NAME- Arghya Mishra
Semester – 3rd
Year – 2nd
Subject – Computer science
Subject code – BSFS304
Roll No- 2006BSCFS07049
Shri Vaishnav Institute of Forensic Science
ASSIGNMENT 2
Q1. Explain Search Engine and
Types of Portals.
Ans- A Search engine is a service that
allows Internet users to search for content
via the World Wide Web (WWW). A user
enters keywords or key phrases into a
search engine and receives a list of Web
content results in the form of websites,
images, videos or other online data.
A search engine is a web-based tool that
enables users to locate information on the
World Wide Web. Popular examples of
search engines are Google,
A web portal is most often one
specially-designed Web page at a
website which brings information
together from diverse sources in a
uniform way. Usually, each information
source gets its dedicated area on the page
for displaying information; often, the
user can configure which ones to display.
ii. A portal may use a search engine
API to permit users to search intranet
content as opposed to extranet content
by restricting which domains may be
searched. Apart from this common
search engines feature, web portals
may offer other services such as e-mail,
news, stock quotes, information from
databases and even entertainment
content.
Types of Portals:
The portals can be differentiated on the
basis of their content and intended
users. There are different types of
portals; it is important to know what
type of portal you want to build. They
can be categorized into:
i. Vertical Portal: These are web portals
which focus only on one specific
industry, domain or vertical. Vertical
portals provide tools, information,
articles, research and statistics on the
specific industry or vertical. As the web
has become a standard tool for
business. There are innumerable
possibilities for establishing special
vertical portals on the market. A
vertical portal covers a particular
market such as construction with news
and other services.
Examples:
Construction Plus
(www.constructionplus.com)
Chem Industry
(www.chemindustry.com)
ii. Horizontal Portal: These are web
portals which focus on a wide array of
interests and topics. They focus on
general audience and try to present
something for everybody. Horizontal
portals try act as an entry point of a
web surfer into the internet, providing
content on the topic of interest and
guiding towards the right direction to
fetch more related resources and
information.
Examples:
Yahoo (www.yahoo.com)
MSN (www.msn.com)
iii. Marketplace portals: Market space
portals exist to support the business-to-
business and business-to-customer e-
commerce, software support for e-
commerce transactions and ability to
find and access rich information about
the products on sale also, ability to
participate in discussion groups with
other vendors and/or buyers. They may
be vertical, horizontal or geographical
in type.
Example:
EC21 (www.ec21.com)
eBay (www.eBay.com)
iv. Search portals: Search portals
aggregate results from several search
engines into one page. Here the main
focus is on search.
Example:
Google (www.google.com)
Ask Jeeves (www.ask.com) . v. Media
Portals: Media portals focus on
entertainment, business or consumer
news. Popular media portals update
users on current news, affairs and
information. Some media portals
provide access to local and foreign TV
programs such as soap operas, sports
and live events.
Examples:
BBC (www.bbc.co.uk)
Guardian (www.guardian.co.uk)
vi. Access Portal: Access portal can be
defined as a type of portal associated
with Internet Service Provider (ISP).
Examples:
Wanadoo (www.wanadoo.com) and
now (www.orange.co.uk)
AOL (www.aol.com)
vii. Geographical Portals: Geographical
portal can be either horizontal or
vertical portal.
Examples:
Craiglist (www.craiglist.com)
Countyweb (www.countyweb.com)
Q2. Explain SSC and POP
protocols.
Ans- SSC: Single Socket
Communications Protocol
The SSC protocol uses a
client/server pattern to establish
and maintain communication
channels. A centralized server
manages all the conversations
which run between the various
clients. The clients establish a
single connection with the server
and then all their communications
is done over that link.
This protocol plug-in module
allows full, two-way, synchronous
and asynchronous, multi-
conversation communications
over a single socket pair. It is
primarily used when an IP
connection may only be made in
one direction but full duplex
communications is required. This
is the case with mobile phones
where typically an IP call may
only be made from the phone to
an IP address but not from a host
on the Internet to the phone.
The SSC protocol uses a
client/server pattern to establish
and maintain communication
channels. A centralised server
manages all the conversations
which run between the various
clients. The clients establish a
single connection with the server
and then all their communications
is done over that link.
Conversations may be established
by one client to another by
making a "connection" to the
client by name. The server
handles all the routing, and error
handling transparently to the
clients.
Post Office Protocol (POP)-
A protocol used to retrieve e-mail
from a mail server. Most e-mail
applications use the POP protocol.
Post Office Protocol (POP) is a
type of computer networking and
Internet standard protocol that
extracts and retrieves email from
a remote mail server for access by
the host machine.
Post Office Protocol is the primary
protocol behind email
communication. POP works
through a supporting email
software client that integrates
POP for connecting to the remote
email server and downloading
email messages to the recipient’s
computer machine.
POP uses the TCP/IP protocol
stack for network connection and
works with Simple Mail Transfer
Protocol (SMTP) for end-to-end
email communication, where POP
pulls messages and SMTP pushes
them to the server. As of 2012,
Post Office Protocol is in its third
version known as POP 3 and is
commonly used in most email
client/server communication
architecture. POP is a limited
protocol that allows an email
program to only download
messages to a computer or device,
with an option to keep a copy on the
server for future download. While
POP lets email programs track
retrieved messages, sometimes this
process fails, and messages might
download again.
Q3. Explain Threats, Virus, and Trojans.
Ans- Threat: potential occurrence that
can have an undesired effect on the
system . A cyber or cybersecurity
threat is a malicious act that seeks to
damage data, steal data, or disrupt
digital life in general. Cyber threats
include computer viruses, data
breaches, Denial of Service (DoS)
attacks, and other attack vectors.
Cyber threats also refer to the
possibility of a successful cyber
attack that aims to gain unauthorized
access, damage, disrupt, or steal an
information technology asset,
computer network, intellectual property
or any other form of sensitive data.
Cyber threats can come from within an
organization by trusted users or from
remote locations by unknown parties.
VIRUSES- A computer virus, much like
a flu virus, is designed to spread from
host to host and has the ability to
replicate itself. Similarly, in the same
way that flu viruses cannot reproduce
without a host cell, computer viruses
cannot reproduce and spread without
programming such as a file or
document.
In more technical terms, a computer
virus is a type of malicious code or
program written to alter the way a
computer operates and is designed to
spread from one computer to another.
A virus operates by inserting or
attaching itself to a legitimate program
or document that supports macros in
order to execute its code. In the
process, a virus has the potential to
cause unexpected or damaging
effects, such as harming the system
software by corrupting or destroying
data.
TROJANS-
A Trojan horse, or Trojan, is a type of
malicious code or software that looks
legitimate but can take control of your
computer. A Trojan is designed to
damage, disrupt, steal, or in general
inflict some other harmful action on
your data or network.
A Trojan acts like a bona fide
application or file to trick you. It seeks
to deceive you into loading and
executing the malware on your device.
Once installed, a Trojan can perform
the action it was designed for.
A Trojan is sometimes called a Trojan
virus or a Trojan horse virus, but that’s
a misnomer. Viruses can execute and
replicate themselves. A Trojan cannot.
A user has to execute Trojans. Even
so, Trojan malware and Trojan virus
are often used interchangeably.
Whether you prefer calling it Trojan
malware or a Trojan virus, it’s smart to
know how this infiltrator works and
what you can do to keep your devices
safe.
1. Explain different types of
Scheduling
Ans -Scheduling is
fundamental to computation
itself, and an intrinsic part of
the execution model of a
computer system; the
concept of scheduling makes
it possible to have computer
multitasking with a
single central processing
unit (CPU).
In computer, scheduling is the action
of assigning resources to
perform tasks. The resources may
be processors, network
links or expansion cards.
The tasks may
be threads, processes or data flows.
The scheduling activity is carried out
by a process called scheduler.
Schedulers are often designed so as to
keep all computer resources busy (as
in load balancing), allow multiple users
to share system resources effectively,
or to achieve a target quality-of-
service.
Types of scheduling are –
Long-term scheduling-
The long-term scheduler, or admission
scheduler, decides which jobs or
processes are to be admitted to
the ready queue (in main memory);
that is, when an attempt is made to
execute a program, its admission to
the set of currently executing
processes is either authorized or
delayed by the long-term scheduler.
Thus, this scheduler dictates what
processes are to run on a system, and
the degree of concurrency to be
supported at any one time – whether
many or few processes are to be
executed concurrently, and how the
split between I/O-intensive and CPU-
intensive processes is to be handled.
The long-term scheduler is responsible
for controlling the degree of
multiprogramming.
Medium-term scheduling
The medium-term
scheduler temporarily removes
processes from main memory and
places them in secondary memory
(such as a hard disk drive) or vice
versa, which is commonly referred to
as "swapping out" or "swapping in"
(also incorrectly as "paging out" or
"paging in"). The medium-term
scheduler may decide to swap out a
process which has not been active for
some time, or a process which has a
low priority, or a process which is page
faulting frequently, or a process which
is taking up a large amount of memory
in order to free up main memory for
other processes, swapping the process
back in later when more memory is
available, or when the process has
been unblocked and is no longer
waiting for a resource.
Short-term scheduling
The short-term scheduler (also known
as the CPU scheduler) decides which
of the ready, in-memory processes is
to be executed (allocated a CPU) after
a clock interrupt, an I/O interrupt, an
operating system call or another form
of signal. Thus the short-term
scheduler makes scheduling decisions
much more frequently than the long-
term or mid-term schedulers – a
scheduling decision will at a minimum
have to be made after every time slice,
and these are very short. This
scheduler can be preemptive, implying
that it is capable of forcibly removing
processes from a CPU when it decides
to allocate that CPU to another
process, or non-preemptive (also
known as "voluntary" or "co-
operative"), in which case the
scheduler is unable to "force"
processes off the CPU.
A preemptive scheduler relies upon
a programmable interval timer which
invokes an interrupt handler that runs
in kernel mode and implements the
scheduling function.
Q5. Explain different Data types.
Ans- In computing, data
is information that has been translated
into a form that is efficient for
movement or processing. Relative to
today's computers and transmission
media, data is information converted
into binary digital form. It is acceptable
for data to be used as a singular
subject or a plural subject. Raw data is
a term used to describe data in its
most basic digital format.
The different types of datas are-
1. Boolean 2. integer 3. floating-point
number 4. character 5. and
alphanumeric string
1. In computer science, a boolean
or bool is a data type with two
possible values: true or false. It
is named after the English
mathematician and logician
George Boole, whose algebraic
and logical systems are used in
all modern digital computers.
A boolean operator, or logical
operator, consists of operators such
as AND, OR, NOT, NOR, NAND,
and XOR. These operators are
used with conditional statements in
programming, search engines,
algorithms, and formulas.
2. The INTEGER data type stores
whole numbers that range from
-2,147,483,647 to 2,147,483,647
for 9 or 10 digits of precision.
The number 2,147,483,648 is a
reserved value and cannot be used.
The INTEGER value is stored as a
signed binary integer and is
typically used to store counts,
quantities, and so on.
Arithmetic operations and sort
comparisons are performed more
efficiently on integer data than on float
or decimal data. INTEGER columns,
however, cannot store absolute values
beyond (231-1). If a data value lies
outside the numeric range of
INTEGER, the database server does
not store the value.INTEGER data
types require 4 bytes of storage per
value.
3. Floating point number- In
computer science, a float is a
data type composed of a
number that is not an integer,
because it includes a fraction
represented in decimal
format. ... Some point out that
the float data type is used in
computer programming when
more precision is needed than
what integers can provide.
4. Character- Character data types
are strings of characters. Upper
and lower case alphabetic
characters are accepted literally.
There is one fixed-length
character data type: char, and
two variable-length character
data types: varchar and long
varchar.
The maximum length of a character
column cannot exceed 32,000
bytes for a non-UTF-8 installation
and 16,000 bytes for a UTF-8
installation.
5. Alphanumeric string-
Alphanumeric data entry is when
a person types data that is made
of numbers and letters into a
computer. They are typically
entering this data into a
database or spreadsheets. For
example, a secretary may type a
person's address, which
includes both numbers and
letters, into their database. Here
are some samples addresses
that contain alphanumeric
characters:
701 Market Dr.
396 Data Ave.
1149 Entry St.
Since alphanumeric data entry
typically includes sensitive data
such as addresses, emails,
identification numbers and
passwords, the person entering
them must have high-level
typing skills to prevent errors.
Q6. Define Cyber Crime.
Ans-
Cyber crime is not an old sort of crime
to the world. It is defined as any
criminal activity which takes place on
or over the medium of computers or
internet or other technology recognised
by the Information Technology Act.
Cyber crime is the most prevalent
crime playing a devastating role in
Modern India. Not only the criminals
are causing enormous losses to the
society and the government but are
also able to conceal their identity to a
great extent. There are number of
illegal activities which are committed
over the internet by technically skilled
criminals. Taking a wider interpretation
it can be said that, Cyber crime
includes any illegal activity where
computer or internet is either a tool or
target or both. The term cyber crime
may be judicially interpreted in some
judgments passed by courts in India,
however it is not defined in any act or
statute passed by the Indian
Legislature. Cyber crime is an
uncontrollable evil having its base in
the misuse of growing dependence on
computers in modern life. Usage of
computer and other allied technology
in daily life is growing rapidly and has
become an urge which facilitates user
convenience. It is a medium which is
infinite and immeasurable. Whatsoever
the good internet does to us, it has its
dark sides too.1 Some of the newly
emerged cybercrimes are cyber-
stalking, cyber-terrorism, e-mail
spoofing, e-mail bombing, cyber
pornography, cyberdefamation etc.
Some conventional crimes may also
come under the category of
cybercrimes if they are committed
through the medium of computer or
Internet.
Q7. Explain types of Cyber Crimes.
Ans- The types of cyber crimes are –
1. Hacking
2. Virus dissemination
3. Logic bombs
4. Denial-of-Service attack
5. Phishing
6. Email bombing and spamming
7. Web jacking
8. Cyber stalking
9. Data diddling
10. Identity Theft and Credit Card Fraud
11. Salami slicing attack
12. Software Piracy
13. Others
1.Hacking-
, hacking is an act committed by an
intruder by accessing your computer
system without your permission. Hackers
(the people doing the ‘hacking’) are
basically computer programmers, who
have an advanced understanding of
computers and commonly misuse this
knowledge for devious reasons. They’re
usually technology buffs who have expert-
level skills in one particular software
program or language.
2. Virus dissemination - Viruses are
computer programs that attach
themselves to or infect a system
or files, and have a tendency to
circulate to other computers on a
network. They disrupt the
computer operation and affect the
data stored – either by modifying
it or by deleting it altogether.
“Worms” unlike viruses don’t need
a host to cling on to. They merely
replicate until they eat up all
available memory in the system.
The term “worm” is sometimes
used to mean selfreplicating
“malware” (MALicious softWARE).
These terms are often used
interchangeably in the context of
the hybrid viruses/worms that
dominatehe current virus
scenario.
3. Logic bombs- A logic bomb, also
known as “slag code”, is a
malicious piece of code which is
intentionally inserted into software
to execute a malicious task when
triggered by a specific event. It’s
not a virus, although it usually
behaves in a similar manner. It is
stealthily inserted into the
program where it lies dormant
until specified conditions are met.
Malicious software such as
viruses and worms often contain
logic bombs which are triggered at
a specific payload or at a
predefined time.
4. Denial-of-Service attack- A
Denial-of-Service (DoS) attack is
an explicit attempt by attackers to
deny service to intended users of
that service. It involves flooding a
computer resource with more
requests than it can handle
consuming its available bandwidth
which results in server overload.
This causes the resource (e.g. a
web server) to crash or slow down
significantly so that no one can
access it. Using this technique,
the attacker can render a web site
inoperable by sending massive
amounts of traffic to the targeted
site.
5. Phishing- This a technique of
extracting confidential information
such as credit card numbers and
username password combos by
masquerading as a legitimate
enterprise. Phishing is typically
carried out by email spoofing.
You’ve probably received email
containing links to legitimate
appearing websites
6. Email bombing and spamming-
Email bombing is characterised by an
abuser sending huge volumes of
email to a target address resulting in
victim’s email account or mail servers
crashing. The message is
meaningless and excessively long in
order to consume network resources.
If multiple accounts of a mail server
are targeted, it may have a denial-of-
service impact. Such mail arriving
frequently in your inbox can be easily
detected by spam filters. Email
bombing is commonly carried out
using botnets (private internet
connected computers whose security
has been compromised by malware
and under the attacker’s control) as a
DDoS attack. This type of attack is
more difficult to control due to
multiple source addresses and the
bots which are programmed to send
different messages to defeat spam
filters. “Spamming” is a variant of
email bombing. Here unsolicited bulk
messages are sent to a large number
of users, indiscriminately. Opening
links given in spam mails may lead
you to phishing web sites hosting
malware. Spam mail may also have
infected files as attachments. Email
spamming worsens when the
recipient replies to the email causing
all the original addressees to receive
the reply. Spammers collect email
addresses from customer lists,
newsgroups, chat-rooms, web sites
and viruses which harvest users’
address books, and sell them to
other spammers as well. A large
amount of spam is sent to invalid
email addresses.
7. Web jacking- Web jacking derives
its name from “hijacking”. Here,
the hacker takes control of a web
site fraudulently. He may change
the content of the original site or
even redirect the user to another
fake similar looking page
controlled by him. The owner of
the web site has no more control
and the attacker may use the web
site for his own selfish interests.
Cases have been reported where
the attacker has asked for
ransom, and even posted
obscene material on the site. The
web jacking method attack may
be used to create a clone of the
web site, and present the victim
with the new link saying that the
site has moved. Unlike usual
phishing methods, when you
hover your cursor over the link
provided, the URL presented will
be the original one, and not the
attacker’s site. But when you click
on the new link, it opens and is
quickly replaced with the
malicious web server. The name
on the address bar will be slightly
different from the original website
that can trick the user into thinking
it’s a legitimate site. For example,
“gmail” may direct you to “gmai1”.
Notice the one in place of ‘L’. It
can be easily overlooked.
8. Cyber stalking-
Cyber stalking is a new form of
internet crime in our society when a
person is pursued or followed online.
A cyber stalker doesn’t physically
follow his victim; he does it virtually
by following his online activity to
harvest information about the stalkee
and harass him or her and make
threats using verbal intimidation. It’s
an invasion of one’s online privacy.
Cyber stalking uses the internet or
any other electronic means and is
different from offline stalking, but is
usually accompanied by it. Most
victims of this crime are women who
are stalked by men and children who
are stalked by adult predators and
pedophiles. Cyber stalkers thrive on
inexperienced web users who are not
well aware of netiquette and the rules
of internet safety. A cyber stalker
may be a stranger, but could just as
easily be someone you know.
9. Data diddling-
Data Diddling is unauthorised altering
of data before or during entry into a
computer system, and then changing
it back after processing is done.
Using this technique, the attacker
may modify the expected output and
is difficult to track. In other words, the
original information to be entered is
changed, either by a person typing in
the data, a virus that’s programmed
to change the data, the programmer
of the database or application, or
anyone else involved in the process
of creating, recording, encoding,
examining, checking, converting or
transmitting data.
10. Identity Theft and Credit Card
-Fraud Identity theft occurs when
someone steals your identity and
pretends to be you to access
resources such as credit cards,
bank accounts and other benefits
in your name. The imposter may
also use your identity to commit
other crimes. “Credit card fraud” is
a wide ranging term for crimes
involving identity theft where the
criminal uses your credit card to
fund his transactions. Credit card
fraud is identity theft in its simplest
form. The most common case of
credit card fraud is your pre-
approved card falling into
someone else’s hands
11. Salami slicing attack A “salami
slicing attack” or “salami fraud” is
a technique by which cyber-
criminals steal money or
resources a bit at a time so that
there’s no noticeable difference in
overall size. The perpetrator gets
away with these little pieces from
a large number of resources and
thus accumulates a considerable
amount over a period of time. The
essence of this method is the
failure to detect the
misappropriation. The most
classic approach is “collect-the-
roundoff” technique. Most
calculations are carried out in a
particular currency are rounded
off up to the nearest number
about half the time and down the
rest of the time. If a programmer
decides to collect these excess
fractions of rupees to a separate
account, no net loss to the system
seems apparent. This is done by
carefully transferring the funds
into the perpetrator’s account.
12. Software Piracy-
Software piracy is the unauthorised
use and distribution of computer
software. Software developers work
hard to develop these programs, and
piracy curbs their ability to generate
enoughrevenue to sustain application
development. This affects the whole
global economy as funds are relayed
from other sectors which results in
less investment in marketing and
research. The following constitute
software piracy: Loading unlicensed
software on your PC Using single-
licensed software on multiple
computers Using a key generator to
circumvent copy protection
Distributing a licensed or unlicensed
(“cracked”) version of software over
the internet and offline
12. Others - So far we’ve discussed
the dedicated methods of
committing cyber crimes. In a
nutshell, any offence committed
using electronic means such as
net extortion, cyber bullying, child
pornography and internet fraud is
termed as cyber crime. The
internet is a huge breeding ground
for pornography, which has often
been subject to censorship on
grounds of obscenity. But what
may be considered obscene in
India, might not be considered so
in other countries. Since every
country has a different legal stand
on this subject matter,
pornography is rampant online.
However, according to the Indian
Constitution, largely, pornography
falls under the category of
obscenity and is punishable by
law. Child pornography is a
serious offence, and can attract
the harshest punishments
provided for by law. Pedophiles
lurk in chat rooms to lure children.
The internet allows long-term
victimisation of such children,
because the pictures once put up,
spread like wild-fire, and may
never get taken down completely.
Internet crimes against children
are a matter of grave concern,
and are being addressed by the
authorities, but this problem has
no easy solution.
Q8. Define nature of digital evidence.
Ans-
Digital evidence is conceptually the
same as any other evidence—it is
information leveraged in an attempt
to place people and events within
time and space to establish causality
for criminal incidents. However,
digital evidence has a wider scope,
can be more personally sensitive, is
mobile, and requires different training
and tools compared with physical
evidence. This section incorporates a
general classification system to
understand types of digital evidence
and techniques for extracting data
from digital devices. Digital evidence
is “information and data of value to
an investigation that is stored on,
received, or transmitted by an
electronic device” (National Institute
of Justice [NIJ], 2008).1 While such
evidence has existed for decades in
limited forms, such as mainframe
computers and telephonic systems,
the importance of processing digital
evidence has increased with the
rapid proliferation of personal
electronic devices. The 21st century
has been partially defined by
advances in portable music players,
cell phones, and computing devices.
The U.S. Supreme Court recently
noted that cell phones are not simply
communication devices, but rather
microcomputers that can serve as a
telephone, calendar, diary, and email
system; the “element of
pervasiveness that characterizes”
modern technology (see the
discussion of Riley v California later
in this section) results in three
characteristics central to
understanding how digital evidence
differs from traditional physical
records and evidence: (1) Digital
evidence has a wider scope, (2) it
deals with both physically and
personally sensitive information, and
(3) it taps into interconnected criminal
justice issues that go beyond law
enforcement’s typical role in
collecting evidence.