1. Explain the difference between hacking and cyber terrorism as defined under the IT Act.
Answer: Hacking under Section 66 involves unauthorized access to a computer system with intent to cause damage or steal data, punishable by up to 3 years imprisonment. Cyber terrorism under Section 66F involves hacking with intent to threaten India's security, unity, or sovereignty, or to strike terror, and is punishable by life imprisonment.
2. What is the significance of the IT Act, 2000 in promoting e-commerce in India?
Answer: The IT Act provides legal recognition to electronic records and digital signatures, validates electronic contracts, facilitates electronic filing of documents, and creates a secure legal environment for online transactions, thereby promoting e-commerce growth.
3. Describe the role of a Certifying Authority (CA) in the context of digital signatures.
Answer: A Certifying Authority issues Digital Signature Certificates, verifies the identity of applicants, ensures the security and integrity of its operations, and maintains records of certificates issued and revoked.
4. What is software piracy? Why is it considered an offense?
Answer: Software piracy is the unauthorized copying, distribution, or use of copyrighted software. It is an offense because it violates intellectual property rights, causes financial losses to creators, and is illegal under copyright law and the IT Act.
5. Explain the term "Digital Divide" and suggest one measure to bridge this divide.
Answer: The digital divide refers to the gap between those with access to digital technology and those without. One measure to bridge it is establishing community digital literacy centers in rural and underserved areas.
6. What are the key objectives of the IT (Amendment) Act, 2008?
Answer: The key objectives were to address new cyber crimes, include data protection provisions, define cyber terrorism, strengthen the legal framework for digital signatures, and enhance penalties for various cyber offenses.
7. Differentiate between a virus and a worm in the context of cyber security.
Answer: A virus attaches itself to a program and requires user action to spread, while a worm is a standalone program that self-replicates and spreads across networks without user intervention.
8. What is meant by 'cyber defamation'? Provide an example.
Answer: Cyber defamation involves publishing false statements in electronic form that harm someone's reputation. Example: Posting false allegations about a person on social media that damage their professional reputation.
9. Explain the importance of electronic evidence and its admissibility in court under the IT Act.
Answer: Electronic evidence is crucial for proving cyber crimes. Under Section 65B of the IT Act, electronic records are admissible as evidence if they meet specific conditions regarding reliability and integrity.
10. What are the ethical responsibilities of a user on social media platforms?
Answer: Ethical responsibilities include respecting others' privacy, verifying information before sharing, avoiding cyber bullying, not posting defamatory content, and respecting intellectual property rights and platform guidelines.