Professional Documents
Culture Documents
2933 Ankur Assignment3
2933 Ankur Assignment3
Assignment 3
Ques.1 Examine the issues relating to the evidence of cyber law in India.
Answer: Some of the issues relating to the evidence of cyber law in India are:
However, the prosecution or he person making use of the document in support of his
contention before the Court may submit a readable form of the document in the form
of a print out. The authenticity of the printout as a primary or secondary evidence is
still in question.
Answer: “Forensics” examination can easily pulls out the past usage details. “Cyber
Forensics" is the discovery, analysis and reconstruction of evidences by a
process of extracting/retrieving records, information and data from a cyber storage
devices. These information can be retrieved if it is was deleted earner. Internet
Service provider (ISP) and Network providers can also retrieve information related to
cyber forensics and such information can be used in criminal investigation.
Some of the activities involving cyber forensics are: encryption and decryption
password protected information, tracing the source of e-mail, recovering deleted
data, original author of softwares etc. The main objectives of cyber forensics
includes rapid discovery of evidence, estimate of potential impact of the malicious
activity on the victim, and assessment of the objective of the crime and identity.
Intrusion analysis includes examination of many sources of data evidence e.g.,
firewall logs, network management information etc
A Cyber crime includes traditional activities like theft, forgery and fraud
whenever a computer is involved. In addition to these, crimes like cyber stalking,
hacking, unauthorized access, denial-of-service attack, malicious crime (including
use of virus), E-mail bombing, Salami attacks, Data didling, Web jacking, Cyber
Pornography etc. are the other cyber crimes which are popular, which have
emerged due to increasing use of computers and Internet.
Ques.4 What is ‘Web Jacking’ and how it is different from ‘Trojan attacks’?
Answer: Web jacking could be defined as the ‘hi-jacking’ in the web world. In Web
Jacking, the hacker gains control of the system through bypassing the password,
without the owner’s knowledge or awareness. The hacker can change the information
in the system and the actual owner can’t access his system or don’t have any control
over it.
Trojan attack is an unauthorized program which gains control over other application
by representing itself as an authorized programme. The difference between web-
jacking and Trojan attack is that the web-jacking is done by unauthorized user which
bypasses the password, whereas, the Trojan attacks are the unauthorized applications
which controls other applications
Ofcourse yes, the cyber terrorism is a real threat to National security. The whole
world is moving towards digitization and the critical sectors such as defence, banking,
government operations, citizen records are moving rapidly towards digitization.
Cyber terrorism can be defined to be “the premeditated use of disruptive activities, or
the threat thereof, in cyber space, with the intention to further social ideological,
religious, political or similar objectives, or to intimidate any person in furtherance of
such objectives”.
Cyber terrorism is a global concern. The attacks in cyber terrorism includes hate
emails, denial of service attacks, attack on network etc. are fatal.