
receives or retains any stolen to read, see or hear the matter
computer resource or Punishment for cheating by Punishment for cyber contained or embodied in it,
communication device personation by using terrorism shall be punished on first
knowing or having reason to computer resource Whoever commits or conviction with
believe the same to be stolen Whoever, by means of any conspires to commit cyber imprisonment of either
computer resource or communication device or terrorism shall be punishable description for a term which
communication device, shall computer resource cheats by with imprisonment which may extend to two three
be punished with personation, shall be may extend to imprisonment years and with fine which
imprisonment of either punished with imprisonment for life'. may extend to five lakh
description for a term which of either description for a rupees and in the event of a
may extend to three years or term which may extend to Section 67 second or subsequent
with fine which may extend three years and shall also be conviction with
to rupees one lakh or with liable to fine which may Publishing or transmitting imprisonment of either
both. extend to one lakh rupees. obscene material in description for a term which
electronic form may extend to five years and
Section 66 C Section 66 E also with fine which may
67 Punishment for extend to ten lakh rupees.
Punishment for identity Punishment for violation of publishing or
theft. privacy. transmitting obscene Section 67 A
Whoever, fraudulently or Whoever, intentionally or material in electronic
dishonestly make use of the knowingly captures, form (Amended vide Punishment for publishing
electronic signature, publishes or transmits the ITAA 2008) or transmitting of material
password or any other unique image of a private area of containing sexually explicit
act.etc. in electronic form (a) publishes or transmits or imprisonment of either (ii) which is kept or used for
(Pornography) causes to be published or description for a term which bonafide heritage or religious
transmitted material in any may extend to five years and purposes
Whoever publishes or electronic form which with a fine which may extend
transmits or causes to be depicts children engaged in to ten lakh rupees and in the Explanation: For the
published or transmitted in sexually explicit act or event of second or purposes of this section,
the electronic form any conduct or subsequent conviction with "children" means a person
material which contains (b) creates text or digital imprisonment of either who has not completed the
sexually explicit act or images, collects, seeks, description for a term which age of 18 years.
conduct shall be punished on browses, downloads, may extend to seven years
first conviction with advertises, promotes, and also with fine which may Section 69
imprisonment of either exchanges or distributes extend to ten lakh rupees: Powers to issue directions for
description for a term which material in any electronic interception or monitoring or
may extend to five years and form depicting children in Provided that the provisions decryption of any
with fine which may extend obscene or indecent or of section 67, section 67A information through any
to ten lakh rupees and in the sexually explicit manner or and this section does not computer resource.
event of second or (c) cultivates, entices or extend to any book,
subsequent conviction with induces children to online pamphlet, paper, writing, Section 69 A
imprisonment of either relationship with one or drawing, painting, Power to issue directions for
description for a term which more. children for and on representation or figure in blocking for public access of
may extend to seven years sexually explicit act or in a electronic form- any information through any
and also with fine which may manner that may offend a (i) The publication of which computer resource
extend to ten lakh rupees. reasonable adult on the is proved to be justified as
computer resource or being for the public good on Section 69 B
Section 67B (d) facilitates abusing the ground that such book, Power to authorize to
children online or pamphlet, paper writing, monitor and collect traffic
Punishment for publishing (e) records in any electronic drawing, painting, data or information through
or transmitting of material form own abuse or that of representation or figure is in any computer resource for
depicting children in others pertaining to sexually the interest of science, Cyber Security
sexually explicit act, etc. in explicit act with children, literature, art or learning or
electronic form. other objects of general
shall be punished on first concern; or
Section 72
Whoever, conviction with
Breach of confidentiality 77 B Offences with three your IP address. This helps
and privacy years imprisonment to prevent unauthorized people
Save as otherwise provided be cognizable from seeing your traffic and
in this Act or any other law (1) Notwithstanding anything gives you the ability to work
for the time being in force, contained in Criminal remotely. VPNs are often
any person who, in pursuant Procedure Code 1973, the used in corporate
of any of the powers offence punishable with environments.
conferred under this Act, imprisonment of three years 1. To encrypt data
rules or regulations made and above shall be communication.
there under, has secured cognizable and the offence 2. To hide your IP Address.
access to any electronic punishable with
record, book, register, imprisonment of three years 25 chapters completed
correspondence, information, shall be bailable.
document or other material April 16
without the consent of the VPN Virtual Private
person concemed discloses Network)
such electronic record, book,
register, correspondence,
information, document or
other material to any other
person shall be punished
with imprisonment for a term
which may extend to two
years, or with fine which
may extend to one lakh
rupees, or with both.
VPN stands for virtual
private network, and it's a
Section 77B service that creates an
Offences with three years encrypted connection
imprisonment to be between your device and a
cognizable remote server, which
encrypts your data and hides
i) Digitizer is an input Spread sheet Software-is
device.. not a system software
ii) Plotter is an output device. Network device is used to
iii) Joystick is not an input connect two computer
device. networks that use
26 A) (i) only different protocols -
B)(1) and (ii) Gateway
REVISION 1 C) (i), (ii) and (iii) The HTML tag used to
D) (ii) and (iii) insert a picture in an
System Software allows
storing the output as HTML page is-
Object Code- Compiler FIFO scheduling is- Non <img> tag
pre emptive scheduling A special temporary high
The current fastest Super
Computer as per TOP500 Stealing any digital asset speed storage area within
ranking is- Frontier HPE or information is listed as the CPU of the computer
Cray EX235a a cyber-crime under is-Register
India- AIRAWAT which Section of the IT OMR- is an input device
Act- 65 The elapsed time between
Search Engine provided
by Micro Soft Processor management- the time of a program is
Corporation is-BING is not a function of submitted and time when
Browser- Edge operating systems. it is completed by the
A computer The cyber crime where a CPU is- Turn around
communicates with other hacker sends malicious time
computers on the internet links to users to gain HTML tags is used to
through-TCP/IP access to their computers create a drop down list -
and accounts is called- <SELECT> tag
Which Section of IT Act,
Phishing The network topology in
2000 deals with legal
recognition of electronic Gateway- device can join which devices are not
records- Section 4 a LAN to a WAN. linked to each other and
computer memory that a where hub acts as a
Q1. Which of the following FLASH MEMORY central controller is-Star
statement is/are true? belongs to – EEPROM Q2.A flow chart is a kind of
A) One dimensional graphics
B) Two dimensional graphics
C) Three dimensional
graphics
D) None of these
World Computer Security
day an-November 30
computer language is
used for Artificial
Intelligence –
PROLOG,LISP ,PYTH
ON
The extension of
“.com, .edu, .org, .net” etc
are usually called-
Domain name
Security-is a firewall
protection
26 chapters completed
April 21