Upload
sunil-pal
View
214
Download
0
Embed Size (px)
Citation preview
7/28/2019 64 Xerox 4
1/8
1) What is electronic warfare? Electronic warfare (EW) refers to any action
involving the use of the electromagnetic spectrum or directed energy to control
the spectrum, attack an enemy, or impede enemy assaults via the spectrum. Thepurpose of electronic warfare is to deny the opponent the advantage of, and
ensure friendly unimpeded access to, the EM spectrum. EW can be applied from
air, sea, land, and space by manned and unmanned systems, and can targetcommunication, radar, or other services.[1] EW includes three major
subdivisions: Electronic Attack (EA), Electronic Protection (EP), and Electronic
warfare Support (ES).(2) What are the ten commandments for computer ethics? The ten
commandments for computer ethics are following:-1. Thou shalt not use a
computer to harm other people. 2 . Thou shalt not interfere with other peoplescomputer work. 3. Thou shalt not snoop around in other peoples files. 4. Thou
shalt not use a computer to steal. 5. Thou shalt not use a computer to bear falsewitness. 6. Thou shalt not use of copy software for which you have not paid. 7.
Thou shalt not use other peoples computer resources without authorization. 8.
Thou shalt not appropriate other peoples intellectual output.9. Thou shalt thinkabout the social consequences of the program you write. 10.Thou shalt use a
computer in ways to show consideration and respect.
(3) List the code of ethics for IT professionals. A Professional member of theComputer Society of India (CSI) gives the following code of ethics for IT
professionals: -1) Organize the resources available to him and optimize these in
attaining the objectives of his organization, 2) use the codes of practice conveyedby the CSI from time to time in carrying out his tasks, 3) Not misuse his authority
or office for personal gains, 4) comply with the Indian laws relating to the
management of his organization particularly with regard to Privacy and Piracy,and operate within the spirit of these laws, 5) conduct his affairs so as to uphold
project and further the image and reputation of the CSI,6) Maintain integrity in
research and publications.
(4) Discuss the impact of the information technology revolution on societies.The impact of information technology resolution on society are following:-
People often the compare growth of internet to the h istoric growth of othertechnologies. Internet is just the latest technologies advance and may not single
a revolutionary advance, but the different between the birth of internet and
technologies that preceded it. Radio was in 38 years before 50 million peopleused it. TV took 13 years to reach the same standard and it was 16 years before
50 million people used a PC. Once the internet was made to general public and it
takes only 4 years for 50 millions people to go-line.
(5) Explain with the help of historical milestones,the evolution of computer
ethics. The computer revolution is occurring in two stages. The first stage was
that of technology introduction in which computer technology was developedand refined. The second stage is of technological permeation in which
technology getsincluded into everyday human activities. -In the 1940s and 1950s
computer ethics as a field of study had its roots in the new field of research calledcybernetics? The concepts of cybernetics led Weiner to draw some remarkable
ethical conclusions about the technology that is now called information andcommunication technology.1960s Don Parker began to examine the unethical andillegal uses of computers by computer professions. He published Rules of Ethics
in Information Processing, and headed the development of the first code of
professional conduct for his association of computing machinery. The 1970s sawWalter Maner present the term Computer Ethics to refer to that field of
question dealing with ethical problems forced, transformed by computer
technology.1980s a number of social and ethical penalty of informationtechnology were becoming public issues in America and Europe. Issues like
compute enabled crime, disasters caused by computer failures, invasions of
privacy.1990s sign the beginning of the second generation of computer ethics .In
this generation we are reducing the unexpected effects of information technology
application.
(6) Explain the impact of internet on the economy of the country and the
society at large. The virtual world has taken over the real one. Our society is
increasingly relying on new information technologies and the internet to conduct
business, manage industrial activities, connect in personal communications andperformscientific research. E-business and e-commerce are the new mantras and
electronic transactions dominate the overall business model. While these
technologies facilitate enormous gains in efficiency, productivity andcommunications, they also create new vulnerabilities in terms of possibilities of
misuse. The same interconnectivity that allows us to transmit information aroundthe globe at the click of a mouse or push of a button also creates unique
opportunities for criminals, terrorists and hostile foreign nationstates, who might
seek to steal money or proprietary data I nvade private records etc. Digitalizationhas radically transformed the ways of accessing and using information. Technical
convergence not only rendered increase to this process, but also as a result,
affected positiveimpact on economics of the nations. The influence of cyber is sostriking in our day to day lives that one would discern not only in the realm of
trade & commerce, but also in the ambit of personal communications, academic
and scientific research, critical infrastructure and the like.(7) What are the remedies for the breach of a contract? The principal
remedies for the breach of contract are:Damages: -The loss or damage arisingfrom the breach of contract the means which existed of remedying the problemcaused by non-performance of contract must be taken into account. It has also
penal condition. Specific Performance of the Contract: -In certain cases,the court
directs against the party in default for the "specific performance" of the contract.
This means the party will be asked to perform obligations that he needs to
perform according to the contract. The party may be direct to perform which has
undertaken by contract that is to say specific performance. Injunction: -An
injunction is a preventive relief and is granted at the discretion of the court. A
further check on the discretion is the provision for correction through an appeal
in a higher court. It is a defensive and is granted the judgment of the court. Ithas different types are:a) Temporary injunction: A temporary injunction is
granted to continue until a specified period of time or until the time the court
orders its continuation. b) Permanent injunction: A permanent injunction isgranted to prevent a breach of an obligation existing in favour of an applicant.
(8) Discuss the impact of globalization on computer ethics. Computer ethics is
fast developing into a broader and even more important field, which mightreasonably be called global information ethics. Some of the global issues being
debated are:(a)Global laws:Over two hundred countries are already
interconnected by the internet. Issues regarding freedom of speech, protection ofintellectual property, invasion of privacy vary from country to country. The
outline of common laws pertaining to such issues to ensure agreement by all thecountries is one of the foremost questions being debated. (b)Global cyber
business:Technology is growing rapidly to enable electronic privacy and
security on theinternet to safely conduct international business transactions.Nations with a technological infrastructure already in place will enjoy
rapideconomic growth, while rest of the world lags behind. This difference in
levels of technology will fuel political and economic quarrel, which could furtherwiden the gap between the rich and the poor. (c)Global education:Inexpensive
access to the global information net for the rich and the poor alike is necessary
for everyone to have access to daily news from a free press, free texts,documents, political, eligious and social practices ofpeoples everywhere. The
impact of this sudden and global education on different communities, cultures
and religious practices are likely to be profound.
(9) Comment on the statement There is no nexus between cyb er space and
real space. There is the difference between the business rules for online
commerce and carrying business in the real space. Much of this difference comes
from Internet's telepresence features. This feature renders thenetworktechnologically indifferent to physical location. The network is very
insensitive to geography. It is not possible to determine the physical location of auser or a resource In real space, locating a person or entity with which business is
interacting is much easier. In the cyberspace to know the location of the partners
with whom we are interacting is very difficult to know. In some instances, evenan Internet address tells something only about the location of a given machine.
There is no way to find the information about the actual user. In this sense we can
say, There is no nexus between cyberspace and real space.(10) What is common law? How does it differ from codified law? Common
law is the part of the law that formulated developed and administered by old
common law courts, based originally or unwritten common custom. Common lawor uncodified law is the law flowing from judicial decisions. E.g., the process of
dispute resolution or adjudication of liability by either village elders orpeople
holding power through the process of issuing commands has received socialacceptance. The uncodified law governs large segment of the legal regime. The
judgment pronounced by an organ of the higher judiciary performs at least twoimportant functionsFor the immediate parties, the judgment becomes a source,rights and duties. For the world, it becomes a source of law It happens to deal
with a legal proposition-and to make a definite pronouncement on the subject. It
is different from codified law because codified laws are made formally by a Lawmaking body of people, whereas common laws have their enunciations through
decisions of courts.
(11) Explain the different sources of law. There are three types of sources oflaw they are following: -(a)Legislation law:-It is the formal performance of law
by the government and created by the organization. It stands in difference to
judge made law. Legislation law also consists of written laws, as contrast with
judge made law orcommon law. Legislation law is also stands in contrast to
customary law. (b)Common law:-Common law comprises the body of
principles. It is a body of law that develops and derives through legal decisions,as famous from law making act. The established judicial practice that a court
must follow, the law put down by a decision of the higher judiciary in the
Country or State. (c)Customer law:-Customer law is also a source law thatdenotes a usage of people, including a particular social group residing in a
particular locality. It has become compulsory and has obtained the force of law
with respect to place or subject matter to which is relates. The operation ofcustomer is generally restricted to a particular locality, group or family.
(12) How is a professional code distinguished? The professional code isdivided into three types, and they are following:(a)Code of ethics:-Code of ethics
is more aspirational (aim).They are mission statements stressed the professional
objectives and vision. (b)Code of conduct:-Code of conduct is oriented towardsthe professionals attitude. They make clear the issues at risk in different
specialized fields. (c)Code of practice:-Technical document on health and safety
issue approved by government minister .It provides practical guidance on way toachieve agreement with OMC(Order Management Cycle) legislation. The
disadvantage is that there is no direct scheme of enforcement.
(13).Define computer ethics and give classifications of ethical issues. The termcomputer ethics was coined in the mid 1970s by Walter Manor to refer to that
field of applied professional ethics dealing with ethical problems aggravated,transformed, or created by human technology. Computer ethics is the analysis ofthe nature and social impact of computer technology. Computer ethics is
standards of professional practice, codes of ethics, aspects of computer law
,public policy, corporate ethics etc. Computer ethics examine theethical issues
surrounding computer usage and the connection between ethics and technology.
It includes consideration of both personal and social policies for ethical use of
computer technology. The goal is to understand the impact of computing
7/28/2019 64 Xerox 4
2/8
technology upon human values, minimize the damage that technology can do to
human values, and to identify ways to use computer technology to advance
human values. *Issues of Ethics:-There are four kinds of ethics issues, they arelisted below:(1)Privacy: Collection, storage and giving out information about
individuals. What information about oneself should an employer is required to
expose to others. What kind of observation can an employer use on itsemployees? What things can people keep to themselves and not be forced to
expose to others. (2)Accuracy: Validity, commitment and accuracy of
information collected and obtained .Who is responsible to collect information?How can we ensure that information will be proper and accurate to the users?
How can we ensure that errors in databases, data transmissions and data
processing are accidental and not intentional?(3) Ownership and value of information. Who owns the information? What are
the just and fair prices for its exchange? How should one handle software piracy?Under what conditions can one use proprietary databases? Can corporate
computers be used for private purposes? (4)Accessibility:-Right to access
information and payment towards the same. Who is allowed to accessinformation? How much should be charged for permitting accessibility to
information. How can accessibility are provided for employees with disability
.Who will be provided with equipment needed for accessing information?
14) What are the fundamental conceptions regarding the evaluation of
individual actions. There are two fundamental conceptions regarding the
evaluation of individual actions are:-(a) First is to examine an issue underindependently justified ethics of what one considers being right. There is
referred to as deontological approach where one starts out with one or more
moral principles and see how they apply to particular cases. (b) Secondly to lookfor the course of action that maximizes the good and this approach involves
determining which action defers the best penalty measured in some standard of
the good. This approach is referred to as teleological that involves structure
what is good for users, and spells out, what is wrong with action that hold up withattempts to get it. Both of these approaches represent over basic accounts of
moral thought and decision-making and need to be developed sufficient as anethical framework for the moral evaluation of individual cases and actions.
(15) How do professional codes address issues from the view point of
computing profession? The professional codes address issues from the viewpoint of computing professional however it has three level of professional code
ethics needs toaddress are:-(1)First level identified is a set of ethical values, such
as integrity and justice professionals share with other human being by virtue oftheir shared humanity. (2)Second level is that more challenging duty than those
required at the first level. Every type of professional shares this second level of
ethical duty. Code statements at this level express the responsibility of allprofessionals andprofessional attitudes. (3)Third level, it includes requirement
that derive directly from elements to particular professional perform. Code
elements at this level declare more specific responsibilities that are more closelyrelated to the state of art within the particular profession.
(16) State and explain the primary assumptions of legal system. Any legalsystem is premised upon the following primary assumptions as a foundation: -(a)Sovereignty:-Law making power is a matter of sovereign prerogative. As a
result, the writ of sovereign authority runs throughout wherever sovereign power
exercises authority. Beyond its authority, the sovereign cannot regulate a subjectmatter through legal intervention. (b)Territorial Enforcement:-Any law in real
world context can only be subjected to predetermined territorial enforcements.
There are some exceptions to this. The sovereign authority could join extraterritorial jurisdiction in case of criminal law. This indicates that the sovereign
authority can initiate prosecution, even if the crime is committed beyond the
limits of the territory. (c)Notion of property:-The obtaining premise of the legal
response considers 'property' as tangible and physical. In the cyber context,
'property' in the form of digitized services or goods poses serious challenges to
this legal understanding. (d)Paper-based transaction:-Obtaining legal responseconsiders and encourages people to create and constitute legally binding
relationships on the basis of paper-based transactions. Although the word
document under law takes within its fold material other than paper also. Sincein cyber context, digital orelectronic record forms the basis of electronic
transactions. Hence, the transactions are on the basis of electronic records.
(e)Real relationships:-Legal response considers relationships quite often. In viewof connectivity, pace and accuracy as to transmission, in the cyber context, these
relationships acquire unique distinction of virtual character. In case oftrade andcommerce, commercial transaction in the form of contracts constitutes the
foundation of legal relationship.
(17) Discuss the classification of crimes under the IT Act 2000. Theclassification of crimes under the IT Act, 2000 are following:-Securing access to
computer, computer system, computer network. Introducing any computer virus
or impurity in the computer system or network. Damaging the computer,computer system or network. Disrupting the working of the computer, computer
system or network. Disrupting the access of the computer, computer system or
network of an authorized user. Providing assistance to ensure unauthorizedaccess to the c/s or network. Tempering with computer source documents.
Hacking with c/s; publishing of information which is absence in electronic form.Breach of confidentiality and privacy.Publishing Digital certificate that arefalse in certain particulars.
(18) Explain the policy approaches to privacy issues. The policy approaches to
privacy issues are:-(1)Market approach:A technique used in appraising
property which compares recently sold comparableproperties in arriving a
conclusion as to fear market value. (2)Human rights approach:It recognizes
right to information and related attribute of privacy as human right. (3)Contract
approach:A conscious decision to create a non-governmental structure. A
conscious decision not to convene a global conference. In h is model premise on
the ground that is a given context the privacy concern are letter and protect iftreated as term and conditions of constrict.
(19) What are the moral rules on the internet? Discuss the types of
problematic behavior. Moral rules can be notable into two types governingonline behavior. (1)The first type of moral rules identifies our moral obligations
online. Examples of such rules are netiquette rules and Codes of conduct
examples of which are be polite in e-mail correspondence, always tell theclient the truth. (2)The second type of moral rules or recognition rules allows
us to identify what is moral and what is not. Examples of recognition rules are
read the signs, follow the instructions. **There are three type of problematicbehavior, they are listed below:(a)First type of problematic behavior involves
individuals and their actions are broadly referred to as hacking. It also includedintentionally sending viruses or worms on the net that damage the computer
systems. Hacking is unethical and has rightly been made illegal. (b)The second
category of problematic behavior is the criminal actions involving theft (robbery)and extortion. Falling in the scope of criminal actions include stealing of
electronic funds, cyber stalking etc. (c)The third category of problematic
behavior involves issues whether specific laws need to be framed to make suchbehavior illegal. This is known as netiquette. Netiquette promotes ethical
behavior and thus is an important tool for shaping the behavior on the net.
(20) Describe computer Hacking.The term computer hacking usuallydescribes the penetration of damage but for the pleasure of overcoming the
technical security measures. In practice, this kind of offence can be normally
found. As far as the damage of these cases is concerned, a separation is essential:In numerous cases, the penetrated computer user is not actually harmed, but only
endangered. However, in these cases, too, the formal sphere of secrecy or the
integrity of the concerned computer systems is violated. Contrary to this,
considerable damages occur in other cases especially when the perpetrators lateruse their knowledge for committing espionage, damage or fraud.
(21) What is cyber privacy? Explain.
Cyber privacy is necessary for the authorities to indulge in
surveillance in order to keep cybercrime in control. Thesame surveillance affects the privacy of millions of the people who
use the Internet every day. However, privacy is
extremely important to all individuals, organizations, and nations.The Indian judiciary has not laid down specific laws regarding cyber
privacy. Currently, the judiciary can only
interpret privacy in accordance with the existing regulations. As perArticle 21 of the Indian constitution, the right to
privacy is an integral part of the fundamental right to life. The
Information Technology Bill of 1999 has ignored theissue of privacy except for section 71, which says that any person who
secures access to any electronic record, book,register, correspondence, information, document, or other material
without the consent of the concerned persons
and discloses the same to any other person will be punished for upto
two years of imprisonment, or fined upto Rs. 1lac, or both. Internet users are asked to volunteer information, they
must be told how and why the collected
information will be used, what type of information will be shared withwhom, and what type of information will not
be shared. All websites that collect information must protect it by
using all means possible.
(22) Explain principles of computer ethics.
Ans: There are eight types of computer ethics principles:
1) PUBLIC: Software engineers shall act consistently with the publicinterest. In particular, software engineers
Shall accept full responsibility for own work. Moderate the interests
of the software engineer, the employer, theclient and the users with the public good.
2) CLIENT and EMPLOYEE: Software engineers shall act in a
manner that is in the best interests of their clientand employer, consistent with the public interest. Provide service in
their areas of competence, being honest andforthright about any limitations of their experience and education.
3) PRODUCT: Software engineers shall ensure that their products
and related modifications meet the highestprofessional standards possible.
4) JUDGMENT: Software engineers shall maintain integrity and
independence in their professional judgment. Inparticular, software engineers shall; Temper all technical judgments
by the need to support and maintain human
values. Only endorse documents either prepared under theirsupervision or within their areas of competence and
with which they are in agreement.5) MANAGEMENT: Software engineering managers and leaders
shall subscribe to and promote an ethical
approach to the management of software development and
maintenance. In particular, those managing or leading
software engineers shall ensure good management for any project on
which they work, including effective
procedures for promotion of quality and reduction of risk.
7/28/2019 64 Xerox 4
3/8
6) PROFESSION: Software engineers shall advance the integrity and
reputation of the profession consistent with
the public interest. In particular, software engineers shall; Helpdevelop an organizational environment favorable to
acting ethically. Promote public knowledge of software engineering.
7) COLLEAGUES: Software engineers shall be fair to andsupportive of their colleagues. In particular, software
Engineers shall; Encourage colleagues to adhere to this Code. Assist
colleagues in professional development8)SELF: Software engineers shall participate in lifelong learning
regarding the practice of their profession and
shall promote an ethical approach to the practice of the profession. Inparticular, software engineers shall
continually endeavor to: Further their knowledge of developments inthe analysis, specification, design,
development, maintenance and testing of software and related
documents, together with the management of thedevelopment process
(23) What is meant by unauthorized access to a computer?
Explain.The IT Act defines unauthorized access by any person as acts done
without the permission of the owner, which
includes:Solved By:- Nishant & Amlesh
Page 8 of 20
Accessing or securing access to such computer, computer system or
computer network
Downloading, copying or extracting any data or information for suchcomputer, computer system or
computer network including information or data held or stored on anyremovable storage medium
Introducing any computer virus or contaminant in the computer,computer system or network
Damaging the computer, computer system or network
Disrupting the working of the computer, computer system or network
Disrupting the access of the computer, computer system or network to
an authorized user
Providing assistance to ensure unauthorized access to the computer,
computer system or network
The penalty to be paid by the person for unauthorized access by way
of compensation not exceeding one
crore rupees to the affected person.
(24) What are the amendments to the Indian Penal Code?
Ans: The Indian Panel Code (IPC) detail actions that constitute a
crime and the punishment prescribed for suchaction. It elaborately classifier crimes based on interests that are
intended to be protected the classification
includes:1) Offences against body.
2) Offences against property.
3) Offences against marriage.4) Offences against public tranquility.
5) Offences against state.
As the definition of crime world includes a practice act or deliberate
cyber transaction using the equivalent
of a document needs protection under law.
To facilitate enforcement of law to cover cyber transaction, the IPChas been assented to cover cyber
transaction.
The important changes in IPC include prevision regarding documents
and signature.
As electronic records have replaced documents in the IT Act, the IPC
have been amended to read also the
expression electronic records where the term document appears inthe act.
(25) Define computer ethics and give classifications of ethicalissues.
The term computer ethics was coined in the mid 1970s by Walter
Manor to refer to that field of applied professional
ethics dealing with ethical problems aggravated, transformed, or
created by human technology. Computer ethics is
the analysis of the nature and social impact of computer technology.
Computer ethics is standards of professional
practice, codes of ethics, aspects of computer law, public policy,
corporate ethics etc. Computer ethics examine the
ethical issues surrounding computer usage and the connectionbetween ethics and technology. It includes
consideration of both personal and social policies for ethical use of
computer technology. The goal is to understandthe impact of computing technology upon human values, minimize the
damage that technology can do to human
values, and to identify ways to use computer technology to advancehuman values.
Issues of Ethics: There are four kinds of ethics issues, they are listed
below:1) Privacy: Collection, storage and giving out information about
individuals. What information about oneselfshould an employer is required to expose to others. What kind of
observation can an employer use on its
employees? What things can people keep to themselves and not beforced to expose to others.
2) Accuracy: Validity, commitment and accuracy of information
collected and obtained. Who is responsible tocollect information? How can we ensure that information will be
proper and accurate to the users? How can
Solved By:- Nishant & AmleshPage 9 of 20
we ensure that errors in databases, data transmissions and data
processing are accidental and notintentional?
3) Property: Ownership and value of information. Who owns the
information? What are the just and fair prices
for its exchange? How should one handle software piracy? Underwhat conditions can one use proprietary
databases? Can corporate computers be used for private purposes?4) Accessibility: Right to access information and payment towards
the same. Who is allowed to access
information? How much should be charged for permittingaccessibility to information. How can accessibility
are provided for employees with disability. Who will be provided with
equipment needed for accessinginformation?
(26) Explain the different sources of law.
There are three types of sources of law they are following: -a) Legislation law: - It is the formal performance of law by the
government and created by the organization. It
stands in difference to judge made law. Legislation law also consistsof written laws, as contrast with judge
made law or common law. Legislation law is also stands in contrast tocustomary law.
b) b) Common law: - Common law comprises the body of principles.
It is a body of law that develops and derives
through legal decisions, as famous from lawmaking act. Theestablished judicial practice that a court must
follow, the law put down by a decision of the higher judiciary in the
Country or State.c) c) Customer law: - Customer law is also a source law that denotes
a usage of people, including a particular
social group residing in a particular locality. It has become
compulsory and has obtained the force of law with
respect to place or subject matter to which is relates. The operation of
customer is generally restricted to aparticular locality, group or family.
(27) How is a professional code distinguished.
The professional code is divided into three types, and they are:a) Code of ethics: Code of ethics is more aspirational (aim). They are
mission statements stressed the professional
objectives and vision. b) Code of conduct: Code of conduct isoriented towards the professionals attitude. They
make clear the issues at risk in different specialized fields. c) Code ofpractice: Technical document on health and
safety issue approved by government minister. It provides practical
guidance on way to achieve agreement withOMC (Order Management Cycle) legislation. The disadvantage is that
there is no direct scheme of enforcement.
(28) Explain with the help of historical milestones, the evolution of
computer ethics.
The computer revolution is occurring in two stages.
The first stage was that of technology introduction in which
computer technology was developed andrefined.
The second stage is of technological permeation in which
technology gets included into everyday human
activities.
In the 1940s and 1950s computer ethics as a field of study had its
roots in the new field of research called
7/28/2019 64 Xerox 4
4/8
cybernetics? The concepts of cybernetics led Weiner to draw some
remarkable ethical conclusions about the
technology that is now called information and communicationtechnology. 1960s Don Parker began to examine the
unethical and illegal uses of computers by computer professions. He
published Rules of Ethics in InformationProcessing and headed the development of the first code of
professional conduct for his association of computing
machinery. The 1970s saw Walter Maner present the term ComputerEthics to refer to that field of question
dealing with ethical problems forced, transformed by computer
technology. 1980s a number of social and ethicalpenalty of information technology were becoming public issues in
America and Europe. Issues like computerSolved By:- Nishant & Amlesh
Page 10 of 20
enabled crime, disasters caused by computer failures, invasions ofprivacy. 1990s sign the beginning of the second
generation of computer ethics. In this generation we are reducing
the unexpected effects of information technologyapplication.
(29) Explain the impact of internet on the economy of the country
and the society at large.The virtual world has taken over the real one. Our society is
increasingly relying on new information technologies
and the internet to conduct business, manage industrial activities,connect in personal communications and perform
scientific research. E-business and e-commerce are the new mantras
and electronic transactions dominate the
overall business model. While these technologies facilitate enormousgains in efficiency, productivity and
communications, they also create new vulnerabilities in terms ofpossibilities of misuse. The same interconnectivity
that allows us to transmit information around the globe at the click of
a mouse or push of a button also createsunique opportunities for criminals, terrorists and hostile foreign nation
states, who might seek to steal money or
proprietary data, invade private records etc. Digitalization hasradically transformed the ways of accessing and using
information. Technical convergence not only rendered increase to this
process, but also as a result, affected positiveimpact on economics of the nations. The influence of cyber is so
striking in our day to day lives that one would
discern not only in the realm of trade & commerce, but also in theambit of personal communications, academic and
scientific research, critical infrastructure and the like.(30) How do professional codes address issues from the view point
of computing profession?
The professional codes address issues from the view point of
computing professional however it has three level ofprofessional code ethics needs to address are:
1) First level identified is a set of ethical values, such as integrity and
justice professionals share with other humanbeing by virtue of their shared humanity. 2) Second level is that more
challenging duty than those required at the
first level. Every type of professional shares this second level of
ethical duty. Code statements at this level express
the responsibility of all professionals and professional attitudes. 3)
Third level, it includes requirement that derivedirectly from elements to particular professional perform. Code
elements at this level declare more specific
responsibilities that are more closely related to the state of art withinthe particular profession.
(31) Comment on the statement There is no nexus between cyber
space and real space.There is the difference between the business rules for online
commerce and carrying business in the real space.Much of this difference comes from Internet's telepresence features.
This feature renders the network
technologically indifferent to physical location. The network is veryinsensitive to geography. It is not possible to
determine the physical location of a user or a resource. In real space,
locating a person or entity with which businessis interacting is much easier. In the cyberspace to know the location of
the partners with whom you are interacting is
very difficult to know. In some instances, even an Internet addresstells something only about the location of a given
machine. There is no way to find the information about the actualuser. In this sense we can say,
There is no nexus between cyberspace and real space.
(32) State and explain the primary assumptions of legal system.
Any legal system is premised upon the following primary assumptions
as a foundation: -
a) Sovereignty: Law making power is a matter of sovereign
prerogative. As a result, the writ of sovereign authority
runs throughout wherever sovereign power exercises authority.
Beyond its authority, the sovereign cannot regulate
a subject matter through legal intervention. b) TerritorialEnforcement: Any law in real world context can only be
subjected to predetermined territorial enforcements. There are some
exceptions to this. The sovereign authoritycould join extra territorial jurisdiction in case of criminal law. This
indicates that the sovereign authority can initiate
Solved By:- Nishant & AmleshPage 11 of 20
prosecution, even if the crime is committed beyond the limits of the
territory. c) Notion of property: The obtainingpremise of the legal response considers 'property' as tangible and
physical. In the cyber context, 'property' in theform of digitized services or goods poses serious challenges to this
legal understanding. d) Paper-based transaction:
Obtaining legal response considers and encourages people to createand constitute legally binding relationships on
the basis of paper- based transactions. Although the word document
under law takes within its fold material otherthan paper also. Since in cyber context, digital or electronic record
forms the basis of electronic transactions. Hence,
the transactions are on the basis of electronic records. e) Realrelationships: Legal response considers relationships
quite often. In view of connectivity, pace and accuracy as to
transmission, in the cyber context, these relationshipsacquire unique distinction of virtual character. In case of trade and
commerce, commercial transaction in the form
of contracts constitutes the foundation of legal relationship.
(33) What are the remedies for the breach of a contract?Ans: The principal remedies for the breach of contract are:
a) Damages: -
The loss or damage arising from the breach of contract the means
which existed of remedying the problemcaused by non-performance of contract must be taken into account.
It has also penal condition.b) Specific Performance of the Contract: -
In certain cases, the court directs against the party in default for the"specific performance" of the contract.
This means the party will be asked to perform obligations that heneeds to perform according to the
contract.
The party may be direct to perform which has undertaken by contract
that is to say specific performance.
c) Injunction: -
An injunction is a preventive relief and is granted at the discretion of
the court.
A further check on the discretion is the provision for correction
through an appeal in a higher court.
It is a defensive and is granted the judgment of the court.
It has different types are:
a) Temporary injunction: A temporary injunction is granted to
continue until a specifiedperiod of time or until the time the court orders its continuation.
b) Permanent injunction: A permanent injunction is granted to
prevent a breach of anobligation existing in favor of an applicant.
(34) Explain the policy approaches to privacy issues.The policy approaches to privacy issues are: -
1) Market approach:
A technique used in appraising property which compares recently sold
comparable properties in arriving a
conclusion as to fear market value.2) Human rights approach:
It recognizes right to information and related attribute of privacy ashuman right.
3) Contract approach:
A conscious decision to create a non-governmental structure.
Solved By:- Nishant & Amlesh
Page 12 of 20
A conscious decision not to convene a global conference.
7/28/2019 64 Xerox 4
5/8
In his model premise on the ground that is a given context the privacy
concern are letter and protect if
treated as term and conditions of constrict.
(35) Explain the process of encryption and decryption of data.
Or what are the evidentiary presumptions of a secured electronic
document? Explain the process of encryption
and decryption of data
The science of Cryptography deals with the encryption of datameans the process of making information
meaningless to the unauthorized reader. Encryption translates the data
into a secret code. Decryptionthe processof making the information readable once again completes the
cryptography process. The sending of documents inan encrypted form is the basis of the digital signature system.
There are two types of Cryptographic systems symmetric and
asymmetric. The Symmetric Crypto system alsoknown as single key system being a simpler system consists of both
the sender and the receiver having access and
sharing a common Key to encrypt or decrypt a message. Thedrawback of this system is the security of the Key
itself and the breakdown of an intermediary to verify the creation of
an electronic document. The AsymmetricCrypto system also known as Public key system is a more secure
system and overcomes the drawbacks of the single
key system. This system uses two keys means a key pair generated bythe asymmetric Crypto system. The originator
of the documents who creates the key pair keeps one key which is
known as the Private Key and the other key is
sent to the person who is a recipient of a secured message from theoriginator. When the recipient uses the public
key to decrypt the sent message he is said to have affixed his digitalsignature. Thus the combination of Public Key
and Private Key provide both confidentiality and authentication which
are key enablers for secure electronictransmission. The intermediary plays an important role of identifying
the originator of the document and to check if
the Public Key matches with the Private Key. The intermediary wouldalso have to certify that the recipient of the
public key is the person authorized to use the Public Key. The
intermediary tends to assign the public key to aparticular entity and thus becomes a Certifying Authority.
(36)List the code of ethics for IT professionals.
A Professional member of the Computer Society of India (CSI) givesthe following code of ethics for IT professionals: -
1) Organize the resources available to him and optimize these inattaining the objectives of his organization,
2) use the codes of practice conveyed by the CSI from time to time in
carrying out his tasks,
3)Not misuse his authority or office for personal gains,4) comply with the Indian laws relating to the management of his
organization particularly with regard to Privacy
and Piracy, and operate within the spirit of these laws,5) conduct his affairs so as to uphold project and further the image
and reputation of the CSI,
6) Maintain integrity in research and publications.
(37)Explain the social and ethical issues arising out of the
presence of computers in the workplace.
See answer of question 25Solved By:- Nishant & Amlesh
Page 13 of 20
(38) Discuss the significance of legislation.Ans: Legislature can legislate in advance. Legislature can make a low
on any subject, but judges can deal with a
subject only when the point arises before them. Legislature canoverride the law on the particular point. Legislature
is the most fruitful source of law and subject limitation flowing fromthe constitutional doctrine that matter of policy
cant be delegated. Legislature can vest a subordinate authority with
the power to make rules, order etc, but a courtpronouncing a judgment do so. A Legislature performance is not
subject to appeal.
(40) Discuss the adjudicatory processes incorporated in the act.Ad judicatory Process: A reasonable opportunity is given to the
person being charged with contravention of the Act
by the adjudicating officer. When the adjudicating Officer is satisfiedthat there had been a contravention of the Act,
he imposes such penalty or award compensation in accordance withthe provisions of that section. While adjudging
the quantum of compensation under this section the adjudicating
officer shall take into consideration the amount of
gain of unfair advantage wherever quantifiable made as a result of the
default, the amount of loss caused to any
person as a result of the default and the repetitive nature of the default.
The adjudicating officer also has the
powers of the Civil Court, which are conferred on the Cyber Appellate
Tribunal.
(42) What are the moral rules on the internet? Discuss the types of
problematic behaviour .
Moral rules can be notable into two types governing online behavior.
1) The first type of moral rules identifies our moral obligations online.Examples of such rules are netiquette rules
and Codes of conduct examples of which are be polite in e-mail
correspondence,always tell the client the truth.2) The second type of moral rules or recognition rules allows us to
identify what is moral and what is not. Examples
of recognition rules are read the signs, follow the instructions.There are three type ofproblematic behavior, they are listed below:
a) First type of problematic behavior involves individuals and theiractions are broadly referred to as hacking. It
also included intentionally sending viruses or worms on the net that
damage the computer systems. Hacking isunethical and has rightly been made illegal.
b) The second category of problematic behavior is the criminal
actions involving theft (robbery) and extortion.Falling in the scope of criminal actions include stealing of electronic
funds, cyber stalking etc.
c) The third category of problematic behavior involves issueswhether specific laws need to be framed to make such
behavior illegal. This is known as netiquette. Netiquette promotes
ethical behavior and thus is an important tool forshaping the behavior on the net.
(43)Describe computer Hacking.
The term computer hacking usually describes the penetration of
damage but for the pleasure of overcoming thetechnical security measures. In practice, this kind of offence can be
normally found. As far as the damage of thesecases is concerned, a separation is essential: In numerous cases, the
penetrated computer user is not actually
harmed, but only endangered. However, in these cases, too, theformal sphere of secrecy or the integrity of the
concerned computer systems is violated. Contrary to this, considerable
damages occur in other cases especiallywhen the perpetrators later use their knowledge for committing
espionage, damage or fraud.
Solved By:- Nishant & AmleshPage 14 of 20
(44)How is information privacy, violated? Discuss the privacy
policy guidelines for database.Information privacy is violated when the individual:
a) Does not know what information is being collected about themb) Cannot limit access to what is being collectedc) Cannot control the use and distribution of this information
d) Cannot correct erroneous data and out-of-date information.
The privacy policy guidelines for database are following:
1) Data collection:o
Data should be collected on individuals only for the purpose ofachieve a legitimate business
objective.
o
Data should be enough, related and not too much related to the
business objective.
oIndividuals must give their permission before data pertaining to them
can be gathered.
2) Data Accuracy:o
Sensitive data gathered on individuals should be verified before it is
entered into the database.o
Data should be accurate and where and when necessary kept current.o
If there is disagreement about the accuracy of the data, the
individuals version should be notedand included with any disclosure of the file.
3) Data confidentiality:
oComputer security procedures should be implemented to provide
reasonable assurance against.
oThird parties should not be given access to data without the
individuals knowledge or permission.oDisclosures of data, other than the most routine, should be noted and
maintained for as long as the
data is maintained
o
Data should not be disclosed for reasons incompatible with the
business objective.
7/28/2019 64 Xerox 4
6/8
(45)Discuss the different forms of computer crime.Cyber Crime is capable of causing huge damage both in financial
terms and also in terms of user confidence, the Acthas given severe fine for such infractions. The different form of
computer crimes are: -
a) Infringements of privacy: -
The protection of privacy within the data processing area also had to
consider the mass of private computersystem.
It establishes a difficult balance of interest between the privacyinterest of data subjects concerned and the
economic freedom of the holder of personal data.b) Economic offences: -
Computer manipulations were the starting point of discussion aboutcomputer related economic offences.
It is the core center of computer economic offences.
Hacking has increasingly become a basic offence which is used to
commits act of computer fraud.c) Computer Hacking: -
It describes the penetration of damage but in the case, the formalsubject of secrecy is debased.
j)
Computer espionage: -
Its appearing in official data represents a special danger compared
with traditional economic aptitude.ii) Software piracy and other form of product piracy: -
Solved By:- Nishant & Amlesh
Page 15 of 20
The unauthorized coping and use of computer programs is called
software piracy.iii) Computer sabotage and computer Extortion: -
The objects of computer sabotage are the physical computer facilitiesas well as the vague data containing
computer programs.
iv) Computer Fraud: -
In this case, invoice manipulation concerning the payment of bells andspicy of industrial account balance
and balance sheet at banks.
v) Legal and harmful contents: -
Internet is not only made difficult by the fact that these perpetrators
are acting from abroad and that the
international mechanisms of co- operation are often weak and slow.d) Other Offences: Along with the advance of information
technology, new areas of live computers can be used for
almost all offences.
i) Attacks on life: Computer manipulations described above did not
only serve the purpose of gaining pecuniary
benefits, but were also used for attacks on life -as in the case of themanipulation of a flight control system or of a
hospital computer.
ii) Organized Crime: It is clear that the powerful tools of moderncomputer and communication systems to store,
manage and transfer data are also used by organized crime groups in
many areas. Organized crime is especiallyinvolved in sophisticated computer fraud, credit card fraud, and
telephone fraud and software and product piracy.iii) Electronic Warfare: the possibilities of computer manipulations
have also been recognized in the military sector.
Strategic Information Warfare has become a form of potentialwarfare of its own. This type of warfare is primarily
directed to paralyze or manipulate the adversarys computer systems.
(46)Explain the role of E-commerce in the present business
scenario.
E-Commerce is the use of the Internet to buy and sell goods and
services. E-Commerce is changing the way in whichorganizations do business, resulting in streamlined purchasing
processes and lowering the cost of transactingbusiness for both large and small companies.
It also corporate communication, interface design are also found on
internet.
E-business has been added as the latest domain in business and has
become highly competitive technology
driven open market.
The most important features of E-commerce is that help businessmove on the international scene at
minimal cost but with maximum efficiency.
E-commerce gives us business opportunity to open its portal to the
global market and become a part of the
global business community.
E-commerce includes: Supply chain management, customer service
customer relationship and Inventory andservice management integration. The internet to conduct business,
manages industrial activities, engage inpersonal communication and perform scientific research. It also
corporate communication, interface design
are also found on internet.
(47)Explain how proposed amendments to the IT Act 2000
overcomes the drawbacks in the present Act.
The Indian Evidence act states the actions for the recording support bythe courts. Evidence plays a key part in the
trail of a case; it gives an opportunity to the contesting parties to the
suit to confirm their respective claims. The verification guide by the parties maybe either verbal evidence or documentary evidence or both. Amendment to
Solved By:- Nishant & Amlesh
Page 16 of 20the Indian Evidence Act, 1872 make easy the recording of evidence
keeping in view the new laws underIT Act 2000.
It recognizes electronic records as documentary evidence as per 3rd
section of the Indian Evidence Act. The amendedIT Act also recognizes terms like Electronic Records, Certifying
Authority, Digital Signature, Digital SignatureAuthority, Electronic Form, Electronic Records, Information, Secure
Electronic Record, Secure Digital Signature and
Subscriber as valid terms for the purposes of the Act.
The modified sections are:
Section 17: Substitution of words oral or documentary or containedin electronic form
Section 22A: Oral admissions as to the contents of electronic recordsare not relevant
Section 34: Entries in the book of Section 35Records
Section 39: What evidence to be given when statement forms part of aconversation, document, electronic
record, book or series of letters or papers
Section 59: Content of documents would mean to include contents ofelectronic records.
Section 65A: Special provisions as to evidence relating to new
Section 65B:New sectionAdmissibility of electronic records
Section 67A:New sectionProof as to digital signature
Section 73A: New section Proof as to verification of digitalsignature
(48)What are the responsibilities of professionals?
The professional codes address issues from the view point ofcomputing professional however it has three level of
professional code ethics needs to address are:
1) First level identified is a set of ethical values, such as integrity andjustice professionals share with other human
being by virtue of their shared humanity.2) Second level is that more challenging duty than those required at
the first level. Every type of professional shares
this second level of ethical duty. Code statements at this level expressthe responsibility of all professionals and
professional attitudes.
3) Third level, it includes requirement that derive directly fromelements to particular professional perform. Code
elements at this level declare more specific responsibilities that are
more closely related to the state of art withinthe particular profession.
(49)What are the ten commandments for computer ethics?There are Ten Commandments for computer ethics; they are listed
below:
1. You shall not use a computer to harm other people.
2. You shall not interfere with other peoples computer work.
3. You shall not snoop around in other peoples files.
4. You shall not use a computer to steal.
5. You shall not use a computer to bear false witness.
7/28/2019 64 Xerox 4
7/8
6. You shall not use of copy software for which you have not paid.
Solved By:- Nishant & Amlesh
Page 17 of 207. You shall not use other peoples computer resources without
authorization.
8. You shall not appropriate other peoples inte llectual output.9. You shall think about the social consequences of the program you
write.
10. You shall use a computer in ways to show consideration andrespect.
(50)Explain the essentials of privacy preferences project (p3p)
platform.The Platform for Privacy Preferences Project (P3P) developed by the
World Wide Web Consortium (W3C). Its aim toproviding a simple, automated way for users to gain more control over
the use of personal information on web sites
they browse. P3P is a standardized set of multiple choice questions,covering all the major aspects of a web sites
privacy policies. P3P enabled browsers can read this snapshot
automatically and compare it to the consumers ownset of privacy preferences. P3P is the most promising solution to
cyberspace privacy. P3P will help responsible online
businesses empower users to choose the privacy relationship best forthem. P3P is nothing but software to
negotiate privacy agreements between web sites and online visitors.
P3P user machines readable description todescribe the collation and use of data. Browser can help the users to
understand those privacy practices with smart
interface. Mostly browser can develop a predictable behavior when
blocking content like cookies and E-commercesites to behave in privacy as an effected way.
(51)What are the evidentiary presumptions of a secured electronic
document?
The science of Cryptography deals with the encryption of data
means the process of making informationmeaningless to the unauthorized reader. Encryption translates the data
into a secret code. Decryptionthe process
of making the information readable once again completes thecryptography process. The sending of documents in
an encrypted form is the basis of the digital signature system.
There are two types of Cryptographic systems symmetric andasymmetric. The Symmetric Crypto system also
known as single key system being a simpler system consists of both
the sender and the receiver having access andsharing a common Key to encrypt or decrypt a message. The
drawback of this system is the security of the Keyitself and the breakdown of an intermediary to verify the creation of
an electronic document. The Asymmetric
Crypto system also known as Public key system is a more secure
system and overcomes the drawbacks of the singlekey system. This system uses two keys means a key pair generated by
the asymmetric Crypto system. The originator
of the documents who creates the key pair keeps one key which isknown as the Private Key and the other key is
sent to the person who is a recipient of a secured message from the
originator. When the recipient uses the public
key to decrypt the sent message he is said to have affixed his digital
signature. Thus the combination of Public Key
and Private Key provide both confidentiality and authentication whichare key enablers for secure electronic
transmission. The intermediary plays an important role of identifying
the originator of the document and to check ifthe Public Key matches with the Private Key. The intermediary would
also have to certify that the recipient of the
public key is the person authorized to use the Public Key. Theintermediary tends to assign the public key to a
particular entity and thus becomes a Certifying Authority.
Q Write the notes on given topics: -EDUCOM:- : A guide to the ethical and legal use of software for
members of the academic community, it is acatalog produced as a service to the academic community by the
Educational Uses of Information Technology
Program (EUIT) of EDUCOM, and the Information TechnologyAssociation of America (ITAA). EDUCOM is a non-profit
Solved By:- Nishant & Amlesh
Page 18 of 20group of colleges and universities committed to the use and
management of information technology in highereducation. ITAA is an industry association for companies which
create and market products and services associated
with computers, communications and data.
Information Technology Act 2000 :- The Information Technology
Act, 2000 (I.T. Act, 2000) contains provisions on
how a contract can be formed electronically. The Act acts in
conjunction with the Indian contract Act, 1872. To
provide legal recognition for transactions carried out by means of
electronic data interchange and other means of
electronic communication, commonly referred to as electroniccommerce, which involve the use of alternatives to
paper based methods of communication and storage of information, to
facilitate electronic filling of documents withthe Government agencies and further to amend the Indian Penal Code,
the Indian Evidence Act, 1872, the Bankers
Book Evidence Act, 1891 and the Reserve Bank of India Act, 1934and for matters connected therewith or incidental
thereto.
Cyber regulations appellate tribunal. :- : Cyber RegulationsAppellate Tribunal shall be an appellate body where
appeals against the orders passed by the adjudicating officers shall bepreferred. The said Tribunal shall not be
bound by the principles of the code of civil procedure but shall follow
the principles of natural justice and shall havethe same powers as those are vested in a civil court. Against an order
or decision of the cyber appellate Tribunal, an
appeal shall lie to the high court.Electronic governance : - The Information Technology Act, 2000,
deals in his 3rd Chapter propos Electronic
governance.Electronic Governance provides information or any other matter
which is in writing or in the typewritten or printed
form.Such requirement shall be deemed to have been satisfied if such
information or matter is:
Rendered or made available in an electronic form;
Accessible so as to be usable for a subsequent reference.
In the field of electronic governance we survey with following:1. Legal recognition of electronic records
2. Legal recognition of digital signatures3. Use of electronic records and digital signatures in Government and
its agencies.
4. Retention of electronic records5. Publication of rule, regulation in Electronic Gazette
6. Power to make rules by Central Government in respect of digital
signatureIntellectual property :- Intellectual property is the physical property
created by individuals or corporations, which
is protected under trade secret, patent and copyright laws. Theintellectual property rights connected with software
ownership. Ownership is a complex issue; there are three differenttypes of ownership: Copyrights, trade secrets
and patents.
A trade secret is intellectual work, such as a business plan that is acompany secret and is not public
information.
A patent is a document that grants the holder exclusive rights on an
invention for a fixed period of time.
Copyright is a statutory grant that provides the creators of intellectual
property with ownership of it also
for a fixed period of time which generally extends till the life of thecreator of the work plus sixty years.
Owners are entitled to collect fees from anyone who wants to copy the
property.Computer software is granted copyright protection as well as patent
protection. Patent laws differ from country to
country. India is determined by the Patents Act, 1970.Solved By:- Nishant & Amlesh
Page 19 of 20P3P :- - The Platform for Privacy Preferences Project (P3P)
developed by the World Wide Web Consortium (W3C).
Its aim to providing a simple, automated way for users to gain morecontrol over the use of personal information on
web sites they browse. P3P is a standardized set of multiple choice
questions, covering all the major aspects of aweb sites privacy policies. P3P enabled browsers can read this
snapshot automatically and compare it to the
consumers own set of privacy preferences. P3P is the mostpromisingsolution to cyberspace privacy. P3P will help
responsible online businesses empower users to choose the privacyrelationship best for them. P3P is nothing but
software to negotiate privacy agreements between web sites and
online visitors. P3P user machines readable
description to describe the collation and use of data. Browser can help
the users to understand those privacy
practices with smart interface. Mostly browser can develop a
predictable behavior when blocking content like
7/28/2019 64 Xerox 4
8/8