Advertisement
viprajput

G1s1

Jul 16th, 2018
63
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 4.42 KB | None | 0 0
  1. GRADE 1 SESSON 1
  2. ==================
  3.  
  4.  
  5. ETHICAL : LEGAL
  6. HACKING : Practice to access any system in this world after that it depends on the hacker what they will do.
  7.  
  8. ----------------------------------------------
  9.  
  10.  
  11. TYPES OF HACKERS :
  12.  
  13. 1. BLACK HAT HACKERS : They are basically those people who wants just to gain wealth and destruction by doing hacking.
  14. Eg. Shadow Brokers, THe Lizzared Group etc.
  15.  
  16. 2. WHITE HAT HACKERS : They are those people who hack for the sake of society, and wwith permission of Organizations so that they can secure themselves.
  17. Eg. Rahul Tyagi, Prabhankar Tripathi, Abhijeet Singh, Sanjeev Multani etc.
  18.  
  19. GREY HAT HACKERS : They works for society and religion.
  20. Eg. Anonymous
  21.  
  22. -------------------------------------------------
  23.  
  24. OTHER CATEGORIES
  25. '==============
  26.  
  27. 1. SCRIPT KIDDIES : THey are basically those people who just copy the original creators source codes and then try to feel others that they are created that. They don't knoe the technicality of the things.
  28.  
  29. 2. CRACKERS : THese are those people who knows how to bypass the authentication checks via permutations and combinations.
  30.  
  31. 3. NOOBZ : THese are those people who just arrived into the field of HACKING and they dont know the technical aspects.
  32.  
  33. -----------------------------------------------------
  34.  
  35. CIA TRIAD
  36. ==========
  37. CONFIDENTIALITY : Every specific confidential data should be kept private and safe from the hand of others.
  38.  
  39. INTEGERITY : THere should be no manipulation and altering of sensitive data should be done.
  40.  
  41. AVAILABILITY : THe sensitive data should be available to some specific people with the help of access control checks.:
  42.  
  43. Non- Repudiation:one party of a transaction cannot deny having received a transaction, nor can the other party
  44. deny having sent a transaction.
  45. Authenticity:Authorization to access information and other computing services begins with administrative policies and procedures.
  46.  
  47. --------------------------------------------------------
  48.  
  49.  
  50. SENSITIVE DATA
  51. ===============
  52.  
  53. 1. CONFIDENTIAL DATA :
  54. 2. HEALTH INFORMATION : lic, policy numbers, diseases etc.
  55. 3. FINANCIAL INFO : Bank Account Numbers, Financial Details etc.
  56. 4. PERSONAL INFO : DOB, ADDRESSES, BIRTH CERTIFICATE ETC.
  57.  
  58. ------------------------------------------------------
  59.  
  60.  
  61. CYBER LAWS
  62. ===========
  63. two acts : IT ACT 2000,
  64.  
  65. CYBER LAWS
  66. ===========
  67.  
  68. For Cyber Security Domain, there are some acts which are called IT Acts, These acts are for preventing any malicious person black hat hacker to gain access of any system.
  69.  
  70. The first act was launched and appreciated was IT ACT 2000. Which was having very less acts for the cybrr crimes which are being reported in the constritution.
  71.  
  72.  
  73. After a new act was launched IT AMENDMENT ACT 2008.
  74.  
  75.  
  76. - Section 43 / 43 A- Losses and damages which a person bear due to the harm of any computer.
  77. Improsinment - 1 year and fine is of 2,00,000. or both
  78.  
  79. - Section 65 - It covers up the losses and damage of tampering and misuing of any source code.
  80. Improsnment - 3 Years and fine for 5 lAC inr. or both
  81.  
  82. - Section 66 - Covers up all the Hacking Activities.
  83. - Section 66 A - If a person illegally hacks and gain access into a m,achine he/she will be arrested. Imrosinment - 3 Years fine is of 1Lac INR. or both
  84. - Section 66 C - Identity Theft Crimes done by any individual. Impromsinment - 3 Years Fine 1 Lac INR.
  85. - Section 66 F - Covers up all the activities which follows up with Cyber Terrorist.
  86. Life Inprisonment, Fine of 10 Lac INR.
  87.  
  88. - Section 67 - Covers up all the activvities having providding and leading obscene material and adult materials in a public domain.
  89. Improsinment is for 5 Years fine upto 5 Lac INR or both.
  90.  
  91. - Section 70 - Covers up all the activities having misleading and gaining access into Government Restricted Areas.
  92. IMprisonment is for 5 Years and fine is for 2 LAC or both.
  93.  
  94. - Section 71 - It covers up all the Misrepresentaion facts comes along with Identity, Data and other factors.
  95. Imprisonment for this is 2 Years, with fine of 1 LAC INR.
  96.  
  97. - Section 72 - Breaches of CIA Triad.
  98. Imprisonment of 10 Years.
  99.  
  100. - Section 73 - Covers up all the practices covers and come along with Misleading of Digital Certificates and Signatures.
  101. Imprisonment of 2 Years, Fine 1 Lac
  102.  
  103. ---------------------------------------------------------
  104.  
  105. Basic Guide to IT Amendment Act 2008 - https://lucideustech.blogspot.in/2018/02/a-basic-guide-to-indian-it-amendment.html
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement