COMPUTER SCIENCE AND ENGINEERING
SYSTEM SOFTWARE
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
|
Data Protection Act
|
|
Computer Misuse Act
|
|
Regulation of Investigatory Powers Act (RIPA)
|
|
Copyright Act
|
Detailed explanation-1: -Section 43 and Section 66 of the Information Technology Act, 2000 cover the civil and criminal offenses of data theft and hacking respectively.
Detailed explanation-2: -THE INFORMATION TECHNOLOGY ACT 2000 Chapter XI Section 66 of IT Act, 2000 particularly deals with the act of hacking. Section 66(1) defines a hack as, any person, dishonestly or fraudulently, does any act referred to in Section 43 is called hacking, and Section 66(2) prescribes the punishment for it.
Detailed explanation-3: -The Computer Misuse Act 1990 was created to deal with the issue of accessing or modifying data without permission. Unauthorised access to computer material.
Detailed explanation-4: -Unauthorized Access to Computer Material: Like a normal person used any software or data to access secure access to any other program then it is not acceptable. The secure access for this person is unauthorized, and he tries to access it in an illegal way. So, a normal person can be prosecuted for this offense.
Detailed explanation-5: -Hacking is identifying and exploiting weaknesses in computer systems and/or computer networks. Cybercrime is committing a crime with the aid of computers and information technology infrastructure. Ethical Hacking is about improving the security of computer systems and/or computer networks. Ethical Hacking is legal.