0% found this document useful (0 votes)
14 views5 pages

DMF Iat1 Answer Key

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
14 views5 pages

DMF Iat1 Answer Key

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 5

PART-A

1. Outline Forensics Science?


Forensic science is the use of scientific methods or expertise to investigate crimes or
examine evidence that might be presented in a court of law.
2.Define Digital Forensics?
Digital forensics is a branch of forensic science that focuses on identifying, acquiring,
processing, analysing, and reporting on data stored electronically.
3.List out the objectives of Computer Forensics?
i)It helps to recover, analyze, and preserve computer and related materials in such a
manner that it helps the investigation agency to present them as evidence in a court of law.
ii)It helps to postulate the motive behind the crime and identity of the main culprit.
4.Mention the types of Digital Forensics?
i)Email forensics
ii)Malware forensics
iii)Memory forensics
iv)Mobile forensics
v)Network forensics
vi)Database forensics
vii)Wireless forensics
5.Analze the Digital Evidence?
Digital evidence is described as information and data kept on, received from, or
transferred by an electronic device that is useful to an investigation.
6.Draw the diagram for digital forensics process?
Seizure Evidence acquisition Evidence analysis Evidence presentation
7.State the essential ingredients of IT Act 2000?
 Knowingly or intentionally concealing
 Knowingly or intentionally destroying
 Knowingly or intentionally altering
 Knowingly or intentionally causing others to conceal
 Knowingly or intentionally causing another to destroy
 Knowingly or intentionally causing another to alter.
8.List the sources of Substative Laws?
The Substantive Laws are usually derived from:

i)The principles in Common laws which already exist, codified statutory laws

ii)Constitution

iii)Judicial precedents in cases with similar facts and circumstances.


9.Analye Digital Crime?

Digital Crime is defined as an offence targeted at computer data and it's related digital
systems, in which unauthorized access, theft, modification, corruption, or disruption is carried
out.

10.Define Spamming?

Spamming is the use of electronic messaging systems like e-mails and other digital
delivery systems and broadcast media to send unwanted bulk messages indiscriminately.

PART-B
11.Explain the process of Digital Forensics?

Identification
It is the first step in the forensic process. The identification process mainly includes things
like what evidence is present, where it is stored, and lastly, how it is stored (in which format).

Electronic storage media can be personal computers, Mobile phones, PDAs, etc.

Preservation
In this phase, data is isolated, secured, and preserved. It includes preventing people from
using the digital device so that digital evidence is not tampered with.

Analysis
In this step, investigation agents reconstruct fragments of data and draw conclusions based on
evidence found. However, it might take numerous iterations of examination to support a
specific crime theory.

Documentation
In this process, a record of all the visible data must be created. It helps in recreating the crime
scene and reviewing it. It Involves proper documentation of the crime scene along with
photographing, sketching, and crime-scene mapping.

12.a.Illustrate the advantage and disadvantage of Digital Forensics?

Advantages:
1. Helps Solve Crimes: One of the biggest advantages of digital forensics investigation
is that it helps investigators solve crimes. By analyzing digital data, investigators can
gather evidence that can be used to identify suspects and build a case against them.
2. Can be Used in a Wide Range of Cases: Digital forensics investigation can be used in
a wide range of cases, including criminal cases, civil cases, and internal investigations
by companies. This makes it a versatile tool for investigators.
3. Provides Definitive Evidence: Digital evidence is often very strong evidence, as it is
difficult to dispute its authenticity. This can be particularly important in court cases,
where the burden of proof is high.
4. Can Recover Deleted Data: Digital forensics investigation can often recover deleted
data, which can be critical in some cases. Deleted data can provide important clues
that may not be available through other means.
Disadvantages:
1. Can Be Time-Consuming: Digital forensics investigation can be a very time-
consuming process. Collecting and analyzing digital data can take weeks or even
months, depending on the scope of the investigation.
2. Can Be Expensive: Digital forensics investigation can also be expensive, as it requires
specialized equipment and expertise. This can make it difficult for smaller law
enforcement agencies or companies to conduct their own investigations.
3. Requires Specialized Expertise: Digital forensics investigation requires specialized
expertise that is not always readily available. Investigators must be trained in the use
of specialized tools and techniques, which can take years of experience to develop.
4. Data Can Be Encrypted or Deleted: Digital data can be easily encrypted or deleted,
making it more difficult for investigators to find the evidence they need. Criminals
can also use encryption or deletion as a way to cover their tracks.

12.b.Summarize about Digital Investigation types?

The Stages of a Digital Forensics Investigation

Stage 1: Identification

Stage 2: Extraction and Preservation

Stage 3: Analysis

Stage 4: Documentation

Stage 5: Presentation

13.a.Explain in detail about Substantive laws with its Sources and types?

Substantive laws
Substantive laws define the rights and responsibilities in civil law and crimes and
punishments in criminal law. Substantive laws are codified in legislated statutes or may be
practised or modified through precedent, especially in the common law system. These laws
can also be enacted through the initiative process. Substantive laws refer to the actual claims
and defences to refer to in any particular case.

The Substantive Laws are usually derived from:

i)The principles in Common laws which already exist, codified statutory laws
ii)Constitution
iii)Judicial precedents in cases with similar facts and circumstances.
Types of substantive laws
i)Substantive civil laws
ii)Substantive criminal laws

13.b.Illustrate in detail about offences in Digital crime?

OFFENSES:
Cyber offences are the illegitimate actions, which are carried out in a classy manner
where either the computer is the tool or target or both.
Cyber-crime usually includes the following −

 Unauthorized access of the computers

 Data diddling

 Virus/worms attack

 Theft of computer system

 Hacking

 Denial of attacks

 Logic bombs

 Trojan attacks

 Internet time theft

 Web jacking

 Email bombing

 Salami attacks

 Physically damaging computer system.

The offences included in the I.T. Act 2000 are as follows −

 Tampering with the computer source documents.

 Hacking with computer system.

 Publishing of information which is obscene in electronic form.


 Power of Controller to give directions.

 Directions of Controller to a subscriber to extend facilities to decrypt information.

 Protected system.

 Penalty for misrepresentation.

 Penalty for breach of confidentiality and privacy.

 Penalty for publishing Digital Signature Certificate false in certain particulars.

 Publication for fraudulent purpose.

 Act to apply for offence or contravention committed outside India Confiscation.

 Penalties or confiscation not to interfere with other punishments.

 Power to investigate offences.

HOD IQAC

You might also like