Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 3

UserID: 2933_ankur

Name: Ankur Gupta

Assignment 3

Ques.1 Examine the issues relating to the evidence of cyber law in India.

Answer: Some of the issues relating to the evidence of cyber law in India are:

1. Software compatibility: Any electric document which is produced as a


“Primary Evidence” has to be carried on a media and can be read only with the
assistance of appropriate machine and other appropriate software
requirements.
2. Interpretation of evidence: The prosecution or he person making use of the
document in support of his contention before the Court is responsible for the
presentation of the evidence

However, the prosecution or he person making use of the document in support of his
contention before the Court may submit a readable form of the document in the form
of a print out. The authenticity of the printout as a primary or secondary evidence is
still in question.

Ques.2 Evaluate the concept of cyber forensic in India.

Answer: “Forensics” examination can easily pulls out the past usage details. “Cyber
Forensics" is the discovery, analysis and reconstruction of evidences by a
process of extracting/retrieving records, information and data from a cyber storage
devices. These information can be retrieved if it is was deleted earner. Internet
Service provider (ISP) and Network providers can also retrieve information related to
cyber forensics and such information can be used in criminal investigation.

Some of the activities involving cyber forensics are: encryption and decryption
password protected information, tracing the source of e-mail, recovering deleted
data, original author of softwares etc. The main objectives of cyber forensics
includes rapid discovery of evidence, estimate of potential impact of the malicious
activity on the victim, and assessment of the objective of the crime and identity.
Intrusion analysis includes examination of many sources of data evidence e.g.,
firewall logs, network management information etc

The Cyber Forensics works by:


a) Collecting the digital evidence at the time of cyber crime investigation and
stores them for the purpose of examination.
b) Original digital evidence and duplicate digital evidence is created. Original
includes physical items and associated electronic data at the time of seizure.
c) Duplicate digital data evidence is accurate digital form of all electronic
records contained on the original physical item
Ques.3 Discuss briefly the classification of cyber crime.

Answer: Cyber crimes can be classified on the basis of :


(a) subject of crime,
(b) against whom crime is committed and
(c) on the basis of temporal nature of criminal activities being carried out on
computers and Internet.

Generally, it would be classified as below:


a) Against individuals – example: E-mail harassment, Cyber-stalking,
Defamation, Email spoofing, virus transmission etc.
b) Against organizations – example: Pirated software distribution, cyber
terrorism, unauthorized access over computer system etc.
c) Against society at large – example: pornography, trafficking, forgery,
online gambling etc.

A Cyber crime includes traditional activities like theft, forgery and fraud
whenever a computer is involved. In addition to these, crimes like cyber stalking,
hacking, unauthorized access, denial-of-service attack, malicious crime (including
use of virus), E-mail bombing, Salami attacks, Data didling, Web jacking, Cyber
Pornography etc. are the other cyber crimes which are popular, which have
emerged due to increasing use of computers and Internet.

Ques.4 What is ‘Web Jacking’ and how it is different from ‘Trojan attacks’?

Answer: Web jacking could be defined as the ‘hi-jacking’ in the web world. In Web
Jacking, the hacker gains control of the system through bypassing the password,
without the owner’s knowledge or awareness. The hacker can change the information
in the system and the actual owner can’t access his system or don’t have any control
over it.

Trojan attack is an unauthorized program which gains control over other application
by representing itself as an authorized programme. The difference between web-
jacking and Trojan attack is that the web-jacking is done by unauthorized user which
bypasses the password, whereas, the Trojan attacks are the unauthorized applications
which controls other applications

Ques.5 Examine whether Cyber terrorism is a real threat to National security.

Ofcourse yes, the cyber terrorism is a real threat to National security. The whole
world is moving towards digitization and the critical sectors such as defence, banking,
government operations, citizen records are moving rapidly towards digitization.
Cyber terrorism can be defined to be “the premeditated use of disruptive activities, or
the threat thereof, in cyber space, with the intention to further social ideological,
religious, political or similar objectives, or to intimidate any person in furtherance of
such objectives”.

Cyber terrorism is a global concern. The attacks in cyber terrorism includes hate
emails, denial of service attacks, attack on network etc. are fatal.

You might also like