Question

3. Mr. Rashid is a student who knew some personal information of his friend and used...

3. Mr. Rashid is a student who knew some personal information of his friend and used that information to threaten him through mobile phone. Which of the penalty will apply to Mr. Rashid?


4. Ahmed was in a shopping mall. He used his phone to take a video of the two people who were involved in personal argument. Which of the article did Ahmed breach?


5. Which one of the Malware replicates themselves by independently exploiting vulnerabilities in networks?

0 0
Add a comment Improve this question Transcribed image text
Answer #1
  • 3. Mr. Rashid is a student who knew some personal information about his friend and used that information to threaten him through a mobile phone.
  • and According to Information Technology act 2000 Under section 43A of the (Indian) Information Technology Act, 2000, a body corporate who is possessing, dealing or handling any sensitive personal data or information, and is negligent in implementing and maintaining reasonable security practices resulting in wrongful loss or wrongful gain to any person, then such body corporate may be held liable to pay damages to the person so affected. It is important to note that there is no upper limit specified for the compensation that can be claimed by the affected party in such circumstances.
  • The penalty with a fine not exceeding 5 lakh rupees and may Rashid behind the bars term not exceeding 3 years.
  • 4. Ahmed was in a shopping mall. He used his phone to take a video of the two people who were involved in the personal argument.
  • Ahmed breached the article of Information Technology Act 2000 under Section 66E (Punishment for violation of privacy): whoever, intentionally or knowingly captures, publishes or transmits the image of a private area of any person without his or her consent, under circumstances violating the privacy of that person, shall be punished with imprisonment which may extend to three years.
  • 5. I think the first situation is the Malware replicates themselves by independently exploiting vulnerabilities in networks.
  • first, we need to know the difference between Vulnerabilities and Exploit.
  • Vulnerability:-
  • A Security Vulnerability is a weakness, flaw, or error found within a security system that has the potential to be leveraged by a threat agent in order to compromise a secure network.
  • Exploit:-
  • Exploitation is the next step in an attacker's playbook after finding a vulnerability. Exploits are the means through which vulnerability can be leveraged for malicious activity by hackers; these include pieces of software, sequences of commands, or even open-source exploit kits.
  • the situation, Mr. Rashid is a student who knew some personal information about his friend and used that information to threaten him through a mobile phone.
  • Because the situation involves person information means a Vulnerability and with that vulnerability, the person can exploit those vulnerabilities in the network.

Thank You...!

Add a comment
Know the answer?
Add Answer to:
3. Mr. Rashid is a student who knew some personal information of his friend and used...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • Rush Inuit is an impulsive, fly-by-the-seat-of-his-pants kind of guy. His best friend, Stu Earley, is the...

    Rush Inuit is an impulsive, fly-by-the-seat-of-his-pants kind of guy. His best friend, Stu Earley, is the exact opposite – cautious and reluctant. The two are recent UNCG graduates who roomed together all … ahem … eight years. You know who they are even though they graduated last year because everyone on campus knows Rush and Stu – they’re legends on the social scene. To make ends meet during college, Rush and Stu organized fun trips to exciting destinations and charged...

  • continuation of Questions 7 is below pls Ignitia Enterprises is into mobile phone business. The following...

    continuation of Questions 7 is below pls Ignitia Enterprises is into mobile phone business. The following balances appeared in the books of Ignitia Enterprises as at 3kt December, 2019 Gha'ooo Fixed Assets 40,000 Stock 7,500 Debtors 2,500 Cash & Bank 10,000 60,000 Capital 48,000 Creditors 12, 000 6o, ooo show the effect of each of the following transactions on the Balance sheet of Ignitia Enterprises (1) On January 1, 2020, she brought in additional Capital of $10m cheque. ii) On...

  • Comprehensive Income Tax Course: Module 1 4. Randy turned 16 last year and had his first...

    Comprehensive Income Tax Course: Module 1 4. Randy turned 16 last year and had his first summer job. Even though his parents are claiming him as a dependent he wants to file a return in order to get his refund. He receives his W-2 and decides he can do his own return using form 1040-EZ. Which of the following information is not found on a Form W-2? a) The taxpayer’s Social Security number b) The taxpayer’s wages, tips and other...

  • The world’s 3 billion-plus smartphones emit the kind of data that health authorities covet during outbreaks....

    The world’s 3 billion-plus smartphones emit the kind of data that health authorities covet during outbreaks. They show where individuals are, where they’ve been and who they might have talked to or even touched — potentially offering maps to find infected people and clues to stopping new ones. But gaining access to this data, even amid a global pandemic, is made complex by the legal and ethical issues surrounding government access to information that can reveal intimate details about citizens’...

  • Risk management in Information Security today Everyday information security professionals are bombarded with marketing messages around...

    Risk management in Information Security today Everyday information security professionals are bombarded with marketing messages around risk and threat management, fostering an environment in which objectives seem clear: manage risk, manage threat, stop attacks, identify attackers. These objectives aren't wrong, but they are fundamentally misleading.In this session we'll examine the state of the information security industry in order to understand how the current climate fails to address the true needs of the business. We'll use those lessons as a foundation...

  • please answer question 3. Please do take some updated information about Sears regarding their possible Bankruptcy and could the data be a tangible asset used for liquidation. Answr should be at least...

    please answer question 3. Please do take some updated information about Sears regarding their possible Bankruptcy and could the data be a tangible asset used for liquidation. Answr should be at least 2 paragraph. The shrinkage data, combined with sale and purchase data, has expanded the organization 2009, Sears decided to begin an initiativ closer to its customers. They wanted to achieve objective by implementing Big Data technol However, their IT capabilities were not up to the It is clear...

  • CASE 5 PANTRY MARKETS Pantry Markets is a medium-sized southeastern grocery chain head- quartered in Tampa,...

    CASE 5 PANTRY MARKETS Pantry Markets is a medium-sized southeastern grocery chain head- quartered in Tampa, Florida. Sales for the chain have been growing at an average rate of 20% per annum; the chain opened four new stores last year. Although Mr. Carl Royal, president of Pantry Markets, is modest about his achievements, the grocery chain has been increas ingly recognized as a strong competitor in several markets. "In a nutshell," Mr. Royal says, "our marketing strategy over the years...

  • And there was a buy-sell arrangement which laid out the conditions under which either shareholder could...

    And there was a buy-sell arrangement which laid out the conditions under which either shareholder could buy out the other. Paul knew that this offer would strengthen his financial picture…but did he really want a partner?It was going to be a long night. read the case study above and answer this question what would you do if you were Paul with regards to financing, and why? ntroductloh Paul McTaggart sat at his desk. Behind him, the computer screen flickered with...

  • CASE 8 Unlocking the Secrets of the Apple iPhone in the Name of access the male...

    CASE 8 Unlocking the Secrets of the Apple iPhone in the Name of access the male San Bernardino suspect's iPhone 5c. Cook stated: Antiterrorism We are challenging the FBI's demands with the deepes respect for American democracy and a love of our country. We believe it would be in the best interest of everyone to step back and consider the implications While we believe the FBI's intentions are good, if would be wrong for the w e nt to force...

  • Please see the articles below… 1.  What is your opinion on the subject? 2.  Which ethical views (i.e.,...

    Please see the articles below… 1.  What is your opinion on the subject? 2.  Which ethical views (i.e., utilitarian view, moral rights view, justice view, practical view) you feel are being used by both sides of the argument (i.e., for and against downloading) to justify their positions? High Court Enters File-Sharing Spat; Justices Must Determine Software Providers' Liability For Copyright Violations by Anne Marie Squeo. Wall Street Journal. (Eastern edition). New York, N.Y.: Mar 30, 2005. pg. A.2 WASHINGTON -- The Supreme...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT