0% found this document useful (0 votes)
9 views3 pages

Untitled Document

The document provides a list of 35 one-liner questions and answers related to cyber law and cybercrime. It covers definitions, legal frameworks, types of cybercrime, and relevant laws such as the IT Act, 2000. Key topics include hacking, identity theft, cyberbullying, and the dark web.

Uploaded by

Staneditx
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
9 views3 pages

Untitled Document

The document provides a list of 35 one-liner questions and answers related to cyber law and cybercrime. It covers definitions, legal frameworks, types of cybercrime, and relevant laws such as the IT Act, 2000. Key topics include hacking, identity theft, cyberbullying, and the dark web.

Uploaded by

Staneditx
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 3

Cyber law one liners

Absolutely! Here’s your full list with questions and one-line answers, perfectly formatted
for easy studying:

One-Liner Questions (35)

1. What is cyber law?

Cyber law refers to the legal framework that governs activities conducted through
computers, the internet, and other digital platforms.

2. Define cybercrime.

Cybercrime is any illegal activity involving computers or networks.

3. What is the objective of the IT Act, 2000?

The objective of the IT Act, 2000 is to provide legal recognition to electronic transactions and
combat cybercrime.

4. What is hacking?

Hacking is the unauthorized access or control over a computer system or network.

5. What is phishing?

Phishing is a method of tricking people into revealing personal information using fake emails
or websites.

6. Define identity theft.

Identity theft is stealing someone’s personal information to impersonate them online.

7. What is cyberstalking?

Cyberstalking is the use of the internet to harass or threaten someone repeatedly.

8. What does CERT-IN stand for?

CERT-IN stands for Indian Computer Emergency Response Team.

9. What is cyber terrorism?

Cyber terrorism is the use of technology to cause large-scale disruption or fear, especially
for political or religious reasons.

10. What is an electronic signature?

An electronic signature is a digital form of a signature used to authenticate electronic


documents.

11. What is ransomware?


Ransomware is a type of malware that locks your data and demands payment to release it.

12. What is spyware?

Spyware is software that secretly collects a user’s data without their knowledge.

13. What is cybersquatting?

Cybersquatting is registering, using, or selling a domain name to profit from someone else’s
brand or trademark.

14. What is vishing?

Vishing is voice-based phishing, where fraudsters call to steal personal information.

15. What is the punishment for hacking under the IT Act, 2000?

The punishment for hacking under the IT Act, 2000 is imprisonment up to 3 years and/or a
fine up to ₹5 lakh.

16. What is cyberbullying?

Cyberbullying is bullying or harassing someone online through messages, posts, or threats.

17. What is the role of a cyber-forensic expert?

A cyber-forensic expert collects, preserves, and analyzes digital evidence to help in


investigations.

18. What is ethical hacking?

Ethical hacking is legally testing systems for vulnerabilities to strengthen cybersecurity.

19. What is the significance of Section 67 of the IT Act?

Section 67 of the IT Act punishes publishing or transmitting obscene material in electronic


form.

20. What is meant by data protection?

Data protection means safeguarding personal data from unauthorized access or misuse.

21. What is digital evidence?

Digital evidence is information stored or transmitted in digital form used in legal cases.

22. Define spoofing.

Spoofing is faking an identity or source of communication to deceive someone.

23. What is a Trojan horse?

A Trojan horse is malware that disguises itself as legitimate software to harm a system.

24. What is cyber defamation?


Cyber defamation is publishing false information online that damages someone’s reputation.

25. Define DoS attack.

A DoS attack (Denial of Service) is flooding a system to make it crash or stop working.

26. What is malware?

Malware is any malicious software designed to harm or disrupt computers.

27. What is OTP fraud?

OTP fraud involves tricking someone into sharing their one-time password for theft or fraud.

28. What is a logic bomb in cybercrime?

A logic bomb is malicious code triggered by specific conditions or actions.

29. What is a botnet?

A botnet is a network of infected computers controlled by a hacker to perform large-scale


attacks.

30. What is crypto-jacking?

Crypto-jacking is secretly using someone’s device to mine cryptocurrency.

31. What is the penalty for sending offensive messages through


communication service?

Under the now-invalid Section 66A, the penalty was up to 3 years’ imprisonment and a fine.

32. What is the meaning of cyber contraband?

Cyber contraband refers to illegal digital content like child pornography or banned materials
shared online.

33. Define social engineering in the context of cybercrime.

Social engineering means manipulating people into giving up confidential information.

34. What is Section 66A of the IT Act and its status?

Section 66A punished sending offensive messages online but was struck down in 2015 for
violating free speech.

35. What is dark web?

The dark web is a hidden part of the internet used for anonymous and often illegal activities.

Would you like this in a PDF or printable sheet format too?

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy