A subscriber is a person in whose name the Digital Signature Certificate (DSC) is issued. The IT Act, 2000 places certain legal responsibilities on subscribers […]
Tag: IT Act
30. Net Extortion
Net Extortion (also called Cyber Extortion) is a form of cybercrime where an individual or group threatens to damage, steal, or expose sensitive digital information […]
31. Electronic Record
Definition under IT Act, 2000 According to Section 2(1)(t) of the Information Technology Act, 2000, an electronic record means: “Data, record or data generated, image […]
32. Cyber Security
Cyber Security refers to the practice of protecting computers, servers, mobile devices, networks, and data from unauthorized access, cyber attacks, damage, or theft. It encompasses […]
33. Phishing
Phishing is a type of cybercrime where attackers impersonate a legitimate person, brand, or organization to trick individuals into revealing sensitive information such as: The […]
35. Encryption
Encryption is the process of converting plain (readable) data into an unreadable (cipher) format using an algorithm and a key, so that only authorized parties […]
36. Search Engines
Definition: A search engine is a web-based software system designed to search for information on the internet. It retrieves data based on keywords or phrases […]
37. Kinds of Operating System
Kinds of Operating SystemsAn operating system (OS) is system software that manages computer hardware and software resources. There are several types of operating systems, each […]
38. Hacking
Definition: Hacking is the act of unauthorized access to or control over a computer system, network, or digital data, usually with the intent to steal, […]
39. Escrow agreements
An Escrow Agreement is a legal contract involving three parties: The escrow agent holds money, documents, or assets on behalf of the buyer and seller […]
