Cyber Unit-04
Cyber Unit-04
Cyber Unit-04
Unit – 4
Punishment : 5yrs.
Punishment: 2yrs.
3) Return filing for GST– GST filing and E-filing causes the individuals to
compulsory opt for Digital Signatures.
4) Filing for Income Tax– Some corporations require the business to file the tax
all over India, thus saving the light of the day.
5) For ROC E-filing– Filing with registrar of Companies and filing for various
documents has caused enough leverage for individuals to opt for Digital
Signature.
3. It paves the way for quicker investigations and accurate results. Below are
the points depicting the importance of cyber forensics:
• Cyber forensics helps in collecting important digital evidence to trace the
criminal.
• It is also helpful for innocent people to prove their innocence via the
evidence collected online.
• It is not only used to solve digital crimes but also used to solve real-world
crimes like theft cases, murder, etc.
• Businesses are equally benefitted from cyber forensics in tracking system
breaches and finding the attackers.
Analysis
In this step, investigation agents reconstruct fragments of data and draw
conclusions based on evidence found. However, it might take numerous iterations
of examination to support a specific crime theory.
Documentation
In this process, a record of all the visible data must be created. It helps in
recreating the crime scene and reviewing it. It Involves proper documentation of
the crime scene along with photographing, sketching, and crime-scene mapping.
Presentation
This is the final step in which the analyzed data is presented in front of the court
to solve cases.
There are tools available that help create fake mails. Forensics analysis of E-
Mails is an important aspect of cyber forensics analysis it helps establish the
authenticity of an E-Mail when suspected.
Mail server software is a network server software that controls the flow of E-
Mail and the mail client software helps each user read, compose, send and
delete messages.
E-Mail tracing is done by examining the header information contained in E-Mail
messages to determine their source.
https://www.vskills.in/certification/tutorial/forensics-analysis-of-e-mail/
Issues related to acquiring, storing, and processing large amounts of data for
forensic purposes.
https://legaldesire.com/challenges-faced-by-digital-forensics/
o Technical challenges
o Legal challenges
o Resource Challenges
Unit – 5
• Encryption:
TLS/SSL can help to secure transmitted data using encryption.
• Algorithm flexibility:
TLS/SSL provides operations for authentication mechanism, encryption
algorithms and hashing algorithm that are used during the secure session.
• Ease of Deployment:
Many applications TLS/SSL temporarily on a windows server 2003
operating systems.
• Ease of Use:
Because we implement TLS/SSL beneath the application layer, most of its
operations are completely invisible to client.
IP Security.
• IPsec (Internet Protocol Security) is a collection of protocols and
algorithms for securing data transmitted over the internet or any public
network.
• Standard suite of protocols between 2 communication points across the IP
network that provide data authentication, integrity, and confidentiality. It
also defines the encrypted, decrypted and authenticated packets.
• Uses of IP Security –
IPsec can be used to do the following things:
✓ To encrypt application layer data.
✓ To provide security for routers sending routing data across the public
internet.
✓ To provide authentication without encryption, like to authenticate that
the data originates from a known sender.
✓ To protect network data by setting up circuits using IPsec tunneling in
which all data is being sent between the two endpoints is encrypted, as
with a Virtual Private Network(VPN) connection.