Q: What action should be taken if a person wrongly uses the password of another person?
Ans: According to section 66C of Information Technology Act, 2000, whoever,
fraudulently or dishonestly make use of the electronic signature,
password or any other unique identification feature of any other person,
shall be punished with imprisonment of either description for a term
which may extend to three years and shall also be liable to fine with
may extend to rupees one lakh.
Thus, the password hacking is an offence under section 66 and 66C of Information Technology Act, 2000.
Footprinting, Scanning and Enumeration Tools are the techniques to get more information about the victim using enumeration tool.
Footprinting means to collect the every possible information related to target and target network.
Footprinting is of two types:
1. Active Footprinting
2. Passive Footprinting
If the ethical hacking is performed without directly connected to target network, it is called Passive Footprinting.
If the ethical hacking is performed by directly connected to target network, it is called active Footprinting.
Note : The word dishonestly is defined under section 24 of Indian Penal Code.
The word fraudulently is defined under section 25 of Indian Penal Code.
Enumeration in cyber security is extracting a system's valid usernames, machine names, share names, directory names, and other information. Footprinting and scanning are performed using enumeration tools.
Comments
Post a Comment