Anda di halaman 1dari 8

1) What is electronic warfare?

Electronic warfare (EW) refers to any action involving the use of the electromagnetic spectrum or directed energy to control the spectrum, attack an enemy, or impede enemy assaults via the spectrum. The purpose of electronic warfare is to deny the opponent the advantage of, and ensure friendly unimpeded access to, the EM spectrum. EW can be applied from air, sea, land, and space by manned and unmanned systems, and can target communication, radar, or other services.[1] EW includes three major subdivisions: Electronic Attack (EA), Electronic Protection (EP), and Electronic warfare Support (ES). (2) What are the ten commandments for computer ethics? The ten commandments for computer ethics are following:-1. Thou shalt not use a computer to harm other people. 2. Thou shalt not interfere with other peoples computer work. 3. Thou shalt not snoop around in other peoples files. 4. Thou shalt not use a computer to steal. 5. Thou shalt not use a computer to bear false witness. 6. Thou shalt not use of copy software for which you have not paid. 7. Thou shalt not use other peoples computer resources without authorization. 8. Thou shalt not appropriate other peoples intellectual output.9. Thou shalt think about the social consequences of the program you write. 10.Thou shalt use a computer in ways to show consideration and respect. (3) List the code of ethics for IT professionals. A Professional member of the Computer Society of India (CSI) gives the following code of ethics for IT professionals: -1) Organize the resources available to him and optimize these in attaining the objectives of his organization, 2) use the codes of practice conveyed by the CSI from time to time in carrying out his tasks, 3) Not misuse his authority or office for personal gains, 4) comply with the Indian laws relating to the management of his organization particularly with regard to Privacy and Piracy, and operate within the spirit of these laws, 5) conduct his affairs so as to uphold project and further the image and reputation of the CSI,6) Maintain integrity in research and publications. (4) Discuss the impact of the information technology revolution on societies. The impact of information technology resolution on society are following:People often the compare growth of internet to the h istoric growth of other technologies. Internet is just the latest technologies advance and may not single a revolutionary advance, but the different between the birth of internet and technologies that preceded it. Radio was in 38 years before 50 million people used it. TV took 13 years to reach the same standard and it was 16 years before 50 million people used a PC. Once the internet was made to general public and it takes only 4 years for 50 millions people to go-line. (5) Explain with the help of historical milestones,the evolution of computer ethics. The computer revolution is occurring in two stages. The first stage was that of technology introduction in which computer technology was developed and refined. The second stage is of technological permeation in which technology getsincluded into everyday human activities. -In the 1940s and 1950s computer ethics as a field of study had its roots in the new field of research called cybernetics? The concepts of cybernetics led Weiner to draw some rem arkable ethical conclusions about the technology that is now called information and communication technology.1960s Don Parker began to examine the unethical and illegal uses of computers by computer professions. He published Rules of Ethics in Information Processing, and headed the development of the first code of professional conduct for his association of computing machinery. The 1970s saw Walter Maner present the term Computer Ethics to refer to that field of question dealing with ethical problems forced, transformed by computer technology.1980s a number of social and ethical penalty of information technology were becoming public issues in America and Europe. Issues like compute enabled crime, disasters caused by computer failures, invasions of privacy.1990s sign the beginning of the second generation of computer ethics .In this generation we are reducing the unexpected effects of information technology application. (6) Explain the impact of internet on the economy of the country and the society at large. The virtual world has taken over the real one. Our society is increasingly relying on new information technologies and the internet to conduct business, manage industrial activities, connect in personal communications and performscientific research. E-business and e-commerce are the new mantras and electronic transactions dominate the overall business model. While these technologies facilitate enormous gains in efficiency, productivity and communications, they also create new vulnerabilities in terms of possibilities of misuse. The same interconnectivity that allows us to transmit information around the globe at the click of a mouse or push of a button also creates unique opportunities for criminals, terrorists and hostile foreign nationstates, who might seek to steal money or proprietary data I nvade private records etc. Digitalization has radically transformed the ways of accessing and using information. Technical convergence not only rendered increase to this process, but also as a result, affected positiveimpact on economics of the nations. The influence of cyber is so striking in our day to day lives that one would discern not only in the realm of trade & commerce, but also in the ambit of personal communications, academic and scientific research, critical infrastructure and the like. (7) What are the remedies for the breach of a contract? The principal remedies for the breach of contract are:Damages: -The loss or damage arising from the breach of contract the means which existed of remedying the problem caused by non-performance of contract must be taken into account. It has also penal condition. Specific Performance of the Contract: -In certain cases,the court directs against the party in default for the "specific performance" of the contract. This means the party will be asked to perform obligations that he needs to perform according to the contract. The party may be direct to perform which has undertaken by contract that is to say specific performance. Injunction: -An

injunction is a preventive relief and is granted at the discretion of the court. A further check on the discretion is the provision for correction through an appeal in a higher court. It is a defensive and is granted the judgment of the court. It has different types are:a) Temporary injunction: A temporary injunction is granted to continue until a specified period of time or until the time the court orders its continuation. b) Permanent injunction: A permanent injunction is granted to prevent a breach of an obligation existing in favour of an applicant. (8) Discuss the impact of globalization on computer ethics. Computer ethics is fast developing into a broader and even more important field, which might reasonably be called global information ethics. Some of the global issu es being debated are:(a)Global laws:Over two hundred countries are already interconnected by the internet. Issues regarding freedom of speech, protection of intellectual property, invasion of privacy vary from country to country. The outline of common laws pertaining to such issues to ensure agreement by all the countries is one of the foremost questions being debated. (b)Global cyber business:Technology is growing rapidly to enable electronic privacy and security on theinternet to safely conduct international business transactions. Nations with a technological infrastructure already in place will enjoy rapideconomic growth, while rest of the world lags behind. This difference in levels of technology will fuel political and economic quarrel, which could further widen the gap between the rich and the poor. (c)Global education:Inexpensive access to the global information net for the rich and the poor alike is necessary for everyone to have access to daily news from a free press, free texts, documents, political, eligious and social practices of peoples everywhere. The impact of this sudden and global education on different communities, cultures and religious practices are likely to be profound. (9) Comment on the statement There is no nexus between cyb er space and real space. There is the difference between the business rules for online commerce and carrying business in the real space. Much of this difference comes from Internet's telepresence features. This feature renders the networktechnologically indifferent to physical location. The network is very insensitive to geography. It is not possible to determine the physical location of a user or a resource In real space, locating a person or entity with which business is interacting is much easier. In the cyberspace to know the location of the partners with whom we are interacting is very difficult to know. In some instances, even an Internet address tells something only about the location of a given machine. There is no way to find the information about the actual user. In this sense we can say, There is no nexus between cyberspace and real space. (10) What is common law? How does it differ from codified law? Common law is the part of the law that formulated developed and administered by old common law courts, based originally or unwritten common custom. Common law or uncodified law is the law flowing from judicial decisions. E.g., the process of dispute resolution or adjudication of liability by either village elders orpeople holding power through the process of issuing commands has received social acceptance. The uncodified law governs large segment of the legal regime. The judgment pronounced by an organ of the higher judiciary performs at least two important functionsFor the immediate parties, the judgment becomes a source, rights and duties. For the world, it becomes a source of law It happens to deal with a legal proposition-and to make a definite pronouncement on the subject. It is different from codified law because codified laws are made formally by a Law making body of people, whereas common laws have their enunciations through decisions of courts. (11) Explain the different sources of law. There are three types of sources of law they are following: -(a)Legislation law:-It is the formal performance of law by the government and created by the organization. It stands in difference to judge made law. Legislation law also consists of written laws, as contrast with judge made law orcommon law. Legislation law is also stands in contrast to customary law. (b)Common law:-Common law comprises the body of principles. It is a body of law that develops and derives through legal decisions, as famous from law making act. The established judicial practice that a court must follow, the law put down by a decision of the higher judiciary in the Country or State. (c)Customer law:-Customer law is also a source law that denotes a usage of people, including a particular social group residing in a particular locality. It has become compulsory and has obtained the force of law with respect to place or subject matter to which is relates. The operation of customer is generally restricted to a particular locality, group or family. (12) How is a professional code distinguished? The professional code is divided into three types, and they are following:(a)Code of ethics:-Code of ethics is more aspirational (aim).They are mission statements stressed the professional objectives and vision. (b)Code of conduct:-Code of conduct is oriented towards the professionals attitude. They make clear the issues at risk in different specialized fields. (c)Code of practice:-Technical document on health and safety issue approved by government minister .It provides practical guidance on way to achieve agreement with OMC(Order Management Cycle) legislation. The disadvantage is that there is no direct scheme of enforcement. (13).Define computer ethics and give classifications of ethical issues. The term computer ethics was coined in the mid 1970s by Walter Manor to refer to that field of applied professional ethics dealing with ethical problems aggravated, transformed, or created by human technology. Computer ethics is the analysis of the nature and social impact of computer technology. Computer ethics is standards of professional practice, codes of ethics, aspects of computer law ,public policy, corporate ethics etc. Computer ethics examine theethical issues surrounding computer usage and the connection between ethics and technology. It includes consideration of both personal and social policies for ethical use of computer technology. The goal is to understand the impact of computing

technology upon human values, minimize the damage that technology can do to human values, and to identify ways to use computer technology to advance human values. *Issues of Ethics:-There are four kinds of ethics issues, they are listed below:(1)Privacy: Collection, storage and giving out information about individuals. What information about oneself should an employer is required to expose to others. What kind of observation can an employer use on its employees? What things can people keep to themselves and not be forced to expose to others. (2)Accuracy: Validity, commitment and accuracy of information collected and obtained .Who is responsible to collect information? How can we ensure that information will be proper and accurate to the users? How can we ensure that errors in databases, data transmissions and data processing are accidental and not intentional? (3) Ownership and value of information. Who owns the information? What are the just and fair prices for its exchange? How should one handle software piracy? Under what conditions can one use proprietary databases? Can corporate computers be used for private purposes? (4)Accessibility:-Right to access information and payment towards the same. Who is allowed to access information? How much should be charged for permitting accessibility to information. How can accessibility are provided for employees with disability .Who will be provided with equipment needed for accessing information? 14) What are the fundamental conceptions regarding the evaluation of individual actions. There are two fundamental conceptions regarding the evaluation of individual actions are:-(a) First is to examine an issue under independently justified ethics of what one considers being right. There is referred to as deontological approach where one starts out with one or more moral principles and see how they apply to particular cases. (b) Secondly to look for the course of action that maximizes the good and this approach involves determining which action defers the best penalty measured in some standard of the good. This approach is referred to as teleological that involves structure what is good for users, and spells out, what is wrong with action that hold up with attempts to get it. Both of these approaches represent over basic accounts of moral thought and decision-making and need to be developed sufficient as an ethical framework for the moral evaluation of individual cases and actions. (15) How do professional codes address issues from the view point of computing profession? The professional codes address issues from the view point of computing professional however it has three level of professional code ethics needs toaddress are:-(1)First level identified is a set of ethical values, such as integrity and justice professionals share with other human being by virtue of their shared humanity. (2)Second level is that more challenging duty than those required at the first level. Every type of professional shares this second level of ethical duty. Code statements at this level express the responsibility of all professionals andprofessional attitudes. (3)Third level, it includes requirement that derive directly from elements to particular professional perform. Code elements at this level declare more specific responsibilities that are more closely related to the state of art within the particular profession. (16) State and explain the primary assumptions of legal system. Any legal system is premised upon the following primary assumptions as a foundation: (a)Sovereignty:-Law making power is a matter of sovereign prerogative. As a result, the writ of sovereign authority runs throughout wherever sovereign power exercises authority. Beyond its authority, the sovereign cannot regulate a subject matter through legal intervention. (b)Territorial Enforcement:-Any law in real world context can only be subjected to predetermined territorial enforcements. There are some exceptions to this. The sovereign authority could join extra territorial jurisdiction in case of criminal law. This indicates that the sovereign authority can initiate prosecution, even if the crime is committed beyond the limits of the territory. (c)Notion of property:-The obtaining premise of the legal response considers 'property' as tangible and physical. In the cyber context, 'property' in the form of digitized services or goods poses serious challenges to this legal understanding. (d)Paper-based transaction:-Obtaining legal response considers and encourages people to create and constitute legally binding relationships on the basis of paper-based transactions. Although the word document under law takes within its fold material other than paper also. Since in cyber context, digital orelectronic record forms the basis of electronic transactions. Hence, the transactions are on the basis of electronic records. (e)Real relationships:-Legal response considers relationships quite often. In view of connectivity, pace and accuracy as to transmission, in the cyber context, these relationships acquire unique distinction of virtual character. In case oftrade and commerce, commercial transaction in the form of contracts constitutes the foundation of legal relationship. (17) Discuss the classification of crimes under the IT Act 2000. The classification of crimes under the IT Act, 2000 are following:-Securing access to computer, computer system, computer network. Introducing any computer virus or impurity in the computer system or network. Damaging the computer, computer system or network. Disrupting the working of the computer, computer system or network. Disrupting the access of the computer, computer system or network of an authorized user. Providing assistance to ensure unauthorized access to the c/s or network. Tempering with computer source documents. Hacking with c/s; publishing of information which is absence in electronic form. Breach of confidentiality and privacy.Publishing Digital certificate that are false in certain particulars. (18) Explain the policy approaches to privacy issues. The policy approaches to privacy issues are:-(1)Market approach:A technique used in appraising property which compares recently sold comparableproperties in arriving a conclusion as to fear market value. (2)Human rights approach:It recognizes right to information and related attribute of privacy as human right. (3)Contract

approach:A conscious decision to create a non-governmental structure. A conscious decision not to convene a global conference. In h is model premise on the ground that is a given context the privacy concern are letter and protect if treated as term and conditions of constrict. (19) What are the moral rules on the internet? Discuss the types of problematic behavior. Moral rules can be notable into two types governing online behavior. (1)The first type of moral rules identifies our moral obligations online. Examples of such rules are netiquette rules and Codes of conduct examples of which are be polite in e-mail correspondence, always tell the client the truth. (2)The second type of moral rules or recognition rules allows us to identify what is moral and what is not. Examples of recognition rules are read the signs, follow the instructions. **There are three type of problematic behavior, they are listed below:(a)First type of problematic behavior involves individuals and their actions are broadly referred to as hacking. It also included intentionally sending viruses or worms on the net that damage the computer systems. Hacking is unethical and has rightly been made illegal. (b)The second category of problematic behavior is the criminal actions involving theft (robbery) and extortion. Falling in the scope of criminal actions include stealing of electronic funds, cyber stalking etc. (c)The third category of problematic behavior involves issues whether specific laws need to be framed to make such behavior illegal. This is known as netiquette. Netiquette promotes ethical behavior and thus is an important tool for shaping the behavior on the net. (20) Describe computer Hacking.The term computer hacking usually describes the penetration of damage but for the pleasure of overcoming the technical security measures. In practice, this kind of offence can be normally found. As far as the damage of these cases is concerned, a separation is essential: In numerous cases, the penetrated computer user is not actually harmed, but only endangered. However, in these cases, too, the formal sphere of secrecy or the integrity of the concerned computer systems is violated. Contrary to this, considerable damages occur in other cases especially when the perpetrators later use their knowledge for committing espionage, damage or fraud. (21) What is cyber privacy? Explain. Cyber privacy is necessary for the authorities to indulge in surveillance in order to keep cybercrime in control. The same surveillance affects the privacy of millions of the people who use the Internet every day. However, privacy is extremely important to all individuals, organizations, and nations. The Indian judiciary has not laid down specific laws regarding cyber privacy. Currently, the judiciary can only interpret privacy in accordance with the existing regulations. As per Article 21 of the Indian constitution, the right to privacy is an integral part of the fundamental right to life. The Information Technology Bill of 1999 has ignored the issue of privacy except for section 71, which says that any person who secures access to any electronic record, book, register, correspondence, information, document, or other material without the consent of the concerned persons and discloses the same to any other person will be punished for upto two years of imprisonment, or fined upto Rs. 1 lac, or both. Internet users are asked to volunteer information, they must be told how and why the collected information will be used, what type of information will be shared with whom, and what type of information will not be shared. All websites that collect information must protect it by using all means possible. (22) Explain principles of computer ethics. Ans: There are eight types of computer ethics principles: 1) PUBLIC: Software engineers shall act consistently with the public interest. In particular, software engineers Shall accept full responsibility for own work. Moderate the interests of the software engineer, the employer, the client and the users with the public good. 2) CLIENT and EMPLOYEE: Software engineers shall act in a manner that is in the best interests of their client and employer, consistent with the public interest. Provide service in their areas of competence, being honest and forthright about any limitations of their experience and education. 3) PRODUCT: Software engineers shall ensure that their products and related modifications meet the highest professional standards possible. 4) JUDGMENT: Software engineers shall maintain integrity and independence in their professional judgment. In particular, software engineers shall; Temper all technical judgments by the need to support and maintain human values. Only endorse documents either prepared under their supervision or within their areas of competence and with which they are in agreement. 5) MANAGEMENT: Software engineering managers and leaders shall subscribe to and promote an ethical approach to the management of software development and maintenance. In particular, those managing or leading software engineers shall ensure good management for any project on which they work, including effective procedures for promotion of quality and reduction of risk.

6) PROFESSION: Software engineers shall advance the integrity and reputation of the profession consistent with the public interest. In particular, software engineers shall; Help develop an organizational environment favorable to acting ethically. Promote public knowledge of software engineering. 7) COLLEAGUES: Software engineers shall be fair to and supportive of their colleagues. In particular, software Engineers shall; Encourage colleagues to adhere to this Code. Assist colleagues in professional development 8)SELF: Software engineers shall participate in lifelong learning regarding the practice of their profession and shall promote an ethical approach to the practice of the profession. In particular, software engineers shall continually endeavor to: Further their knowledge of developments in the analysis, specification, design, development, maintenance and testing of software and related documents, together with the management of the development process (23) What is meant by unauthorized access to a computer? Explain. The IT Act defines unauthorized access by any person as acts done without the permission of the owner, which includes: Solved By:- Nishant & Amlesh Page 8 of 20 Accessing or securing access to such computer, computer system or computer network Downloading, copying or extracting any data or information for such computer, computer system or computer network including information or data held or stored on any removable storage medium Introducing any computer virus or contaminant in the computer, computer system or network Damaging the computer, computer system or network Disrupting the working of the computer, computer system or network Disrupting the access of the computer, computer system or network to an authorized user Providing assistance to ensure unauthorized access to the computer, computer system or network The penalty to be paid by the person for unauthorized access by way of compensation not exceeding one crore rupees to the affected person. (24) What are the amendments to the Indian Penal Code? Ans: The Indian Panel Code (IPC) detail actions that constitute a crime and the punishment prescribed for such action. It elaborately classifier crimes based on interests that are intended to be protected the classification includes: 1) Offences against body. 2) Offences against property. 3) Offences against marriage. 4) Offences against public tranquility. 5) Offences against state. As the definition of crime world includes a practice act or deliberate cyber transaction using the equivalent of a document needs protection under law. To facilitate enforcement of law to cover cyber transaction, the IPC has been assented to cover cyber transaction. The important changes in IPC include prevision regarding documents and signature. As electronic records have replaced documents in the IT Act, the IPC have been amended to read also the expression electronic records where the term document appears in the act. (25) Define computer ethics and give classifications of ethical issues. The term computer ethics was coined in the mid 1970s by Walter Manor to refer to that field of applied professional ethics dealing with ethical problems aggravated, transformed, or created by human technology. Computer ethics is the analysis of the nature and social impact of computer technology. Computer ethics is standards of professional

practice, codes of ethics, aspects of computer law, public policy, corporate ethics etc. Computer ethics examine the ethical issues surrounding computer usage and the connection between ethics and technology. It includes consideration of both personal and social policies for ethical use of computer technology. The goal is to understand the impact of computing technology upon human values, minimize the damage that technology can do to human values, and to identify ways to use computer technology to advance human values. Issues of Ethics: There are four kinds of ethics issues, they are listed below: 1) Privacy: Collection, storage and giving out information about individuals. What information about oneself should an employer is required to expose to others. What kind of observation can an employer use on its employees? What things can people keep to themselves and not be forced to expose to others. 2) Accuracy: Validity, commitment and accuracy of information collected and obtained. Who is responsible to collect information? How can we ensure that information will be proper and accurate to the users? How can Solved By:- Nishant & Amlesh Page 9 of 20 we ensure that errors in databases, data transmissions and data processing are accidental and not intentional? 3) Property: Ownership and value of information. Who owns the information? What are the just and fair prices for its exchange? How should one handle software piracy? Under what conditions can one use proprietary databases? Can corporate computers be used for private purposes? 4) Accessibility: Right to access information and payment towards the same. Who is allowed to access information? How much should be charged for permitting accessibility to information. How can accessibility are provided for employees with disability. Who will be provided with equipment needed for accessing information? (26) Explain the different sources of law. There are three types of sources of law they are following: a) Legislation law: - It is the formal performance of law by the government and created by the organization. It stands in difference to judge made law. Legislation law also consists of written laws, as contrast with judge made law or common law. Legislation law is also stands in contrast to customary law. b) b) Common law: - Common law comprises the body of principles. It is a body of law that develops and derives through legal decisions, as famous from lawmaking act. The established judicial practice that a court must follow, the law put down by a decision of the higher judiciary in the Country or State. c) c) Customer law: - Customer law is also a source law that denotes a usage of people, including a particular social group residing in a particular locality. It has become compulsory and has obtained the force of law with respect to place or subject matter to which is relates. The operation of customer is generally restricted to a particular locality, group or family. (27) How is a professional code distinguished. The professional code is divided into three types, and they are: a) Code of ethics: Code of ethics is more aspirational (aim). They are mission statements stressed the professional objectives and vision. b) Code of conduct: Code of conduct is oriented towards the professionals attitude. They make clear the issues at risk in different specialized fields. c) Code of practice: Technical document on health and safety issue approved by government minister. It provides practical guidance on way to achieve agreement with OMC (Order Management Cycle) legislation. The disadvantage is that there is no direct scheme of enforcement. (28) Explain with the help of historical milestones, the evolution of computer ethics. The computer revolution is occurring in two stages. The first stage was that of technology introduction in which computer technology was developed and refined. The second stage is of technological permeation in which technology gets included into everyday human activities. In the 1940s and 1950s computer ethics as a field of study had its roots in the new field of research called

cybernetics? The concepts of cybernetics led Weiner to draw some remarkable ethical conclusions about the technology that is now called information and communication technology. 1960s Don Parker began to examine the unethical and illegal uses of computers by computer professions. He published Rules of Ethics in Information Processing and headed the development of the first code of professional conduct for his association of computing machinery. The 1970s saw Walter Maner present the term Computer Ethics to refer to that field of question dealing with ethical problems forced, transformed by computer technology. 1980s a number of social and ethical penalty of information technology were becoming public issues in America and Europe. Issues like computer Solved By:- Nishant & Amlesh Page 10 of 20 enabled crime, disasters caused by computer failures, invasions of privacy. 1990s sign the beginning of the second generation of computer ethics. In this generation we are reducing the unexpected effects of information technology application. (29) Explain the impact of internet on the economy of the country and the society at large. The virtual world has taken over the real one. Our society is increasingly relying on new information technologies and the internet to conduct business, manage industrial activities, connect in personal communications and perform scientific research. E-business and e-commerce are the new mantras and electronic transactions dominate the overall business model. While these technologies facilitate enormous gains in efficiency, productivity and communications, they also create new vulnerabilities in terms of possibilities of misuse. The same interconnectivity that allows us to transmit information around the globe at the click of a mouse or push of a button also creates unique opportunities for criminals, terrorists and hostile foreign nation states, who might seek to steal money or proprietary data, invade private records etc. Digitalization has radically transformed the ways of accessing and using information. Technical convergence not only rendered increase to this process, but also as a result, affected positive impact on economics of the nations. The influence of cyber is so striking in our day to day lives that one would discern not only in the realm of trade & commerce, but also in the ambit of personal communications, academic and scientific research, critical infrastructure and the like. (30) How do professional codes address issues from the view point of computing profession? The professional codes address issues from the view point of computing professional however it has three level of professional code ethics needs to address are: 1) First level identified is a set of ethical values, such as integrity and justice professionals share with other human being by virtue of their shared humanity. 2) Second level is that more challenging duty than those required at the first level. Every type of professional shares this second level of ethical duty. Code statements at this level express the responsibility of all professionals and professional attitudes. 3) Third level, it includes requirement that derive directly from elements to particular professional perform. Code elements at this level declare more specific responsibilities that are more closely related to the state of art within the particular profession. (31) Comment on the statement There is no nexus between cyber space and real space. There is the difference between the business rules for online commerce and carrying business in the real space. Much of this difference comes from Internet's telepresence features. This feature renders the network technologically indifferent to physical location. The network is very insensitive to geography. It is not possible to determine the physical location of a user or a resource. In real space, locating a person or entity with which business is interacting is much easier. In the cyberspace to know the location of the partners with whom you are interacting is very difficult to know. In some instances, even an Internet address tells something only about the location of a given machine. There is no way to find the information about the actual user. In this sense we can say, There is no nexus between cyberspace and real space. (32) State and explain the primary assumptions of legal system. Any legal system is premised upon the following primary assumptions as a foundation: a) Sovereignty: Law making power is a matter of sovereign prerogative. As a result, the writ of sovereign authority

runs throughout wherever sovereign power exercises authority. Beyond its authority, the sovereign cannot regulate a subject matter through legal intervention. b) Territorial Enforcement: Any law in real world context can only be subjected to predetermined territorial enforcements. There are some exceptions to this. The sovereign authority could join extra territorial jurisdiction in case of criminal law. This indicates that the sovereign authority can initiate Solved By:- Nishant & Amlesh Page 11 of 20 prosecution, even if the crime is committed beyond the limits of the territory. c) Notion of property: The obtaining premise of the legal response considers 'property' as tangible and physical. In the cyber context, 'property' in the form of digitized services or goods poses serious challenges to this legal understanding. d) Paper-based transaction: Obtaining legal response considers and encourages people to create and constitute legally binding relationships on the basis of paper- based transactions. Although the word document under law takes within its fold material other than paper also. Since in cyber context, digital or electronic record forms the basis of electronic transactions. Hence, the transactions are on the basis of electronic records. e) Real relationships: Legal response considers relationships quite often. In view of connectivity, pace and accuracy as to transmission, in the cyber context, these relationships acquire unique distinction of virtual character. In case of trade and commerce, commercial transaction in the form of contracts constitutes the foundation of legal relationship. (33) What are the remedies for the breach of a contract? Ans: The principal remedies for the breach of contract are: a) Damages: The loss or damage arising from the breach of contract the means which existed of remedying the problem caused by non-performance of contract must be taken into account. It has also penal condition. b) Specific Performance of the Contract: In certain cases, the court directs against the party in default for the "specific performance" of the contract. This means the party will be asked to perform obligations that he needs to perform according to the contract. The party may be direct to perform which has undertaken by contract that is to say specific performance. c) Injunction: An injunction is a preventive relief and is granted at the discretion of the court. A further check on the discretion is the provision for correction through an appeal in a higher court. It is a defensive and is granted the judgment of the court. It has different types are: a) Temporary injunction: A temporary injunction is granted to continue until a specified period of time or until the time the court orders its continuation. b) Permanent injunction: A permanent injunction is granted to prevent a breach of an obligation existing in favor of an applicant. (34) Explain the policy approaches to privacy issues. The policy approaches to privacy issues are: 1) Market approach: A technique used in appraising property which compares recently sold comparable properties in arriving a conclusion as to fear market value. 2) Human rights approach: It recognizes right to information and related attribute of privacy as human right. 3) Contract approach: A conscious decision to create a non-governmental structure. Solved By:- Nishant & Amlesh Page 12 of 20 A conscious decision not to convene a global conference.

In his model premise on the ground that is a given context the privacy concern are letter and protect if treated as term and conditions of constrict. (35) Explain the process of encryption and decryption of data. Or what are the evidentiary presumptions of a secured electronic document? Explain the process of encryption and decryption of data The science of Cryptography deals with the encryption of data means the process of making information meaningless to the unauthorized reader. Encryption translates the data into a secret code. Decryption the process of making the information readable once again completes the cryptography process. The sending of documents in an encrypted form is the basis of the digital signature system. There are two types of Cryptographic systems symmetric and asymmetric. The Symmetric Crypto system also known as single key system being a simpler system consists of both the sender and the receiver having access and sharing a common Key to encrypt or decrypt a message. The drawback of this system is the security of the Key itself and the breakdown of an intermediary to verify the creation of an electronic document. The Asymmetric Crypto system also known as Public key system is a more secure system and overcomes the drawbacks of the single key system. This system uses two keys means a key pair generated by the asymmetric Crypto system. The originator of the documents who creates the key pair keeps one key which is known as the Private Key and the other key is sent to the person who is a recipient of a secured message from the originator. When the recipient uses the public key to decrypt the sent message he is said to have affixed his digital signature. Thus the combination of Public Key and Private Key provide both confidentiality and authentication which are key enablers for secure electronic transmission. The intermediary plays an important role of identifying the originator of the document and to check if the Public Key matches with the Private Key. The intermediary would also have to certify that the recipient of the public key is the person authorized to use the Public Key. The intermediary tends to assign the public key to a particular entity and thus becomes a Certifying Authority. (36)List the code of ethics for IT professionals. A Professional member of the Computer Society of India (CSI) gives the following code of ethics for IT professionals: 1) Organize the resources available to him and optimize these in attaining the objectives of his organization, 2) use the codes of practice conveyed by the CSI from time to time in carrying out his tasks, 3) Not misuse his authority or office for personal gains, 4) comply with the Indian laws relating to the management of his organization particularly with regard to Privacy and Piracy, and operate within the spirit of these laws, 5) conduct his affairs so as to uphold project and further the image and reputation of the CSI, 6) Maintain integrity in research and publications. (37)Explain the social and ethical issues arising out of the presence of computers in the workplace. See answer of question 25 Solved By:- Nishant & Amlesh Page 13 of 20 (38) Discuss the significance of legislation. Ans: Legislature can legislate in advance. Legislature can make a low on any subject, but judges can deal with a subject only when the point arises before them. Legislature can override the law on the particular point. Legislature is the most fruitful source of law and subject limitation flowing from the constitutional doctrine that matter of policy cant be delegated. Legislature can vest a subordinate authority with the power to make rules, order etc, but a court pronouncing a judgment do so. A Legislature performance is not subject to appeal. (40) Discuss the adjudicatory processes incorporated in the act. Ad judicatory Process: A reasonable opportunity is given to the person being charged with contravention of the Act by the adjudicating officer. When the adjudicating Officer is satisfied that there had been a contravention of the Act, he imposes such penalty or award compensation in accordance with the provisions of that section. While adjudging the quantum of compensation under this section the adjudicating officer shall take into consideration the amount of gain of unfair advantage wherever quantifiable made as a result of the default, the amount of loss caused to any person as a result of the default and the repetitive nature of the default. The adjudicating officer also has the

powers of the Civil Court, which are conferred on the Cyber Appellate Tribunal. (42) What are the moral rules on the internet? Discuss the types of problematic behaviour . Moral rules can be notable into two types governing online behavior. 1) The first type of moral rules identifies our moral obligations online. Examples of such rules are netiquette rules and Codes of conduct examples of which are be polite in e-mail correspondence, always tell the client the truth. 2) The second type of moral rules or recognition rules allows us to identify what is moral and what is not. Examples of recognition rules are read the signs, follow the instructions. There are three type of problematic behavior, they are listed below: a) First type of problematic behavior involves individuals and their actions are broadly referred to as hacking. It also included intentionally sending viruses or worms on the net that damage the computer systems. Hacking is unethical and has rightly been made illegal. b) The second category of problematic behavior is the criminal actions involving theft (robbery) and extortion. Falling in the scope of criminal actions include stealing of electronic funds, cyber stalking etc. c) The third category of problematic behavior involves issues whether specific laws need to be framed to make such behavior illegal. This is known as netiquette. Netiquette promotes ethical behavior and thus is an important tool for shaping the behavior on the net. (43)Describe computer Hacking. The term computer hacking usually describes the penetration of damage but for the pleasure of overcoming the technical security measures. In practice, this kind of offence can be normally found. As far as the damage of these cases is concerned, a separation is essential: In numerous cases, the penetrated computer user is not actually harmed, but only endangered. However, in these cases, too, the formal sphere of secrecy or the integrity of the concerned computer systems is violated. Contrary to this, considerable damages occur in other cases especially when the perpetrators later use their knowledge for committing espionage, damage or fraud. Solved By:- Nishant & Amlesh Page 14 of 20 (44)How is information privacy, violated? Discuss the privacy policy guidelines for database. Information privacy is violated when the individual: a) Does not know what information is being collected about them b) Cannot limit access to what is being collected c) Cannot control the use and distribution of this information d) Cannot correct erroneous data and out-of-date information. The privacy policy guidelines for database are following: 1) Data collection: o Data should be collected on individuals only for the purpose of achieve a legitimate business objective. o Data should be enough, related and not too much related to the business objective. o Individuals must give their permission before data pertaining to them can be gathered. 2) Data Accuracy: o Sensitive data gathered on individuals should be verified before it is entered into the database. o Data should be accurate and where and when necessary kept current. o If there is disagreement about the accuracy of the data, the individuals version should be noted and included with any disclosure of the file. 3) Data confidentiality: o Computer security procedures should be implemented to provide reasonable assurance against. o Third parties should not be given access to data without the individuals knowledge or permission. o Disclosures of data, other than the most routine, should be noted and maintained for as long as the data is maintained o Data should not be disclosed for reasons incompatible with the business objective.

(45)Discuss the different forms of computer crime. Cyber Crime is capable of causing huge damage both in financial terms and also in terms of user confidence, the Act has given severe fine for such infractions. The different form of computer crimes are: a) Infringements of privacy: The protection of privacy within the data processing area also had to consider the mass of private computer system. It establishes a difficult balance of interest between the privacy interest of data subjects concerned and the economic freedom of the holder of personal data. b) Economic offences: Computer manipulations were the starting point of discussion about computer related economic offences. It is the core center of computer economic offences. Hacking has increasingly become a basic offence which is used to commits act of computer fraud. c) Computer Hacking: It describes the penetration of damage but in the case, the formal subject of secrecy is debased. j) Computer espionage: Its appearing in official data represents a special danger compared with traditional economic aptitude. ii) Software piracy and other form of product piracy: Solved By:- Nishant & Amlesh Page 15 of 20 The unauthorized coping and use of computer programs is called software piracy. iii) Computer sabotage and computer Extortion: The objects of computer sabotage are the physical computer facilities as well as the vague data containing computer programs. iv) Computer Fraud: In this case, invoice manipulation concerning the payment of bells and spicy of industrial account balance and balance sheet at banks. v) Legal and harmful contents: Internet is not only made difficult by the fact that these perpetrators are acting from abroad and that the international mechanisms of co- operation are often weak and slow. d) Other Offences: Along with the advance of information technology, new areas of live computers can be used for almost all offences. i) Attacks on life: Computer manipulations described above did not only serve the purpose of gaining pecuniary benefits, but were also used for attacks on life -as in the case of the manipulation of a flight control system or of a hospital computer. ii) Organized Crime: It is clear that the powerful tools of modern computer and communication systems to store, manage and transfer data are also used by organized crime groups in many areas. Organized crime is especially involved in sophisticated computer fraud, credit card fraud, and telephone fraud and software and product piracy. iii) Electronic Warfare: the possibilities of computer manipulations have also been recognized in the military sector. Strategic Information Warfare has become a form of potential warfare of its own. This type of warfare is primarily directed to paralyze or manipulate the adversarys computer systems. (46)Explain the role of E-commerce in the present business scenario. E-Commerce is the use of the Internet to buy and sell goods and services. E-Commerce is changing the way in which organizations do business, resulting in streamlined purchasing processes and lowering the cost of transacting business for both large and small companies. It also corporate communication, interface design are also found on internet. E-business has been added as the latest domain in business and has become highly competitive technology

driven open market. The most important features of E-commerce is that help business move on the international scene at minimal cost but with maximum efficiency. E-commerce gives us business opportunity to open its portal to the global market and become a part of the global business community. E-commerce includes: Supply chain management, customer service customer relationship and Inventory and service management integration. The internet to conduct business, manages industrial activities, engage in personal communication and perform scientific research. It also corporate communication, interface design are also found on internet. (47)Explain how proposed amendments to the IT Act 2000 overcomes the drawbacks in the present Act. The Indian Evidence act states the actions for the recording support by the courts. Evidence plays a key part in the trail of a case; it gives an opportunity to the contesting parties to the suit to confirm their respective claims. The verification guide by the parties may be either verbal evidence or documentary evidence or both. Amendment to Solved By:- Nishant & Amlesh Page 16 of 20 the Indian Evidence Act, 1872 make easy the recording of evidence keeping in view the new laws under IT Act 2000. It recognizes electronic records as documentary evidence as per 3rd section of the Indian Evidence Act. The amended IT Act also recognizes terms like Electronic Records, Certifying Authority, Digital Signature, Digital Signature Authority, Electronic Form, Electronic Records, Information, Secure Electronic Record, Secure Digital Signature and Subscriber as valid terms for the purposes of the Act. The modified sections are: Section 17: Substitution of words oral or documentary or contained in electronic form Section 22A: Oral admissions as to the contents of electronic records are not relevant Section 34: Entries in the book of Section 35 Records Section 39: What evidence to be given when statement forms part of a conversation, document, electronic record, book or series of letters or papers Section 59: Content of documents would mean to include contents of electronic records. Section 65A: Special provisions as to evidence relating to new Section 65B: New section Admissibility of electronic records Section 67A: New section Proof as to digital signature Section 73A: New section Proof as to verification of digital signature (48)What are the responsibilities of professionals? The professional codes address issues from the view point of computing professional however it has three level of professional code ethics needs to address are: 1) First level identified is a set of ethical values, such as integrity and justice professionals share with other human being by virtue of their shared humanity. 2) Second level is that more challenging duty than those required at the first level. Every type of professional shares this second level of ethical duty. Code statements at this level express the responsibility of all professionals and professional attitudes. 3) Third level, it includes requirement that derive directly from elements to particular professional perform. Code elements at this level declare more specific responsibilities that are more closely related to the state of art within the particular profession. (49)What are the ten commandments for computer ethics? There are Ten Commandments for computer ethics; they are listed below: 1. You shall not use a computer to harm other people. 2. You shall not interfere with other peoples computer work. 3. You shall not snoop around in other peoples files. 4. You shall not use a computer to steal. 5. You shall not use a computer to bear false witness.

6. You shall not use of copy software for which you have not paid. Solved By:- Nishant & Amlesh Page 17 of 20 7. You shall not use other peoples computer resources without authorization. 8. You shall not appropriate other peoples intellectual output. 9. You shall think about the social consequences of the program you write. 10. You shall use a computer in ways to show consideration and respect. (50)Explain the essentials of privacy preferences project (p3p) platform. The Platform for Privacy Preferences Project (P3P) developed by the World Wide Web Consortium (W3C). Its aim to providing a simple, automated way for users to gain more control over the use of personal information on web sites they browse. P3P is a standardized set of multiple choice questions, covering all the major aspects of a web sites privacy policies. P3P enabled browsers can read this snapshot automatically and compare it to the consumers own set of privacy preferences. P3P is the most promising solution to cyberspace privacy. P3P will help responsible online businesses empower users to choose the privacy relationship best for them. P3P is nothing but software to negotiate privacy agreements between web sites and online visitors. P3P user machines readable description to describe the collation and use of data. Browser can help the users to understand those privacy practices with smart interface. Mostly browser can develop a predictable behavior when blocking content like cookies and E-commerce sites to behave in privacy as an effected way. (51)What are the evidentiary presumptions of a secured electronic document? The science of Cryptography deals with the encryption of data means the process of making information meaningless to the unauthorized reader. Encryption translates the data into a secret code. Decryption the process of making the information readable once again completes the cryptography process. The sending of documents in an encrypted form is the basis of the digital signature system. There are two types of Cryptographic systems symmetric and asymmetric. The Symmetric Crypto system also known as single key system being a simpler system consists of both the sender and the receiver having access and sharing a common Key to encrypt or decrypt a message. The drawback of this system is the security of the Key itself and the breakdown of an intermediary to verify the creation of an electronic document. The Asymmetric Crypto system also known as Public key system is a more secure system and overcomes the drawbacks of the single key system. This system uses two keys means a key pair generated by the asymmetric Crypto system. The originator of the documents who creates the key pair keeps one key which is known as the Private Key and the other key is sent to the person who is a recipient of a secured message from the originator. When the recipient uses the public key to decrypt the sent message he is said to have affixed his digital signature. Thus the combination of Public Key and Private Key provide both confidentiality and authentication which are key enablers for secure electronic transmission. The intermediary plays an important role of identifying the originator of the document and to check if the Public Key matches with the Private Key. The intermediary would also have to certify that the recipient of the public key is the person authorized to use the Public Key. The intermediary tends to assign the public key to a particular entity and thus becomes a Certifying Authority. Q Write the notes on given topics: EDUCOM:- : A guide to the ethical and legal use of software for members of the academic community, it is a catalog produced as a service to the academic community by the Educational Uses of Information Technology Program (EUIT) of EDUCOM, and the Information Technology Association of America (ITAA). EDUCOM is a non-profit Solved By:- Nishant & Amlesh Page 18 of 20 group of colleges and universities committed to the use and management of information technology in higher education. ITAA is an industry association for companies which create and market products and services associated with computers, communications and data. Information Technology Act 2000 :- The Information Technology Act, 2000 (I.T. Act, 2000) contains provisions on how a contract can be formed electronically. The Act acts in conjunction with the Indian contract Act, 1872. To

provide legal recognition for transactions carried out by means of electronic data interchange and other means of electronic communication, commonly referred to as electronic commerce, which involve the use of alternatives to paper based methods of communication and storage of information, to facilitate electronic filling of documents with the Government agencies and further to amend the Indian Penal Code, the Indian Evidence Act, 1872, the Bankers Book Evidence Act, 1891 and the Reserve Bank of India Act, 1934 and for matters connected therewith or incidental thereto. Cyber regulations appellate tribunal. :- : Cyber Regulations Appellate Tribunal shall be an appellate body where appeals against the orders passed by the adjudicating officers shall be preferred. The said Tribunal shall not be bound by the principles of the code of civil procedure but shall follow the principles of natural justice and shall have the same powers as those are vested in a civil court. Against an order or decision of the cyber appellate Tribunal, an appeal shall lie to the high court. Electronic governance : - The Information Technology Act, 2000, deals in his 3rd Chapter propos Electronic governance. Electronic Governance provides information or any other matter which is in writing or in the typewritten or printed form. Such requirement shall be deemed to have been satisfied if such information or matter is: Rendered or made available in an electronic form; Accessible so as to be usable for a subsequent reference. In the field of electronic governance we survey with following: 1. Legal recognition of electronic records 2. Legal recognition of digital signatures 3. Use of electronic records and digital signatures in Government and its agencies. 4. Retention of electronic records 5. Publication of rule, regulation in Electronic Gazette 6. Power to make rules by Central Government in respect of digital signature Intellectual property :- Intellectual property is the physical property created by individuals or corporations, which is protected under trade secret, patent and copyright laws. The intellectual property rights connected with software ownership. Ownership is a complex issue; there are three different types of ownership: Copyrights, trade secrets and patents. A trade secret is intellectual work, such as a business plan that is a company secret and is not public information. A patent is a document that grants the holder exclusive rights on an invention for a fixed period of time. Copyright is a statutory grant that provides the creators of intellectual property with ownership of it also for a fixed period of time which generally extends till the life of the creator of the work plus sixty years. Owners are entitled to collect fees from anyone who wants to copy the property. Computer software is granted copyright protection as well as patent protection. Patent laws differ from country to country. India is determined by the Patents Act, 1970. Solved By:- Nishant & Amlesh Page 19 of 20 P3P :- - The Platform for Privacy Preferences Project (P3P) developed by the World Wide Web Consortium (W3C). Its aim to providing a simple, automated way for users to gain more control over the use of personal information on web sites they browse. P3P is a standardized set of multiple choice questions, covering all the major aspects of a web sites privacy policies. P3P enabled browsers can read this snapshot automatically and compare it to the consumers own set of privacy preferences. P3P is the most promising solution to cyberspace privacy. P3P will help responsible online businesses empower users to choose the privacy relationship best for them. P3P is nothing but software to negotiate privacy agreements between web sites and online visitors. P3P user machines readable description to describe the collation and use of data. Browser can help the users to understand those privacy practices with smart interface. Mostly browser can develop a predictable behavior when blocking content like

cookies and E-commerce sites to behave in privacy as an effected way.

Anda mungkin juga menyukai