0% found this document useful (0 votes)
26 views10 pages

Cfi Answers

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
26 views10 pages

Cfi Answers

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 10

Defend that there is a need for protecting Indian children online.

Elaborate the steps


needed to control it.

 In India children belonging to affluent families are having access to internet as


well as the Middle class who utilize the services offered by cyber cafes
 Consequently they are extremely vulnerable as they end up giving complete
information about themselves on the net.
 In the west, the awareness about potential child abuse on the Net has increased
and USA has taken appropriate steps to protect children online and parental
guidance has gained influence
 However in India there is no protection for Indian children on the net.
 The IT act 2000 does not mention anything about protecting children online
 Thus the situation has become more complicated with cyber stalkers as the
existing laws in the country are not enough to control the menace of online
child abuse in India

Illustrate the concept of Cyber stalking and the laws related to Cyber Stalking.

Cyberstalking is defined as unwanted threatening behavioral patterns or advances


directed by one internet user against another user with the purpose of harassing the
other user by using the medium of Internet .

List the three Subsections of Section – 12 of IT Act 2000 and Explain in detail.
OR

Section 7 in The Information Technology Act, 2000 -Retention of electronic


records.

b)Illustrate the three conditions that would give legal status to the retained electronic
records.

• (1) Where any law provides that documents, records or information shall be
retained for any specific period, then, that requirement shall be deemed to have been
satisfied if such documents, records or information are retained in the electronic form,
if-
• (a) the information contained therein remains accessible so as to be usable
for a subsequent reference;
• (b) the electronic record is retained in the format in which it was
originally generated, sent or received or in a format which can be demonstrated
to represent accurately the information originally generated, sent or received;
• (c)the details which will facilitate the identification of the origin,
destination, date and time of despatch or receipt of such electronic record are
available in the electronic record: Provided that this clause does not apply to any
information which is automatically generated solely for the purpose of enabling
an electronic record to be despatched or received.
• (2) Nothing in this section shall apply to any law that expressly provides for
the retention of documents, records or information in the form of electronic records.

(ii) Analyze and state the reason behind the criticism of Section 3(authentication of
electronic records)
(i)A consumer wants to transact online to buy a mobile phone. Devise the
points on how online consumers and their rights can be protected.

• Rise of internet and emergence of electronic commerce have opened


new horizons of growth and prosperity
• The question that evades is how online consumers and their rights be
protected especially in the indian context
• There is no comprehensive global agreement to address these online
consumer issues
• Today when a consumer goes about buying goods or availing services
online he has hardly any protection
• One of the factors that hinges e-commerce is safety in transacting
online
• The consumer Protection Act 1986 interprets that online consumer
disputes can be made by willing and dynamic judiciary
(ii) Illustrate effects of spam with a case study.
• Spam is the practice of sending unsolicited mass emails that are often
advertisements or solicitations sent via e-mail or other online means to internet
users
• It causes immense nuisance as recipient without his/her request or
consent becomes the receiving point of unwarranted, commercial and other
nonsensical emails

(i)A Consultancy firm is planning to host a website about its services, identifying the
various precautionary measures that can be adopted to prevent litigations.
Domain Name issue/Cyber squatting
• The protection of domain names can be done by filing an application for
registering the domain name as a trademark before the Indian Registrar of
Trademarks as also before United states Patent and Trademark Office(USPTO)
• It is also necessary to register all similar domain names in various TLD’s (top
level domains) like dot-com, dot-net, dot-org, dot-info, dot-biz. Also register India
specific domain names like dot-co-dot-in.
Website Precautions
• Website containing valuable content and information should begin with an
opening agreement.
• It should inform visitors about the nature of contents on the websites
• An undertaking from netizens at the homepage to be provided as to he is
entering the website on his own choice and owners and administrators are not liable
in any manner in any event or for any cause
• This avoids the website owners and administrators into unwanted litigation
• Terms and conditions of use should be provided about legal and liability
issues and the use of website is at their own risk and in any computer contamination
the website or owners are not responsible
• In case of website having search facility or search engine a specific
declaration has to be given on homepage stating:
• The search engine is only spidering the web by means of available technology
and is not responsible either for the search results or the contents of the website
mentioned in the search results
Disclaimer
• It is important for any website to legally disclaim any liability arising from the
infringement of trademark or copyright by a visitor
• Disclaimer has to be specific to Indian law
• It has to be clear so as to avoid visiting of consequences of litigations on
issues relating to deceptive similarity.
Protecting of Intellectual property rights
• Liability for content and for action arises in case of copying of contents and
thus infringement of copyright comes in and gives rise to an actionable civil wrong
• But IPR are not covered under the IT Act 2000
• It is necessary to create legal proof of original categories and content on the
web and due credit must be given to relevant source for the contents on the webpages
• If your website gives links to other websites and they open within the frame of
your website the disclaimers should be given and specific copyright
acknowledgement that it belong to the respective owners should be given.
Identification and explanation of all 4 precautionary measures
Differentiate between backup server using shared library and server-less backup
solution with relevant diagrams

 In the past, the only way to overcome a backup server bottleneck was to invest in larger, more
powerful backup servers or data backup and recovery and divide the backup network into
smaller, independent groups.
 Fortunately, backup-software developers have created methods to work around these
bottlenecks.
 The most common workaround is to create tape servers that allow administrators to divide the
backup tasks across multiple systems while maintaining
scheduling and administrative processes on a primary or backup server
 This approach involves attaching multiple tape servers to a shared tape library, which reduces
the overall cost of the system.

Figure 5.1 is an example of a backup configuration such as this

 The newest backup architecture implements a server-less backup solution that allows data to
be moved directly from disk to tape, bypassing the backup server altogether.
 This method of data backup removes the bottleneck of the backup server completely.
 However, the performance of server-less backup is then affected by another potential
bottleneck—bandwidth.

Figure 5.2 is an example of a server-less backup

The computer forensics expert should follow the federal guidelines, and act as this representative,
using his/her knowledge of data storage technologies to track down evidence Data duplication and
preservation
Data recovery
The ability to recover lost evidence is made possible by the expert’s advanced
understanding of storage technologies
Document searches
The speed and efficiency of these searches
make the discovery process less complicated and less intrusive to all parties involved.
Media conversion
The computer forensics experts should extract the relevant data from these devices,
convert it into readable formats, and place it onto new storage media for analysis
Expert witness services
• Computer forensics experts should be able to explain complex technical
processes in
an easy-to-understand fashion.
Computer evidence service options
• The computer forensics experts should offer various levels of service, each
designed to suit the individual investigative needs.
• For example, they should be able to offer the following services:
1. Standard service
2. On-site service
3. Emergency service
4. Priority service
5. Weekend service
Other miscellaneous services
Computer evidence is fragile by its very nature, and the problem is compounded by
the potential of destructive programs and hidden data. Even the normal operation
of the computer can destroy computer evidence that might be lurking in unallocated
space, file slack, or in the Windows swap file. There really are no strict rules that
must be followed regarding the processing of computer evidence. Every case is
different, and flexibility on the part of the computer investigator is important. With
that in mind, the following general computer evidence processing steps have been
provided. Remember that these do not represent the only true way of processing
computer evidence. They are general guidelines provided as food for thought:

1. Shut down the computer.


2. Document the hardware configuration of the system.
3. Transport the computer system to a secure location.
4. Make bit stream backups of hard disks and floppy disks.
5. Mathematically authenticate data on all storage devices.
6. Document the system date and time.
7. Make a list of key search words.
8. Evaluate the Windows swap file.
9. Evaluate file slack.
10. Evaluate unallocated space (erased files).
11. Search files, file slack, and unallocated space for keywords.
12. Document file names, dates, and times.
13. Identify file, program, and storage anomalies.
14. Evaluate program functionality.
15. Document your findings.
16. Retain copies of software used [2].
Main features of Copyrights:

Illustrate in detail the legal aspects of collecting forensic evidence.

In simple terms, a chain of custody is a roadmap that shows how evidence was
collected, analyzed, and preserved in order to be presented as evidence in court.
Establishing a clear chain of custody is crucial because electronic evidence can be
easily altered. A clear chain of custody demonstrates that electronic evidence is
trustworthy. Preserving a chain of custody for electronic evidence, at a minimum,
requires proving that:
No information has been added or changed.
A complete copy was made.
A reliable copying process was used.
All media was secured
Other protective measures include, but are not limited to, storing logs on a dedicated
logging server and encrypting log files. Log files are often one of the best, if not only,
sources of evidence available. Therefore, due to diligence should be applied in
protecting them.

The backup-software community has once again developed a way to overcome the
element of time by using incremental backup, block-level backup, image backups,
and data archiving
Incremental Backup:
• Incremental backups only transfer data that has changed since the last
backup.
• Even then, a full backup had to be made regularly, or restoration of the data
would take too long.
Fortunately, there are now backup applications that combine incremental backups,
thereby creating a virtual complete backup every night without necessitating a full
backup during the limited backup window.
Block-Level Incremental Backup:
• Block-level incremental backups provide similar benefits as incremental
backups, but with even more efficiency.
• Rather than backing up entire files that have been modified since the last
backup, only the blocks that have changed since the last
backup are marked for backup.
• This approach can reduce the amount of incremental data requiring backup
nightly by orders of magnitude
Image Backups:
• Image backups are quickly gaining favor among storage administrators.
• This type of backup creates copies, or snapshots, of a file system at a
particular point in time.
• Image backups are much faster than incremental backups and provide the
ability to easily perform a bare bones recovery of a server without loading the
operating systems, applications, and the like.
Data Archiving:
 Removing infrequently accessed data from a disk drive can reduce the size of
a scheduled backup by up to 80%.
 By moving static, infrequently accessed data to tape, backup applications are
able to focus on backing up and recovering only the most current and critical
data.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy