You are on page 1of 3

Paper Name: Cyber Crime and Cyber Laws Paper Code: BCA OE413

Important Topics: Information Technology Act 2000, Cyber Crime, Cyber Security, Cyber-
attacks and its types, Cyber Forensics investigation, Trademark & Merchandise act, patent
act, Copyright act
Q1) Fill in the blanks
i)The Information Technology Act 2000 is an Act of Indian Parliament notified on___________
ii)Digital Signature Certificate is ____________ requirement under various applications
iii)________ is a data that has been organized or presented in a meaningful manner
Authentication is _________.
iv)_________ means authentication of any electronic records by a subscriber by the means of an
electronic method. Digital Signature

v) Forensics investigators often work as part of a team to make computers and networks secure,
known as the _________________.

vi) _______ refers to all the legal and regulatory aspects of the Internet and Law.
vii) ii) First rule of computer forensics is preserving the _________________.

viii) _____rights in the Copyright Act, 1957 conjointly protects the ethical rights, that is due to the
actual fact that a literary or inventive work reflects the temperament of the creator, just as much as
the economic rights reflects the author’s need to keep the body and the soul of his work out from
commercial exploitation and infringement.

ix) __________act confers the right to manufacture, use, offer for sale, sell or import the invention
for the prescribed period to the inventor.

x) ___________________are the gaps or weaknesses in a system that make threats possible and
tempt threat actors to exploit them.
xi)Computer Forensics is the collection, preservation, analysis and _________________of computer related
evidence
xii) Major amendments to IT Act 2000 were introduced in the form of IT (amendment) Act in ___________
year.

Q2 State True or False


1. Cybercrime is a cyber-related behaviour that is against the law.
2. According to the sociological definition of cybercrime, the cyber-related behaviour does not have
to be necessarily illegal but just defined as wrong by society.
3. According to the sociological definition of cybercrime, the cyber-related behaviour has to be
both wrong and illegal.
4 Cybercriminals tend to have higher IQs than the general population.
5 When caught, cybercriminals rarely go to prison.
6. Cybercrime can be fully prevented with virus protection software.
7.Cyber bullies feel less remorse than traditional bullies because they don’t see the victim’s
reactions.
8. It could be concluded about Internet sex crimes that they are also about power.
9.Cyber terrorism is an act or series of acts committed internationally, between states, but not
domestically within the same state.
10.Hacktivists, script kiddies, white coat hackers, and empirical hackers are all types of hackers.
11. White hat hackers are researchers and scholars who hack in order to better understand computer
vulnerabilities and generate scholarly information about the topic.
12 Cryptology includes both cryptography and cryptanalysis
Q3) Define the terms
(i)E-mail (ii) Internet Crime (iii) Cyber Terrorism (iv) Cyber Stalking (v) Antivirus (vi) Spam (vii)
(viii) Digital Signature (ix) Domain Name (x) Network service provider xi) Cyber space xii)
offence xiii) penalty xiv) computer system

Q4) Study the following case study and state which section of Information technology act is
applicable with penalty.

a) Mphasis BPO Fraud: 2005In December 2004, four call centre employees, working at an
outsourcing facility operated by MphasiS in India, obtained PIN codes from four customers of
MphasiS’ client, Citi Group. These employees were not authorized to obtain the PINs. In
association with others, the call centre employees opened new accounts at Indian banks using false
identities. Within two months, they used the PINs and account information gleaned during their
employment at MphasiS to transfer money from the bank accounts of CitiGroup customers to the
new accounts at Indian banks.
By April 2005, the Indian police had tipped off to the scam by a U.S. bank, and quickly identified
the individuals involved in the scam. Arrests were made when those individuals attempted to
withdraw cash from the falsified accounts, $426,000 was stolen; the amount recovered was
$230,000.
b) Fake profile of President posted by imposter On September 9, 2010, the imposter made a fake profile in
the name of the Hon’ble President Pratibha Devi Patil. A complaint was made from Additional Controller,
President Household, President Secretariat regarding the four fake profiles created in the name of Hon’ble
President on social networking website, Facebook. The said complaint stated that president house has
nothing to do with the Facebook and the fake profile is misleading the general public. The First Information
Report Under Sections 469 IPC and 66A Information Technology Act, 2000 was registered based on the said
complaint at the police station, Economic Offences Wing, the elite wing of Delhi Police which specializes in
investigating economic crimes including cyber offences.
c) Sandeep Vaghese v/s State of Kerala
A complaint filed by the representative of a Company, which was engaged in the business of trading and
distribution of petrochemicals in India and overseas, a crime was registered against nine persons, alleging
offenses under Sections 65, 66, 66A, C and D of the Information Technology Act along with Sections 419
and 420 of the Indian Penal Code.
The company has a web-site in the name and and style `www.jaypolychem.com’ but, another web site
`www.jayplychem.org’ was set up in the internet by first accused Samdeep Varghese @ Sam, (who was
dismissed from the company) in conspiracy with other accused, including Preeti and Charanjeet Singh, who
are the sister and brother-in-law of `Sam’
Defamatory and malicious matters about the company and its directors were made available in that website.
The accused sister and brother-in-law were based in Cochin and they had been acting in collusion known
and unknown persons, who have collectively cheated the company and committed acts of forgery,
impersonation etc.
Two of the accused, Amardeep Singh and Rahul had visited Delhi and Cochin. The first accused and others
sent e-mails from fake e-mail accounts of many of the customers, suppliers, Bank etc. to malign the name
and image of the Company and its Directors. The defamation campaign run by all the said persons named
above has caused immense damage to the name and reputation of the Company.
The Company suffered losses of several crores of Rupees from producers, suppliers and customers and were
unable to do business.

Q5 Theory questions

1) State the reasons for coming into existence of Information Technology Act-2000.
2) Explain the different categories of cyber-crime.
3) Explain Information Technology act-2000 with its chapters
4) What do you mean by cyber defamation?
5) What is digital forensic analysis?
6) Explain the phases of cyber forensics.
7) Distinguish Hackers and Crackers.
8) What is cyber fraud?
9) Explain the power of Cyber Appellate Tribunal of Cyber.
10) Is there any protection for digital signature in India? What method has the Act adopted?
Explain.
11)What is EDI?
12) What are the advantages of Information Technology act-2000?
13)Explain the cybercrime and its types

You might also like