Diploma in Cyber Laws Examination, 2010 Paper I : BASIS AND REGULATORY FRAME WORK OF CYBER WORLD

Similar documents
Syllabus for P.G. Diploma in Cyber Law and Information Technology

SRM ARTS AND SCIENCE COLLEGE SRM NAGAR, KATTANKULATHUR

Legal framework of ensuring of cyber security in the Republic of Azerbaijan

Total No. of Questions : 09 ] [ Total No.of Pages : 02

CYBERSECURITY INITIATIVES IN VANUATU

COMMERCIAL BANK OF DUBAI PSC GENERAL CONDITIONS OF ACCESS AND USE OF COMMERCIAL BANK OF DUBAI FACEBOOK BRANCH

The registration of Domain Names will be centralized and managed through all DOT accredited Registrars selected by the Registry.

Syllabus: The syllabus is broadly structured as follows:

PROGRAMME CODE QHA5101. This Programme helps to understand various types of crime in digital world and the related legislations in India.

Safeguarding company from cyber-crimes and other technology scams ASSOCHAM

716 West Ave Austin, TX USA

Publications. ACH Audit Requirements. A new approach to payments advising SM. Sound Practices Checklists

Security Requirements for Crypto Devices

CHAPTER 13 ELECTRONIC COMMERCE

Lao PDR Practice for Information Security

II. IP Office Overview

Testing and Certification Regulations For an SA8000 Applicant Status Certification

MUTUAL RECOGNITION MECHANISMS. Tahseen Ahmad Khan

7 The Protection of Certification Marks under the Trademark Act (*)

TERMS OF USE Terms You Your CMT Underlying Agreement CMT Network Subscribers Services Workforce User Authorization to Access and Use Services.

CYBER SECURITY & CYBER LAWS

PLAINSCAPITAL BANK SAMSUNG PAY TERMS AND CONDITIONS - PERSONAL

Birendra Kumar Mishra. Director General Department of Information Technology Ministry Of Science and Technology Government of Nepal

BEST PRACTICES IN USE OF DIGITAL SIGNATURE. Presented by, Vicky Shah

Expert Meeting on CYBERLAWS AND REGULATIONS FOR ENHANCING E-COMMERCE: INCLUDING CASE STUDIES AND LESSONS LEARNED March 2015

ISACA CISA. ISACA CISA ( Certified Information Systems Auditor ) Download Full Version :

Ethical, legal, and policy issues related to security and privacy research and practice

KofaxExport Connector8.1.0

key distribution requirements for public key algorithms asymmetric (or public) key algorithms

.LATROBE TLD REGISTRATION POLICY

POST GRADUATE DIPLOMA IN CYBER LAW PGDCL Semester I, II

Developing a Legal Foundation and Establishing Effective Enforcement: Case Study Kenya

ACH Audit Guide Step-by-Step Guidance and Interactive Form For Internal ACH Audits Audit Year 2016

DDTC IT Modernization

Bharatiya Vidya Bhavan's H. B. Institute of Communication and Management Cyberra Legal Services

Legal, Ethical, and Professional Issues in Information Security

SAMPLE COURSE OUTLINE APPLIED INFORMATION TECHNOLOGY ATAR YEAR 12

New ICT Indicators for Knowledge Economy

Network Security and Surveillance

13. Acceptable Use Policy

HOLY ANGEL UNIVERSITY COLLEGE OF INFORMATION AND COMMUNICATIONS TECHNOLOGY CYBER SECURITY COURSE SYLLABUS

Public Key Infrastructure PKI. National Digital Certification Center Information Technology Authority Sultanate of Oman

Consumer Rights in the Digital Age

EXAMPLE AUDIO OR VIDEO SCRIPTS

Controlled Document Page 1 of 6. Effective Date: 6/19/13. Approved by: CAB/F. Approved on: 6/19/13. Version Supersedes:

Acceptable Use Policy

Intellectual property protection in Turkey is reasonably up-to-date, but enforcement is patchy.

CYBER CRIME A COMPARATIVE LAW ANALYSIS SANDRA MARIANA MAAT. submitted in part fulfilment of the requirements for the degree of MAGISTER LEGUM.

edocument Delivery Agreement

E-Signature Law of Iraq no. ( 78) of 2012

Introduction to Computing

ELECTRONIC RECORDING GUIDELINES Clerk of the Circuit Court and County Comptroller 2000 Main Street Sarasota, FL 34236

GDPR compliance: some basics & practical to do list

The Tension. Security vs. ease of use: the more security measures added, the more difficult a site is to use, and the slower it becomes

BMO Harris Online Banking Electronic Communications Delivery Notice and Agreement. Effective as of October 13, 2013

God is in the Small Stuff and it all matters. .In the Small Stuff. Security and Ethical Challenges. Introduction to Information Systems Chapter 11

Indonesia Cyber Security Market

Information technology Security techniques Blind digital signatures. Part 1: General

Republic of the Sudan National Telecom Corporation. Country case study Incident management capability

Cyber Crime Prosecution & Defence

FinFit will request and collect information in order to determine whether you qualify for FinFit Loans*.

Principles of Information Security, Fourth Edition. Chapter 8 Cryptography

The question paper contains 40 multiple choice questions with four choices and students will have to pick the correct one (each carrying ½ marks.).

Séminaire sur la Certification Electronique

Acceptable Use Policy

Regional and subregional approaches to the Digital Economy: Lessons from Asia-Pacific and Latin America

10EC832: NETWORK SECURITY

PAA PKI Mutual Recognition Framework. Copyright PAA, All Rights Reserved 1

: Acceptable Use Policy

Computers and Security

The United Nations Convention On the Use of Electronic Communication in International Contracts, 2005 and Electronic Transactions Law in Thailand

STANDARD PENN STATE BIOLOGICAL MATERIAL TRANSFER AGREEMENT. 1. PROVIDER: The Pennsylvania State University.

Glenwood Telecommunications, Inc. Acceptable Use Policy (AUP)

Mobile Commerce and Mobile Payments

Preface Chapter 1. The Challenges of Building a Network

CYBERCRIME The Legal Issues

World Wide Web History, Architecture, Protocols Web Information Systems. CS/INFO 431 January 29, 2007 Carl Lagoze Spring 2007

Annex 2 to the Agreement on Cooperation in the Area of Trade Finance & Cash Management Terms and Conditions for Remote Data Transmission

(2½ hours) Total Marks: 75

NUCONNECT INTERNET ACCEPTABLE USE POLICY

Improved Delegation Of Computation Using Somewhat Homomorphic Encryption To Reduce Storage Space

TOWING VESSEL INSPECTION BUREAU (TVIB)

Cyber Security Law --- How does it affect the business operations in China? Xun Yang Of Counsel, Commercial IP and Technology

LET S ENCRYPT SUBSCRIBER AGREEMENT

LEGAL FRAMEWORK FOR THE ENFORCEMENT OF CYBER LAW AND CYBER ETHICS IN NIGERIA

Requiring Digital Signatures and Certificates

Servers for e-commerce Operational platforms eg: Web Servers, Application Servers etc. Performance planning and Monitoring Virtualisation

Acceptable Use Policy

ACCREDITATION COMMISSION FOR CONFORMITY ASSESSMENT BODIES. Advisory Document on Tenders For Systems, Processes & Product Certifications

Apple Inc. Certification Authority Certification Practice Statement

Getting to Grips with Public Key Infrastructure (PKI)

If yes. If no. Non-funded Agreements (NFA)

Cybersecurity Session IIA Conference 2018

Course information for

ISO/IEC INTERNATIONAL STANDARD

300 Lena Drive Aurora, Ohio P: F: Page 1 of 5

Apple Inc. Certification Authority Certification Practice Statement

CERTIFIED MAIL LABELS TERMS OF USE and PRIVACY POLICY Agreement

Certified Cyber Security Analyst VS-1160

PROVIDING INVESTIGATIVE SOLUTIONS

Transcription:

*374131* [3741] 31 Paper I : BASIS AND REGULATORY FRAME WORK OF CYBER WORLD Instructions : 1) Question 9 is compulsory. It carries 20 marks. 2) Out of the remaining questions, answer any five questions and each such question carries 16 marks. 1. Explain the meaning of Operating Systems and discuss its significance. 2. What is Computer Networking? Explain the different types of computer Networks. 3. Explain about Encryption Techniques and differentiate between Secret Key Encryption and Public Key Encryption. 4. Explain about digital signatures, digital certificates and RSA algorithms. 5. What is World Wide Web and Web Technology? Explain. 6. What is called Network Security and Cryptography? Discuss. 7. Explain the role of Government to Regulate Internet (censorship). 8. Explain the concepts of Data Organization and Data Management. 9. Write short notes on any four of the following : i) Protocols (TCP/IP) ii) Remote Login Procedure iii) Role of ITU, WTO and ATP iv) Certifying or Governing authorities v) Internet Service Provider vi) Communication Techniques.

*374132* [3741] 32 Paper II E-COMMERCE Instructions : 1) Question 9 is compulsory. It carries 20 marks. 2) Out of the remaining questions, answer any five questions and each such question carries 16 marks. 1. Explain the procedure for choosing and registering a domain name. 2. What are the popular modes of payment of electronic funds? 3. Explain the various issues relating to electronic commerce taxation. 4. What is the role of Better Business Bureau in protecting the consumer Rights of the Cyber World? Explain. 5. Explain the essential requirements of Cyber squatting. 6. List the major benefits of E-Commerce. 7. What is internet advertising and explain the models of internet advertising? 8. What is E-Commerce and explain the benefits and impact of E-Commerce? 9. Answer any four of the following : i) Passive or Pull-Based Advertising ii) Virtual Banking Operations iii) Electronic payment procedure iv) Management of Domain names v) Consumer Protection in Cyber World vi) Data Protection and Principles.

374133 Paper III : INFORMATION TECHNOLOGY ACT, 2000 [3741] 33 Instructions : a) Question No. 9 is compulsory. Out of the remaining attempt any five questions. b) Question No. 9 carries 20 marks and all other questions carry 16 marks each. 1. What do you mean by Cyber Crimes? Discuss the nature and types of Cyber Crimes. What are the challenges before it? 2. What do you understand by Digital Signature? Discuss the use of Digital Signature in e-governance. 3. Attempt the following : a) Cyber Regulation Appellate Tribunal b) Electronic Records. 4. Explain : a) Asymmetric Cryptosystem b) Service Providers Liability. 5. Discuss the Powers and Functions of various authorities under the Information Technology Act, 2000. 6. Critically examine the various penal provisions under the Information Technology Act, 2000. 7. Write notes on : a) Legal Recognition of digital signature b) Advisory Committee 8. Attempt the following : a) Attribution, Acknowledgement and Dispatch of Electronic Records. b) Duties of the subscribers. 9. Write short notes on : a) Trojan Horse b) Computer Virus c) Hacking / Cracking d) Unauthorized modification of Computer Programmes.

*374134* [3741] 34 INTELLECTUAL PROPERTY RIGHTS IN THE CYBER WORLD (Paper IV) Instructions : 1) Question No. 9 is compulsory. 2) Answer any five out of the remaining. 1. Discuss the role of international copyright conventions in development of cyber technology copyrights. 16 2. What is the protection offered to Online Trade Marks under the Trade Marks Act, 1999? 16 3. Explain the concept of digital copyright. Under which Act do digital copyrights get registered? 16 4. Discuss the concept of cyber squatting of domain names, domain disputes and use of trade marks as mega tags. 16 5 Examine the role of the TRIPS Agreement for trade mark and patent protection of cyber world technologies. 16 6. Discuss in detail the rights of performers and digital broadcasters in the cyber world in context of the relevant statute. 16 7. How does the Semi- conductor Integrated Circuits layout Design Act, 2000- extend protection to design and semi-conductor chips or internal hardware computer components? 16 P.T.O.

[3741] 34 *374134* 8. What are the various types of software patents and their application to the cyber world and technologies involved? 16 9. Write notes on any two : 20 a) Madrid Agreement b) Protection of Industrial Designs c) ICANN policies and reforms d) Data file sharing technology.