Solution - CS 23-24
Solution - CS 23-24
                                       Section-A
Q1.(a) Define Cyber Crime.
Ans (a) Cyber Crime refers to criminal activities that involve the use of computers, digital
devices, or networks as the main tools for committing illegal acts or as targets themselves. These
crimes can be carried out by individuals, groups, or even state-sponsored entities, and they often
involve:
Cyber crimes can target individuals, organizations, or governments and often result in financial
loss, data breaches, or damage to reputation and security.
Ans (b) A botnet (short for robot network) is a network of compromised computers or devices,
often called "bots" or "zombies," that are controlled remotely by a cybercriminal (called a
botmaster or bot herder) without the users' knowledge.
Ans (c) Mobile devices need security because they store and access a large amount of personal,
financial, and sensitive data, and are vulnerable to various cyber threats. As smartphones become
more powerful and essential in daily life, they also become attractive targets for attackers.
   Reasons Why Mobile Devices Need Security:
Ans (d)
Authentication:
Authentication is the process of verifying the identity of a user, system, or device.
Purpose:
To confirm that someone or something is who they claim to be.
Examples:
Authorization:
Authorization is the process of granting or denying access to resources based on permissions.
Purpose:
To determine what actions or resources a verified user is allowed to access.
Examples:
      Allowing a user to view but not edit a document
      Giving administrators access to system settings
      Restricting access to certain files or apps based on user roles
Ans (e) A computer virus is a type of malware that attaches itself to a legitimate program or file
and spreads when the infected file is executed. A worm is a standalone malware program that
can self-replicate and spread automatically across networks without user interaction.
Ans (f) Digital evidence refers to any information or data stored or transmitted in digital form
that can be used as evidence in a legal investigation or court of law. It is collected from
electronic devices such as computers, smartphones, servers, USB drives, emails, social media,
and cloud services.
SECTION- B
Q.2 (a) Explain how the term ‘cybercrime’ originated. State few
Cyber Crimes.
The term originated in the early 1990s as the use of computers and the internet became more
widespread. As criminals started using technology to commit illegal activities (like hacking or
data theft), law enforcement and researchers coined the term "cybercrime" to describe these
technology-based offenses.
A Few Common Cyber Crimes:
   1. Hacking:
         o Unauthorized access to computer systems or networks.
   2. Phishing:
          o   Sending fake emails or messages to trick people into giving away sensitive
              information like passwords or bank details.
   3. Identity Theft:
          o   Stealing someone's personal information to impersonate them and commit fraud.
   4. Cyberbullying:
          o   Using the internet or social media to harass, threaten, or embarrass someone.
   5. Online Fraud:
          o   Scams involving fake websites, job offers, or shopping platforms to steal money
              or information.
   6. Ransomware Attacks:
          o   Locking users out of their data or systems and demanding payment to restore
              access.
   7. Spreading Malware:
          o   Creating and distributing viruses, worms, or spyware to damage systems or steal
              data.
   8. Denial of Service (DoS) Attacks:
          o   Flooding a server or network to make it unavailable to users.
Q.2 (b) Explain wireless devices with example. What are the security challenges faced by
wireless devices?
Wireless devices are electronic gadgets that can communicate or connect without physical
cables, using radio waves, infrared, Bluetooth, or Wi-Fi technology.
Wireless devices face unique security issues because they transmit data over open air, making
them more exposed to attacks.
      Attackers can intercept wireless signals and capture sensitive data (e.g., login credentials,
       messages).
      An attacker secretly intercepts and alters communication between two devices. 4. Rogue
       Access Points:
 Fake Wi-Fi hotspots can trick users into connecting, exposing their data.
4. Malware Attacks:
      Wireless devices can get infected through malicious apps or connections, leading to data
       theft.
6. Bluetooth Exploits:
      Features like Bluetooth can be exploited if left turned on or not secured, allowing
       attackers to connect without permission.
Cybercriminals use a variety of software tools and techniques to exploit systems, steal data, or
cause damage. Here are seven commonly used tools in cybercrime:
1. Keyloggers
2. Phishing Kits
      Purpose: Gives the attacker remote control over the victim's computer.
      Used for: Spying, stealing data, installing other malware.
      Type: Malware disguised as legitimate software.
4. Botnets
7. Exploit Kits
The Digital Forensics Life Cycle refers to the systematic process used by forensic experts to
identify, collect, preserve, analyze, and present digital evidence in a way that is legally
acceptable.
1. Identification
2. Preservation
3. Collection
4. Examination
5. Analysis
6. Presentation
7. Decision
      Based on the findings, decide the next steps (e.g., prosecution, further investigation).
      May involve feedback and repeat of some phases if new evidence appears.
Summary Diagram:
An Information Security Policy is a formal document that defines how an organization protects
its information assets. It lays down rules, procedures, and guidelines to ensure the
confidentiality, integrity, and availability of data.
Why is it needed?
      Establishes rules and responsibilities for employees about acceptable use, password
       management, data handling, and incident reporting.
      Helps avoid confusion or inconsistent practices.
      Helps reduce risks of cyber attacks, data theft, or accidental data loss by enforcing
       security best practices.
      Helps organizations comply with laws and regulations (like GDPR, HIPAA, etc.) related
       to data protection and privacy.
      Avoids legal penalties and reputational damage.
      Ensures critical information systems remain available and secure, even during
       emergencies or disasters.
      Educates staff about security risks and their role in protecting information.
      Holds them accountable for violations.
                                   SECTION C
Q3 (a) Who are Cyber Criminals? Classify Cybercrimes.
Cyber criminals are individuals or groups who use computers, networks, or the internet to
commit illegal activities for personal, financial, political, or social gain. They exploit
vulnerabilities in digital systems to steal data, disrupt services, or cause harm.
Classification of Cybercrimes:
Cybercrimes can be broadly classified into several categories based on their nature and targets:
      Examples: Cyber espionage, denial of service (DoS) attacks, website defacement, insider
       threats.
      Description: Target businesses or government agencies to disrupt operations or steal
       confidential information.
4. Financial Crimes
      Examples: Online fraud, phishing, credit card fraud, cyber money laundering.
      Description: Focus on illegally gaining money through deceptive online practices.
5. Cyber Terrorism
6. Cyber Warfare
Q 3 (b) What is the fuel for cybercrime? How may a criminal plan cybercrime?
The fuel for cybercrime refers to the factors or resources that enable or drive cybercriminal
activities. These fuels include:
2. Weaponization
      Prepare the tools needed for the attack (malware, phishing emails, exploit kits).
      Customize malware to exploit vulnerabilities in the target.
3. Delivery
4. Exploitation
5. Installation
       Install malware (like a backdoor or ransomware) to maintain access or control over the
        system.
 Establish remote control over the infected system to issue further commands.
7. Actions on Objectives
 Achieve the goal of the attack: steal data, disrupt services, demand ransom, etc.
Q4 (a) Explain the security measures and policies taken for mobile devices.
Mobile devices (smart phones, tablets, etc.) are increasingly targeted by cyber threats because
they store sensitive personal and business data. Implementing strong security measures and
policies is crucial to protect these devices.
    4. Encrypt Data
              o   Enable device encryption to protect stored data from unauthorized access.
Organizations often create mobile device policies to ensure secure usage within the workplace:
   3. Application Policy
           o   Only allow installation of approved apps.
   7. Network Policy
          o   Prohibit connecting to unsecured or suspicious Wi-Fi networks.
Q4 (b) State some attacks on Mobile devices. What are the security implications for
Organizations?
   1. Malware Attacks
         o Malicious apps or files that steal data, spy on users, or damage the device.
   2. Phishing Attacks
          o   Fake messages or emails designed to trick users into revealing passwords or
              personal info.
   3. Man-in-the-Middle (MitM) Attacks
          o   Intercepting data when a device connects to unsecured Wi-Fi networks.
   7. Rogue Apps
          o   Apps that appear legitimate but contain malicious code.
   8. Network Spoofing
          o   Fake Wi-Fi hotspots set up to capture device data.
Security Implications for Organizations
   1. Data Breaches
           o Sensitive corporate data stored or accessed on mobile devices can be stolen or
               leaked.
   2. Loss of Intellectual Property
           o   Confidential business information can be compromised.
   3. Financial Loss
           o   Fraud, ransomware, or legal penalties due to non-compliance with data protection
               laws.
   4. Reputation Damage
           o   Customer trust can be lost after a security incident.
   5. Operational Disruption
           o   Attacks can disable mobile access to critical systems, affecting productivity.
   6. Unauthorized Access
           o   Attackers can gain access to internal networks via compromised mobile devices.
   7. Compliance Violations
           o   Failure to secure mobile devices can lead to violations of regulations like GDPR,
               HIPAA, etc.
Q5 (a) What is Identity Theft. How it is done and how ID Theft can be handled?
Identity Theft is a crime where someone steals another person’s personal information (like name,
Social Security number, credit card details) and uses it fraudulently—often to commit financial
fraud or other crimes in the victim’s name.
   2. Data Breaches:
           o   Hackers steal large amounts of data from companies or institutions.
   3. Skimming:
           o   Devices placed on ATMs or card readers capture card details.
   4. Stealing Mail:
           o   Thieves take bank statements, credit cards, or bills from mailboxes.
   5. Social Engineering:
           o   Manipulating people into giving away confidential information.
   7. Malware:
           o   Keyloggers or spyware capture personal info from devices.
Steganography is the art and science of hiding secret information within ordinary, non-secret
data so that the presence of the hidden data is not detectable. Unlike encryption, which scrambles
the content to make it unreadable, steganography hides the very existence of the message.
Detailed Explanation
   1. Cover Object:
         o This is the ordinary file or data in which the secret message is hidden (e.g., an
            image, audio file, or video).
   2. Secret Message:
          o   The confidential information to be concealed (could be text, another image, or any
              data).
   3. Stego Object:
          o   The resulting file after embedding the secret message into the cover object.
   4. Embedding Process:
          o   The secret message is encoded into the cover object by slightly modifying it
              without significantly changing its appearance or functionality.
          o   Example: Altering the least significant bits (LSBs) of pixel values in an image.
   5. Extraction Process:
          o   The intended recipient extracts and decodes the hidden message from the stego
              object using a specific algorithm or key.
Email (Electronic Mail) is a method of exchanging digital messages over the internet or other
computer networks. It allows users to send and receive messages, documents, images, and other
files electronically in near real-time.
Email forensics is the process of investigating and analyzing email messages and related data to
uncover evidence in cybercrime investigations, disputes, or security breaches.
1. Preservation of Evidence
     Secure and make forensic copies of the email data.
     Preserve headers, attachments, and metadata without alteration.
3. Content Examination
     Review the email body for suspicious content, links, or attachments.
     Look for signs of phishing, malware, or social engineering.
4. Attachment Analysis
     Scan attachments for malware or hidden data.
     Check file types and examine embedded macros/scripts.
5. Metadata Extraction
     Extract metadata embedded in the email or attachments.
     Metadata may include creation dates, authorship, and modification history.
6. Timeline Reconstruction
     Organize email events chronologically to understand the sequence.
     Correlate with other digital evidence to map activities.
7. Detecting Email Forgery or Spoofing
     Verify the authenticity of the sender.
     Use techniques like SPF, DKIM, and DMARC to check if the email was authorized by
       the domain owner.
Q6 (b) What are privacy threats? What are the challenges faced?
Privacy threats are risks or actions that compromise the confidentiality and control over an
individual’s or organization’s personal or sensitive information. These threats can lead to
unauthorized access, misuse, or exposure of private data.
   1. Data Breaches:
         o Unauthorized access to databases exposing personal information.
   4. Identity Theft:
          o   Stealing personal details to impersonate someone.
   6. Unsecured Networks:
          o   Data interception over open or public Wi-Fi networks.
   4. Technological Advancements:
           o   New technologies (IoT, AI) create new privacy vulnerabilities.
   6. Insider Threats:
           o   Employees or trusted parties misusing access to sensitive information.
Cyber Law refers to the legal regulations and rules that govern activities related to the internet,
computers, digital communication, and information technology. It deals with issues such as
cybercrime, electronic contracts, data protection, intellectual property rights online, and privacy.
            o   Covers cybercrimes like hacking, identity theft, cyber terrorism, and publishing
                obscene content online.
            o   Legalizes electronic signatures and digital contracts.
            o   Included new offenses like data protection violations, cyber terrorism, and child
                pornography.
   4. The Payment and Settlement Systems Act, 2007
            o   Regulates electronic payment systems to ensure secure and reliable financial
                transactions.
   5. The Copyright Act, 1957 (Amended)
            o   Protects intellectual property rights over digital content.
Table:
Cyber laws help create a safer digital environment by setting rules and penalties to deter cyber
offenses and protect citizens' rights online
Q7 (b) Give a Overview of Intellectual Property related Legislation in India.
Intellectual Property (IP) refers to creations of the mind such as inventions, literary and artistic
works, symbols, names, images, and designs used in commerce. India has enacted various laws
to protect different types of IP rights, encouraging innovation and creativity.
Summary Table:
Trade Marks Act, 1999 Brand names, logos, symbols 10 years, renewable
Copyright Act, 1957 Literary, artistic, musical works Life of author + 60 years
                                                                         10 years + 5 years
Designs Act, 2000                     Aesthetic designs of products
                                                                         extension
                                      Geographical        origin-based
Geographical Indications Act, 1999                                       10 years, renewable
                                      products