Identity theft is the unauthorized use of someone else’s personal information—such as name, Aadhaar number, bank account, password, email, or biometric data—to impersonate them and […]
Tag: 2000
11. Ethics and characters in Cyber space
Cyber Ethics refers to the code of responsible behavior on the internet. It includes the principles and moral values that guide our actions in the […]
11. Protected system.
Under the Information Technology (IT) Act, 2000, a “Protected System” refers to any computer resource which the government designates as critical to national security, defense, […]
12. Cyber obscenity
Cyber Obscenity refers to the creation, publication, transmission, or distribution of obscene or sexually explicit material using electronic means, such as the internet, mobile phones, […]
13. Cyber terrorism
Cyber terrorism refers to the use of computers, networks, or digital systems to cause widespread fear, violence, or disruption, especially against national security, public infrastructure, […]
14. Electronic messages
Electronic messages refer to any form of communication sent, received, or stored electronically. These messages use digital means to convey information between individuals, systems, or […]
15. Data Protection.
Data Protection refers to the process and set of practices that ensure the privacy, integrity, and security of personal and sensitive data—whether it is stored, […]
16. Digital signature
A digital signature is a type of electronic signature that uses cryptographic techniques to ensure the authenticity, integrity, and non-repudiation of electronic documents or messages. […]
18. Cyber squating
Cybersquatting refers to the illegal practice of registering, trafficking in, or using a domain name with the intent to profit from the goodwill of someone […]
19. In living/ Importance of IT
Information Technology (IT) has become an inseparable part of modern human life. From communication to education, business to healthcare, and governance to entertainment—IT influences almost […]
