1/30
Flashcards of key vocabulary terms and definitions from the Cyber Security Lab lecture notes.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Section 65. Tampering with computer source documents
Any one who purposely covers up, obliterates, changes, or causes another to stow away, annihilate, or modify any PC source code utilized for a PC, PC program, PC framework or PC organization, when the PC source code is needed to be kept or kept up by law. Imprisonment as long as three years, or with fine which may stretch out up to two lakh rupees, or with both.
Section 66. Computer related offences
If any individual, unscrupulously or falsely, does any demonstration alluded to in section 43. Imprisonment for a term which may stretch out to three years or with fine which may reach out to five lakh rupees or with both.
Section 67. Punishment for publishing or transmitting obscene material in electronic form
Whoever distributes or sends or causes to be distributed or communicated in the electronic structure, any material which is scurrilous or claims to the lecherous interest. Imprisonment for a term which may stretch out to three years and with fine which may reach out to five lakh rupees and in case of second or resulting conviction with detainment of one or the other portrayal for a term which may stretch out to five years and furthermore with
Section 68. Power of Controller to give directions
The Controller may, by request, direct a Certifying Authority or any worker of such Authority to take such measures or stop continuing such exercises as indicated in the request if those are important to guarantee. Imprisonment for a term not surpassing two years or a fine not surpassing one lakh rupees or with both.
Section 69. Power to issue directions for interception or monitoring or decryption of any information through any computer resource
This Section of the Information Technology Act empowers the Central or State Government or any other competent authority to direct any agency of the appropriate government to monitor, intercept or decrypt any information transmitted, generated, received or stored in any computer resource. Imprisonment for a term which may reach out to seven years and will likewise be responsible to fine.
Section 70. Protected system
The appropriate Government may, by notification in the Official Gazette, declare any computer resource which directly or indirectly affects the facility of Critical Information Infrastructure, to be a protected system. Imprisonment of one or the other depiction for a term which may reach out to ten years and will likewise be obligated to fine.
Section 71. Penalty for misrepresentation
Whoever makes any distortion to, or smothers any material reality from the Controller or the Certifying Authority for acquiring any permit or Certificate, by and large. Imprisonment for a term which may stretch out to two years, or with fine which may reach out to one lakh rupees, or with both.
Section 72. Penalty for Breach of confidentiality and privacy
It provides for a criminal penalty where a government official discloses records and information accessed in the course of his or her duties without the. Imprisonment for a term which may stretch out to two years, or with fine which may reach out to one lakh rupees, or with both.
Section 73. Penalty for publishing Certificate false in certain particulars
It is for publishing electronic Signature Certificate false in certain particulars. Any person who contravenes the provisions of sub-section 1 shall be punished with imprisonment for a term which may extend to two years, or with fine which may extend to one lakh rupees, or with both. Imprisonment for a term which may stretch out to two years, or with fine which may reach out to one lakh rupees, or with both.
Section 74. Publication for fraudulent purpose
Whoever intentionally makes, distributes or in any case makes accessible a Certificate for any fake or unlawful reason. Imprisonment for a term which may reach out to two years, or with fine which may stretch out to one lakh rupees, or with both.
Section 75. Act to apply for offence or contravention committed outside India
If any person have committed an offence, or contravention committed outside India, and if the act or conduct constituting the offence or contravention involves
Section 76. Confiscation
Any PC, PC framework, floppies, reduced plates, tape drives or some other frill related thereto, in regard of which any arrangement of this Act, rules, requests or guidelines made thereunder has been or is being contradicted, will be obligated to seizure
Section 77. Compensation, penalties or confiscation not to interfere with other punishment
No remuneration granted, punishment forced or seizure made under this Act will forestall the honor of pay or inconvenience of some other punishment or discipline under some other law for the time being in power.
Section 78. Power to investigate offences
Despite anything contained in the Code of Criminal Procedure, 1973 (2 of 1974), a cop not underneath the position of will explore any offense under this Act.
Siloscape Malware
Malware Targeting Windows Containers that exploits vulnerabilities in common cloud applications or vulnerable web page or database and then utilizes windows container escape techniques, executes code on underlying node and then spreads in poorly configured Kubernetes clusters to open a backdoor in order to run/deploy malicious containers.
Sarbloh Ransomware
Ransomware spreading via specially crafted malicious documents sent as spear phishing email attachments. Once executed, it encrypts files on affected system and renames the encrypted files with the Sarbloh extension to make them unusable.
Adrozek Malware
Browser modifier malware distributed via classic drive-by download schemes. Installs the Adrozek malware and proceeds to obtain reboot persistence. Modifies browser DLL files to change browser settings and disable security features.
Hping3
Tool similar to ping but more advanced; it can bypass the firewall filter and use TCP, UDP, ICMP and RAW-IP protocols. It also has a traceroute mode.
NMAP
Uses raw IP packets in novel ways to determine which hosts are available on the network, what services those hosts are offering, which operating systems they are running, and what type of packet filters/firewalls are in use.
dnsenum
Helps to get MX, A, and other records connect to a domain. Multithreaded perl script to enumerate DNS information of a domain.
TLSSLed
Linux shell script used to evaluate the security of a target SSL/TLS (HTTPS) web server implementation.
Dmitry
Performs a whois lookup on the IP address or domain name of a host. It also searches for possible subdomains a UNIX/(GNU)Linux Command Line program coded purely in C with the ability to gather as much information as possible about a host.
pof
Tool that can identify the operating system of a target host simply by packet firewall.
BED
Program designed to check daemons for potential buffer overflows, format strings, et. al.
Burpsuite
Can be used as a sniffing tool between your browser and the web servers to find the parameters that the web application uses. A web proxy server operates as a man-in-the-middle between your browser and destination web servers to intercept, inspect, and modify traffic.
ZapProxy
A free, open-source penetration testing tool functions as a man-in-the-middle proxy between the tester's browser and the web application so that it can intercept and inspect messages sent between browser and web application, modify the contents if needed, and then forward those packets on to the destination.
Sqlmap
Automates the process of detecting and exploiting SQL injection flaws and taking over of database servers.
Wireshark
The world's foremost network protocol analyzer. It lets you see what's happening on your network at a microscopic level.
ddrescue
Copies data from one file or block device (hard disc, cdrom, etc.) to another, trying to rescue the good parts first in case of read errors.
pdf-parser
Parses a PDF document to identify the fundamental elements used in the analyzed pdf file. Generally, this is used for pdf files that you suspect has a script embedded in it.
Dradis framework
A reporting tool used by information security professionals specially during security assessments. It is a self-contained web application that provides a centralized repository of information to keep track of what has been done so far, and what is still ahead.