DMF Iat1 Answer Key
DMF Iat1 Answer Key
i)The principles in Common laws which already exist, codified statutory laws
ii)Constitution
Digital Crime is defined as an offence targeted at computer data and it's related digital
systems, in which unauthorized access, theft, modification, corruption, or disruption is carried
out.
10.Define Spamming?
Spamming is the use of electronic messaging systems like e-mails and other digital
delivery systems and broadcast media to send unwanted bulk messages indiscriminately.
PART-B
11.Explain the process of Digital Forensics?
Identification
It is the first step in the forensic process. The identification process mainly includes things
like what evidence is present, where it is stored, and lastly, how it is stored (in which format).
Electronic storage media can be personal computers, Mobile phones, PDAs, etc.
Preservation
In this phase, data is isolated, secured, and preserved. It includes preventing people from
using the digital device so that digital evidence is not tampered with.
Analysis
In this step, investigation agents reconstruct fragments of data and draw conclusions based on
evidence found. However, it might take numerous iterations of examination to support a
specific crime theory.
Documentation
In this process, a record of all the visible data must be created. It helps in recreating the crime
scene and reviewing it. It Involves proper documentation of the crime scene along with
photographing, sketching, and crime-scene mapping.
Advantages:
1. Helps Solve Crimes: One of the biggest advantages of digital forensics investigation
is that it helps investigators solve crimes. By analyzing digital data, investigators can
gather evidence that can be used to identify suspects and build a case against them.
2. Can be Used in a Wide Range of Cases: Digital forensics investigation can be used in
a wide range of cases, including criminal cases, civil cases, and internal investigations
by companies. This makes it a versatile tool for investigators.
3. Provides Definitive Evidence: Digital evidence is often very strong evidence, as it is
difficult to dispute its authenticity. This can be particularly important in court cases,
where the burden of proof is high.
4. Can Recover Deleted Data: Digital forensics investigation can often recover deleted
data, which can be critical in some cases. Deleted data can provide important clues
that may not be available through other means.
Disadvantages:
1. Can Be Time-Consuming: Digital forensics investigation can be a very time-
consuming process. Collecting and analyzing digital data can take weeks or even
months, depending on the scope of the investigation.
2. Can Be Expensive: Digital forensics investigation can also be expensive, as it requires
specialized equipment and expertise. This can make it difficult for smaller law
enforcement agencies or companies to conduct their own investigations.
3. Requires Specialized Expertise: Digital forensics investigation requires specialized
expertise that is not always readily available. Investigators must be trained in the use
of specialized tools and techniques, which can take years of experience to develop.
4. Data Can Be Encrypted or Deleted: Digital data can be easily encrypted or deleted,
making it more difficult for investigators to find the evidence they need. Criminals
can also use encryption or deletion as a way to cover their tracks.
Stage 1: Identification
Stage 3: Analysis
Stage 4: Documentation
Stage 5: Presentation
13.a.Explain in detail about Substantive laws with its Sources and types?
Substantive laws
Substantive laws define the rights and responsibilities in civil law and crimes and
punishments in criminal law. Substantive laws are codified in legislated statutes or may be
practised or modified through precedent, especially in the common law system. These laws
can also be enacted through the initiative process. Substantive laws refer to the actual claims
and defences to refer to in any particular case.
i)The principles in Common laws which already exist, codified statutory laws
ii)Constitution
iii)Judicial precedents in cases with similar facts and circumstances.
Types of substantive laws
i)Substantive civil laws
ii)Substantive criminal laws
OFFENSES:
Cyber offences are the illegitimate actions, which are carried out in a classy manner
where either the computer is the tool or target or both.
Cyber-crime usually includes the following −
Data diddling
Virus/worms attack
Hacking
Denial of attacks
Logic bombs
Trojan attacks
Web jacking
Email bombing
Salami attacks
Protected system.
HOD IQAC