NLU-01: CYBER LAWS: NATIONAL AND INTERNATIONAL PERSPECTIVE-2014
NLU-01: CYBER LAWS: NATIONAL AND INTERNATIONAL PERSPECTIVE-2014
Ql: Case Study (Compulsory). 15 Marks.
Swan International Agency Pvt. Ltd. (Swan) is in the business of publishing books, e-books, internet blogs for writers, various other internet publications etc. It wants to expand its business and therefore it also requested to become a certifying authority under the IT Act. The Memorandum of Association of Swan permits any other business to be done by the company. Swan applies to the Controller of Certifying Authority to become a certifying authority since it is in business of publishing electronic books and has various electronic writers' blogs who wish to transact online and thus would be more comfortable in applying to Swan for digital signature certificate than to any other certifying authority. The Controller of Certifying authority gave a one year license to Swan. Within 6 months of the grant of license of Certifying authority, there was a raid on Swan's premises by CBI and Delhi Police alleging that it is allowing the digital signature certificate to be misused and thus has caused massive economic losses to various people. Swan's directors are prosecuted. One of the creditors of the company wants to liquidate the company and applies to the High Court in this regard.
Having regard to the above facts, answer the following questions giving adequate reasons:
(i) Whether SWAN could have got the certifying authority license from Controller of Certifying
Authority in the first place? (ii) Whether SWAN's directors can be punished for the misuse of digital signature certificate
information and whether penal action can be taken against them? (iii) Whether SWAN can be liquidated by the High Court and if so what additional formalities are
required?
Short Answers: Attempt ANY 3. Each answer carries 5 marks.
Q2. What is the role of ICANN's UDRP?
Q3. What is the role of jurisprudence in shaping the positive law? Explain by giving example as to how jurisprudence has helped evolving the IT Act, 2000.
Q4. What are the salient features of Indian Constitution? Can it be stated that Internet is providing free flow of information and thus giving force to Freedom of Speech and Expression under the Indian Constitution. Hence, IT Act, 2000 which is imposing restriction on usage of internet is in violation of Constitution of India.
Q5. Write a brief note on:
(a) Whether computer software has to be patented or copyrighted or both
(b) Electronic Signature
IMT-98: System Forensics-2014
IMT-98: System Forensics-2014
1. What are logical gates and how do they function? Explain various types of logical gates.
2. What do you mean by file structure and how it can be used to repair the corrupt files?
3. What is disk spanning? How does it differ from disk partitioning?
4. Explain HPO and DCO in detail.
5. Explain the process of setting up the HPA and highlight its importance in a forensic Investigation.
6. Explain the fundamentals of Resident and nonresident attributes, what are data runs as referred to in nonresident attributes?
7. What is rainbow table? Explain the time – memory tradeoff in rainbow tables.
8. Explain the functioning of Info2 file and recycle bin. How an investigator can parse it manually to extract the information.
9. What is thumbs.db file? Why it is important for a forensic investigation?
10. What is Steganography? Why is it possible to hide the data in an image file without substantial distortion in it and without increasing the size of the file?
IMT-97: Mobile Platforms Security-2014
IMT-97: Mobile Platforms Security-2014
ASSIGNMENT-I
1. What is Bluetooth Hacking? What makes it dangerous?
2. What do you mean by Bluetooth Discovery? How can you perform Bluetooth discovery?
3. What are the various steps involved in Bluetooth Hacking?
4. What is BlueSnarfing?
5. What are the dangers associated with Bluejacking?
6. What are some of the countermeasures available to prevent Bluejacking?
7. What are some of the countermeasures available to prevent BlueSnarfing?
8. How can you crash some older versions of cellphones with the help of only text messages? How do most mobile phone viruses spread?
ASSIGNMENT-II
1. What do you mean by Pairing?
2. Describe discovery, pairing and binding.
3. Describe the various steps involved in Bluejacking.
4. Describe some DoS attacks available on the mobile phone platform.
5. What are the dangers associated with mobile phone viruses and worms?
NLU-01: CYBER LAWS: NATIONAL AND INTERNATIONAL PERSPECTIVE-2014
Ql: Case Study (Compulsory). 15 Marks.
Swan International Agency Pvt. Ltd. (Swan) is in the business of publishing books, e-books, internet blogs for writers, various other internet publications etc. It wants to expand its business and therefore it also requested to become a certifying authority under the IT Act. The Memorandum of Association of Swan permits any other business to be done by the company. Swan applies to the Controller of Certifying Authority to become a certifying authority since it is in business of publishing electronic books and has various electronic writers' blogs who wish to transact online and thus would be more comfortable in applying to Swan for digital signature certificate than to any other certifying authority. The Controller of Certifying authority gave a one year license to Swan. Within 6 months of the grant of license of Certifying authority, there was a raid on Swan's premises by CBI and Delhi Police alleging that it is allowing the digital signature certificate to be misused and thus has caused massive economic losses to various people. Swan's directors are prosecuted. One of the creditors of the company wants to liquidate the company and applies to the High Court in this regard.
Having regard to the above facts, answer the following questions giving adequate reasons:
(i) Whether SWAN could have got the certifying authority license from Controller of Certifying
Authority in the first place? (ii) Whether SWAN's directors can be punished for the misuse of digital signature certificate
information and whether penal action can be taken against them? (iii) Whether SWAN can be liquidated by the High Court and if so what additional formalities are
required?
Short Answers: Attempt ANY 3. Each answer carries 5 marks.
Q2. What is the role of ICANN's UDRP?
Q3. What is the role of jurisprudence in shaping the positive law? Explain by giving example as to how jurisprudence has helped evolving the IT Act, 2000.
Q4. What are the salient features of Indian Constitution? Can it be stated that Internet is providing free flow of information and thus giving force to Freedom of Speech and Expression under the Indian Constitution. Hence, IT Act, 2000 which is imposing restriction on usage of internet is in violation of Constitution of India.
Q5. Write a brief note on:
(a) Whether computer software has to be patented or copyrighted or both
(b) Electronic Signature
IMT-98: System Forensics-2014
IMT-98: System Forensics-2014
1. What are logical gates and how do they function? Explain various types of logical gates.
2. What do you mean by file structure and how it can be used to repair the corrupt files?
3. What is disk spanning? How does it differ from disk partitioning?
4. Explain HPO and DCO in detail.
5. Explain the process of setting up the HPA and highlight its importance in a forensic Investigation.
6. Explain the fundamentals of Resident and nonresident attributes, what are data runs as referred to in nonresident attributes?
7. What is rainbow table? Explain the time – memory tradeoff in rainbow tables.
8. Explain the functioning of Info2 file and recycle bin. How an investigator can parse it manually to extract the information.
9. What is thumbs.db file? Why it is important for a forensic investigation?
10. What is Steganography? Why is it possible to hide the data in an image file without substantial distortion in it and without increasing the size of the file?
IMT-97: Mobile Platforms Security-2014
IMT-97: Mobile Platforms Security-2014
ASSIGNMENT-I
1. What is Bluetooth Hacking? What makes it dangerous?
2. What do you mean by Bluetooth Discovery? How can you perform Bluetooth discovery?
3. What are the various steps involved in Bluetooth Hacking?
4. What is BlueSnarfing?
5. What are the dangers associated with Bluejacking?
6. What are some of the countermeasures available to prevent Bluejacking?
7. What are some of the countermeasures available to prevent BlueSnarfing?
8. How can you crash some older versions of cellphones with the help of only text messages? How do most mobile phone viruses spread?
ASSIGNMENT-II
1. What do you mean by Pairing?
2. Describe discovery, pairing and binding.
3. Describe the various steps involved in Bluejacking.
4. Describe some DoS attacks available on the mobile phone platform.
5. What are the dangers associated with mobile phone viruses and worms?
No comments:
Post a Comment