0% found this document useful (0 votes)
11 views12 pages

ETI All Assignments

ETI assignments and for students educational college

Uploaded by

labadeshravani
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
0% found this document useful (0 votes)
11 views12 pages

ETI All Assignments

ETI assignments and for students educational college

Uploaded by

labadeshravani
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
You are on page 1/ 12
nia techoical Knowledge sqrt individual who use ed access to computerts — x a yo_gain_unauthor _-netwotrts_ose dato cme Frey tay do this for varius posto nancial goin om toexpose wlnosabil “use thei Sills sifying & Frxin These individuals ohelp— ations by iden ___arrgat ciety oieatsnesses ————— ff Blocts Hat Hacice: pese ote malicious [| inte_sy chem ath ‘posrmfal intent onfing vulnetabilities Fox -perrsanal_gsin— ‘pacwers whe ty data _m_cxpl ixeep desist $0 They often expeario pot uth syshe explore heise vulnorabailsbies end — driven by an intel sane designed ond how ol cumosity about how ___1« Prroblen —_| =A hocicerrs eur challenges os paz _IIdevven by the ideo of cuetccoming abstac ubions te complex problems This tmental sand Ainding — They nore [pases them to thine outside Ye ox & Find onuantins lays to exoloit or Fi sy she [eD é to Contral & Power eS = PYany hackers ove mofiicted hy the desire to Cs ‘oyster , gain access to. yaluoble dota or aSSe% of, overr_o netwoTk hig Sence of power 6a co liability to by pas opht kicoted securrits asurte _ goanipubate date tt — _ _ — _ _ _ A 6 : _ . — I etl _— | Assigomenk No =4 - Mame £2 O3busl aha halt Subject t= ETI — _ ee 3 | Deacxibe the concepk of Ax Ccompor = ae : [ erS +o ehe ; | abficial Satelignnes C02 xe = teak cas pesiouin As. S : So teeonSfo-con ae bares yim Prove efficiency —§. x G 1 i Can Simplobe Numen Peracesses, “Sec OS s¢aS00 09, percep ban ; : y Hawever ical Ee 4 \ Cassi derecl 1S AT heenmes mane inbegroted. in. Society. = FOR EDUCATIONAL USE : Sucev eilinace Otkeckion: At helps ie —sts————— enki: tying —patsnbial tnecots —iostal= He 4. aulomating- asa panass ba wn paske SAA + Environment Hantoxing ee an olyze. 2 Awe FO. FOR EDUCATIONAL USE Assignment - Nome = [loheshon Onisa Sub: abe TOT Cioternet of Things) ae 0 £ rs_To_a Network of ites conn. ed e. ef and systems that communicate & €x data with each ath Q: he intern d often emo d asors, | 0 ha lata in real time = ToT enables devices suchas smart home applience , wearable © Tesnces trackers, industriel machinary & even vehicles to connecting physical & digital works , ToT transform industay— decision maicing and provide innovative solution doy challenge 4 v * Domains of Embedded System = drones & missile 4 . *Telecommunications = Found in ‘outers mademe and neta Suritche ” + Tndustrial Automation = Found in robe tem , mani fachiring . equipment & process control blac * Consumer Flectwanics = Devices lie smartghones teleuisions ashing machines and smart phone opplience FOR EDUCATIONAL USE 7 *Applicotions of Embedded System * Secursty & Suny eilloni C1 = — : ——biobic system di olarm system —— “Wearable Devices = Found in Fitness tracker, Sma’ Send Anealth motoring devices goal Processing = Fmbedded in devices like oudio System [= r ols - masrgrids and hatte reg & challenge i Tol Depljaent. uss in ToT Deployment Stabe i * Privacy Concern = ToT Aallects £ processes sensetive user doto_, ‘rai ing concern about dota misu lack of contys\ over pecrsanal informatio + Data Overload = Tot generate massive omounts of data creoti 4 halleng in torre prrocessing dm mest + Reliability = ToT system depends on consistent device performance and stable networss connection nd ain condition FOR EDUCATIONAL USE * altenges in Tat Deploys mest _ Cost A ast 10. Tol devices. ond ensure : : ie tele = TaT system srequirres Limitations Teliable connectivity to Function: efFiciently Limited netuorts hand width — com fouse delay reduce performance and hinder ‘real - time ations FOR EDUCATIONAL USE — > LAssignigent -3 Name -{oheshon Onxar Sub - ETT + | Define dig fering sic 2 — a 5 et = Digital foccen it aa ot ides or callect 9, __llamalysing ond p onic _data ate and trecoverr informations related to _cybercrits bran on_other digital inciden - This a branch of forrensi nce that cova examining digital devices such as computers, mobile ghones ,Serverr Sore He 2 to uncover evidence that con be used in legal o e_context ma gool of digital forren o oe e data tobegrity , uncover the fruth prowde evidence in court ihe Following proper Legal prroceduce maintaining chains of custody Define mules of digital Forensics 2 *Act legally = i i hefarre accessing device S + Preserve the Scene = Ensure the digital device om enviroment iWon rith during evidence collection “Daag By og = Keepo detailed log of oll actions tae Fram collection to analyse to ensure accountability *Gecurre Fuidence = Stave evidence ina safe, Cootealled Quitranent to prevent unauthorized acce “Prepare fore court = = Poresent Finding. cleanly A ensure thet — ee ie a = Standanel — sherpa to remain ee || Stabe the ethical & a + Fthical practices ~ Copfidtestiality = £ oganization by protecting sensetive eer ene ee Zia = Avoid “altering on tempering with ewdence a Fasutre evidence remains guthentic & occumate —-— = Toronsperency = Document oll actions taken , tools used and +— Findi {+ + Unethical practice a cE = Tempering with evidence = Altering o% manspulating data ta __¢ mi lead “in acase_ eee couthosriby ox_pecrmission ee one Ate oral sing Findings 4o_benefik — i scegatrding —prriva. coeeaes Scope of authorization f— Soa FOR EDUCATIONAL USE | Assignment -4 Nane-Mabeshay Onicar Syb- ETI QA dthat is Digital exudence 2 —________ - _—+ -D ital. ‘evidence refers toa xr dota stored or | transmitted in electronic foirm thot con be used as euidence _ in_legal_on investigative context - Thi co Ay collected fram dig to Lose of euincs gpl tae Servevys oF ortwork: e | @.2 | List the ules of digital evidence @ = ; ~ Prreserr ~Tabegity eG shady es Confidentiality a = Documentations . - Non destructive analy is. | Q. 3 I Stabe the Hhonehesten st digit dens | —+ “Ty EI Mmasing it intongibie-aad not physica observable line traditional evidence + Vol oueruritben espec scuted of when devices are powered of f FOR EDUCATIONAL USE : Fragile = Unluice physical “evidence, digital evidence. canbe Comrupted by minor changes, accidental deletion or System_malfunckians a * Persist: \ evidence ysuch.as deleted Files om mntndatn +-May perth fon long pecs, before ithen on erased + Trterconnecte: : ie Date From one Source con n be lined to . eo

You might also like