1. Which of the following is true about a screening router?
IT SHOULD BE COMBINED WITH A FIREWALL FOR BETTER
2. Which of the following is true about a dual-homed
SERVES AS A SINGLE POINT OF ENTRY TO THE NETWORK
3. Which of the fol
Name of the website Instagram
Web Address - https:/instagram.com/
Type of Site Instagram allows a user to share his photos on the instagram webpage.
1. The Fourth amendment states that the search warrant should be specific about the
2. If a law enforcement agent needs to search a computer for specific information, he
needs to get a search warrant to search and get only the specifie
Deontological theory states that everyone has to follow a particular rule whether it leads
to good or bad , Where as consequential theory says that one could follow or break a rule
if he gets benefited from it and makes him happy giving good conseq
Reference : Gift Of Fire.
By getting older people face a lot of memory related issues .To overcome those memory
related problems a memory aid device has to be created with particular features that helps
older people to have a happy life.
A memory a
There's barely any mission to be the leader in innovation for Apple. It designs Macs, the best
personal computers in the world, along with OS X, iLife, iWork and professional software. Apple
leads the digital music revolution with it
1. It is said to be illegal for tax-exempt organizations to post links of websites that do
2. It is said that a tax-exempt think tank has links on its webpage to Hand Gun
control and National Rifles association, so the visitors can get any
1. It is known that every government intercepts communications and filter internet to
safeguard its country, to do these surveillance tasks they require a spyware that can
intercept and record the communications.
2. These sophisticated tools are desi
Overview of Data Protection Laws in India
Often confused with trade secrets and confidentiality, privacy refers to the use and
disclosure of personal information and is only applicable to information specific to
individuals. Since personal information is
How can data gained from intrusion detection improve network security?
It can help prevent future attacks
it can help determine how to respond to a security incident
Which of the following IDPS results in the cause of greatest concern?
Multi-State Information Sharing and Analysis Center
Monthly Security Tips
Volume 8, Issue 9
Social Networking Sites: Security and Privacy Issues
From the Desk of William F. Pelgrin, Chair
Recent hacks involving several h
CHAPTER II: JURISDICTION IN CYBER SPACE
Concept of Jurisdiction
Jurisdiction is the concept where by in any legal system, the power to hear or determine a case
is vested in an appropriate court. The justice delivery system of any legal system operates
Sources of Law
There are Primary and
Secondary sources of law; and there are Federal and
Primary means that the sources are, in appropriate circumstances, binding or
determinative of the outcome of a legal dispute.
Secondary means they are
CYBER CONTRACTS AND INDIAN LEGAL POSITION
Legal issues in Cyber Contracts
The Intellectual Property Rights plays a crucial part in Information Technology and there by in the
contract formation of software development and Internet business. In In
Cyber Contract and Indian Law
College of Engineering & Technology, India
Synergy Institute of Engineering & Technology, India
The usage of cyber contracts has increased exponentially in the recent t
Electronic contracts & the
This document is an extract from the book Ecommerce - Legal Issues
authored by Rohas Nagpal. This book is available as courseware for the
Diploma in Cyber Law and PG Program in Cyber Law conducted by Asian
School of C
Indian Cyber Law
This document is an extract from the book IPR & Cyberspace Indian
Perspective authored by Rohas Nagpal. This book is available as courseware
for the Diploma in Cyber Law and PG Program in Cyber Law conducted by
1. Define cryptographic primitives
a. Modular mathematical functions that perform one task reliably. They form the basic building
blocks of modern cryptography.
2. Which of the following is used as a cryptographic primitive?
a. Pseudorandom numb
There has been a tremendous growth in all of the small and big organizations,
although there is tremendous growth in the organizations of self-directed teams all the
methods and procedures have not yet changed. All the decision making procedur
Never days computer is of great use to everyone in the world; moreover, there is no
human being present in this generation without using a computer. All computers work on the
base of an operating system, because the computer can communicate wi
Electronic business is considered no more than an indulgence, because in order to
fight in the overall business organizations which focus and inculcations must participate in
electronic exchange and have an importance on the Internet. The Inte
According to my view I do not agree with the statement, because planning never goes
waste for any organization or any human being. Planning helps an organization in many ways
like in effective time management, benefits in decision making and p
IATF Release 3.1September 2002
The purpose of a firewall is to protect internal information systems from external attacks.
Firewalls address the requirement for authorized Local Area Network (LAN) users and