You are on page 1of 5

ASSIGNMENT OF

CYBER CRIME &


COMPUTER
FORENSIC
1. “There are many grey areas in the cyber crime investigative and forensic
process. Some of these areas are due to inefficiencies in the law, while others are
due to the rapid change of technologies.” Comment it with suitable example.

Many of these problems are created because cyber crime is treated differently than
conventional crimes. However other challenging areas are due to the standards set in
place of this fact we call cyber crime. As our standards, best practices, and
methodologies move farther from reality, we must revisit the past and come up with
ways to make investigating these crimes less restrictive. Although, many of these
practices were great solutions back then, they are no longer a viable option. We must
ensure that technology does not outpace the capacity to perform investigations. While I
do not believe this transition will be easy, but i believe it is necessary.
Examples:
Computer Viruses
Viruses are used by Hackers to infect the user’s computer and damage data saved on
the computer by use of “payload” in viruses which carries damaging code. Person would
be liable under I.T Act only when the consent of the owner is not taken before inserting
virus in his system. The contradiction here is that though certain viruses causes
temporary interruption by showing messages on the screen of the user but still it’s not
punishable under Information Technology Act 2000 as it doesn’t cause tangible
damage. But, it must be made punishable as it would fall under the ambit of
‘unauthorised access’ though doesn’t cause any damage.

Internet Pharming
Hacker here aims at redirecting the website used by the customer to another bogus
website by hijacking the victim’s DNS server and changing his I.P address to fake
website by manipulating DNS server. This redirects user’s original website to a false
misleading website to gain unauthorized information.

Though many laws has been made for cyber crime but none of it is of great aid
because new technology brings over a change with itself, if we grow in technology of
protecting a person’s private data, then hacker also grows in his technology to hijack
that data. So however we try to avoid cyber crime happening that has no certain end to
it and that is somewhat due to inefficiencies in cyber crime law.

2. Identify the five components of a data communications system. Why are


protocols needed?

The five components are :


1. Message - It is the information that is to be communicated. Popular forms of
information include text, pictures, audio, video etc.
2. Sender - It is the device which sends the data messages. It can be a computer,
workstation, telephone handset etc.
3. Receiver - It is the device which receives the data messages. It can be a computer,
workstation, telephone handset etc.
4. Transmission Medium - It is the physical path by which a message travels from
sender to receiver or vice versa. Some examples include twisted-pair wire, coaxial cable
etc.
5. Protocol - It is a set of rules that governs the data communications. It represents an
agreement between the communicating devices. Without a protocol, two devices may
be connected but not communicating.

A communications protocol is a formal description of digital message formats and the


rules for exchanging those messages in or between computing systems and
in telecommunications. Protocols may include signaling, authentication and error
detection and correction capabilities. A protocol describes the syntax, semantics, and
synchronization of communication and may be implemented in hardware or software, or
both.

3. Is Conventional Security successful in 21st century, If not then why?

No, conventional security is not successful in 21st century. As internet is growing


rapidly. It has given rise to new opportunities in every field we can think of – be it
entertainment, business, sports or education. There are two sides to a coin. One of the
major disadvantages is Cyber crime – illegal activity committed on the internet. The
internet, along with its advantages, has also exposed us to security risks that come with
connecting to a large network. Computers today are being misused for illegal activities
like e-mail spying, spam’s, software piracy and so on, which invade our privacy and
offend our senses.

Phishing
Hackers by using e-mail messages which completely resembles the original ones ask
for the confirmation of certain personal information, like account numbers, passwords
etc. Here the customer might get tricked by the originality of that message, which may
lead to huge financial losses if the information is used for fake acts like withdrawing
money from customers account without him having information of it.

Phone Phishing
Here hackers use the in-voice messages where the customers are asked to reveal their
account identification, and passwords to file a complaint for any problems regarding
their accounts with banks etc.
4. “Evidence is what distinguishes a hypothesis from a groundless assertion.
Evidence can confirm or disprove a hypothesis, so evidence reliability and
integrity is the key to its admissibility and weight in a court of law.”
There are several special characteristics of digital or computer evidence, Explain
some of them?
Several special characteristics are:
 Identifying the crime: In cyber crime and in computer-related crime, the nature
of the event is frequently less obvious and immediate. For example, when a
hacker whips confidential information, victims may not find out what has been
stolen unless informed by the system administrators, who in turn may not notice
until long after the hacker has gone. Identity theft, described as ‘‘the fastest-
growing financial crime outside India and perhaps the fastest-growing crime of
any kind in our society’’, may take years to be uncovered.

 The evidence is easily tainted: whenever a crime is committed then evidence


at the scene is sent for independent forensic laboratory testing while
investigators pursue their enquiries elsewhere till the results come back. But in
computer forensics, all investigatory aspects—naming the crime, identifying the
doer, following the evidence trail. Hence, computer forensic handling is especially
susceptible to errors. Just as blood samples or fingerprints can be contaminated,
digital proof can be spoiled throughout collection unless strict procedures is being
followed. Rebooting a system, for example, brings the system state to a start and
wipe out all possible traces.

 Tainting some evidence may destroy it all: Physical evidence is only a single
component of the case, often an independent one, and the prosecution might still
succeed without it. In contrast, digital evidence is highly interrelated. Proving a
supposition— what, how, and who—means recreating the scenario step by step
in a time-line where nullifying a single step means the loss of the entire case. To
achieve this, an investigator needs to preserve the integrity of evidence
contained in seized devices and material. Integrity refers to physical copies of
Computer Crime, Computer Forensics, and Computer Security information and
also to structures such as indexes and directories used to turn the data into
information.

5. I want to set up a wireless network that covers my home and detached garage,
which is 500 feet away. How can I reach this large area securely?
We need a wireless router with a range of around 1,000 feet, which will be sure to cover
your house as well as the 500 feet out to the garage. Set up the router and enter the IP
address provided by the manufacturer into your Web browser. The IP address is a
series of numbers separated by periods (e.g., 172.19.2.250).
The IP address will direct to a Web page where we can amend our wireless Internet
settings. We can choose Wi-Fi Protected Access or Wired Equivalent Privacy as both
are encryption standards that scramble the data transmitted over the wireless
connection, but WPA is more secure for home users.
When WPA is selected, change the default network name and password that were
automatically generated when you set up the router. Our network name can be
something easily recognizable, and your password should be unique and unforgettable
to everyone who uses the router.
Now your connection will be secure and protected. If you experience any interference or
loss of strength in the connection and you’re concerned about security, you can run
such a tool as Wi-Spy. It’ll let you see where the interference is taking place, and then
you can move your router to a place that allows a more direct path to your laptop.

6. The social network I signed up for sent me a note that it has changed its
privacy policy. What does that mean for the privacy of messages I send to friends,
the family photos I post and the personal information I put on my profile?
We need to understand the notice completely that what is the new policy that is been
adopted.
Most visited social network site, facebook has recently come under blaze for frequent
changes to its privacy policy. Updates have included sharing members’ information with
advertisers and sharing members’ online purchase information with others in their
network. Google’s social networking tool, Buzz, was also criticized when it shared
information from individuals’ email contacts.
It’s important to read the network’s privacy policy deeply, as in many cases, these
changes allow us to opt out of the new development. If one don’t agree with the
changes in the policy and no options are provided to allow you to set your own
preferences, contact the company with a complaint. At the time of Google Buzz, many
complaints were registered then the company was compelled to make changes to the
information it distributed from its members. But not all companies will react as quickly. If
one is not comfortable with the company’s privacy policy changes then there is no other
option then just quit using that social network site.

You might also like