Posts

Q: What are the reasons of failure of league of nation ?

Ans: Germany joined League of nation in 1925 but due to hitler's dictatorship in 1933, Germany left the league of nation. In 1931 , the league of nation failed to prevent the Japanese aggression against China.  In 1935, Italy invaded abyssinia and Abyssinia appealed to the league under Article 10 of the covenant, Italy left league of nation to conquer abyssinia.  The judicial settlement by international court of justice was also not made compulsory and member states were allowed to violate international law and imperil peace and security of world with impunity.

Q: In which section is the term of office, conditions of service mentioned under information technology act, 2000 ?

Ans:   Section 51 of Information Technology Act, 2000 mentions t erm of office, conditions of service, etc., of Chairperson and members. 51(1). The Chairperson or Member of the Cyber Appellate Tribunal shall hold office for a term of five years from the date on which he enters upon his office or until he attains the age of sixty-five years, whichever is earlier. 51(2).  The person should not have any financial or other interests. There must not be any personal benefit in becoming the chairperson and member of Cyber Appellate Tribunal. 51(3). To become the chairperson or member of Cyber Appellate Tribunal,  a person must have to take the retirement from the central government or state government job.  

Q: In which section is the qualification of members of cyber appellate tribunal is mentioned?

Ans: The qualification of members of cyber appellate tribunal are mentioned under Section 50 of information technology act,  2000 .  Under Section 50 of information technology act,  1. To be a Chairperson of cyber appellate tribunal,  a person must have the eligibility to be a judge of high court.  Either he has practised as a judge for 10 years or he has practised as an advocate for 10 years in high court.  2.  To be a member of cyber appellate tribunal,  a person a person must hold the post of Additional Secretary or equivalent for 1 year or joint secretary or equivalent for 7 years and he must have the experience in telecommunication, information technology and consumer affairs.  3. To be a judicial member of cyber appellate tribunal,  a person in Indian Legal Service must hold the post of Additional Secretary for 1 year or any grade 1 post for 5 years. 

Q: In which sections cyber Appellate tribunal are mentioned ?

Ans: Cyber Appellate Tribunal is mentioned from sections 48 to section 58 of information technology act, 2000. 

Q: What is cyber terrorism ?

Ans:  Section 66 F of information technology act deals with cyber terrorism.  66-F. Punishment for cyber terrorism.—(1) Whoever,— (A) with intent to threaten the unity, integrity, security or sovereignty of India or to strike terror in the people or any section of the people by— (i) denying or cause the denial of access to any person authorised to access computer resource; or (ii) attempting to penetrate or access a computer resource without authorisation or exceeding authorised access; or (iii) introducing or causing to introduce any computer contaminant.  Whoever commits or conspires to commit cyber terrorism shall be punishable with imprisonment which may extend to imprisonment for life. To perform terrorism using internet is cyber terrorism.  In cyber terrorism,  the internet is used to commit violent acts that result in loss of life or physical harm or intimidation of people in order to gain political as well as ideological benefits.

Q: What action would be taken if a person publishes nude photos of woman ?

Ans:  Section 66 E of Information Technology Act, 2000 deals with punishment for violation of privacy. Any person who intentionally or knowingly captures, publishes or transmits the image of a private area of any person without his or her consent, under circumstances violating the privacy of that person, shall be punished with imprisonment which may extend to three years or with fine not exceeding two lakh rupees, or with both. Explanation. -For the purposes of this section: (a) "transmit" means to electronically send a visual image with the intention that it be viewed by a person or persons with the permission. (b) "capture", with respect to an image, means to videotape, photograph, film or record by any means without permission. (c) "private area" means the naked or undergarment clad genitals, pubic area, buttocks or female breast. (d) "publishes" means reproduction in the printed or electronic form and making it available for public...

Q: What action should be taken if a person wrongly uses the password of another person?

Ans:  According to section 66C of Information Technology Act, 2000, w hoever, fraudulently or dishonestly make use of the electronic signature, password or any other unique identification feature of any other person, shall be punished with imprisonment of either description for a term which may extend to three years and shall also be liable to fine with may extend to rupees one lakh. T hus, the password hacking is an offence under section 66 and 66C of Information Technology Act, 2000. Footprinting, Scanning and Enumeration Tools are the techniques to get more information about the victim using enumeration tool. Footprinting means to collect the every possible information related to target and target network. Footprinting is of two types:  1. Active Footprinting  2. Passive Footprinting If the ethical hacking is performed without directly connected to target network,  it is called Passive Footprinting. If the ethical hacking is performed by directly connected to...