Net Extortion (also called Cyber Extortion) is a form of cybercrime where an individual or group threatens to damage, steal, or expose sensitive digital information […]
Category: LLB 6th Sem IT Law [Short Answers]
31. Electronic Record
Definition under IT Act, 2000 According to Section 2(1)(t) of the Information Technology Act, 2000, an electronic record means: “Data, record or data generated, image […]
32. Cyber Security
Cyber Security refers to the practice of protecting computers, servers, mobile devices, networks, and data from unauthorized access, cyber attacks, damage, or theft. It encompasses […]
33. Phishing
Phishing is a type of cybercrime where attackers impersonate a legitimate person, brand, or organization to trick individuals into revealing sensitive information such as: The […]
34. Electronic Signature
An Electronic Signature (e-signature) is a digital method of signing documents or authenticating records electronically, rather than using a handwritten signature on paper. According to […]
35. Encryption
Encryption is the process of converting plain (readable) data into an unreadable (cipher) format using an algorithm and a key, so that only authorized parties […]
36. Search Engines
Definition: A search engine is a web-based software system designed to search for information on the internet. It retrieves data based on keywords or phrases […]
37. Kinds of Operating System
Kinds of Operating SystemsAn operating system (OS) is system software that manages computer hardware and software resources. There are several types of operating systems, each […]
38. Hacking
Definition: Hacking is the act of unauthorized access to or control over a computer system, network, or digital data, usually with the intent to steal, […]
39. Escrow agreements
An Escrow Agreement is a legal contract involving three parties: The escrow agent holds money, documents, or assets on behalf of the buyer and seller […]
