Page 98 - IT_V5.0_Class7
P. 98
Hacking can be of two types:
Ethical Hacking: It refers to the authorised access to
the computer for legally testing of computer systems,
networks, and applications for security reasons. This will
help them identify weaknesses in systems and help the
organisations improve their cybersecurity defences.
Unethical Hacking: This involves hacking activities
carried out with the intentions of stealing sensitive
information, spreading malware, disrupting services, or
causing financial harm.
NETIQUETTES
It is short for network etiquette and refers to the set of rules or guidelines to be followed at the
time of online interaction using the Internet. It is always a good practice to follow these rules to
ensure respectful communication and prevent misunderstandings and hard feelings.
Some of the basic netiquettes are:
Treat others online with courtesy and respect, just like in person.
Never share personal information and introduce yourself before chatting.
Use correct spelling and grammar, and avoid typing in all caps to prevent misunderstandings.
Respect others’ privacy, give credit to original creators, and follow community rules.
Be open-minded toward different perspectives and report abusive behaviour to protect
yourself and others.
CYBER LAW
Cyber Law refers to the legal rules or laws that govern the digital world. The main objective of the
cyber law is to safeguard the digital world from cybercrimes. It promotes trust and confidence
in digital interactions and facilitates the continued growth of the digital economy. Some of the
important factors of cyber laws are:
Protects Individual Rights: Cyber law sets rules to safeguard online rights.
Addresses Cybersecurity: Establishes standards for data protection and cybercrime
prevention.
Guides Legal Transactions: Provides guidelines for online legal processes and consumer
protection.
Ensures Global Cooperation: Promotes consistent legal standards across borders.
Supports Digital Economy: Safeguards rights of individuals and businesses, fostering growth.
Cyber Law in India: Information Technology Act, 2000 (IT Act)
The cyber law in India came into effect on October 17, 2000, in the form of the Information
Technology Act, 2000 (IT Act). It was enacted to provide legal protection to electronic transactions,
especially in e-commerce, facilitate electronic governance, and address issues related to
cybersecurity, data protection, and digital signatures.
96 Information Technology (V5.0)-VII

