If you are looking for MSEI-027 IGNOU Solved Assignment solution for the subject Digital Forensics, you have come to the right place. MSEI-027 solution on this page applies to 2023 session students studying in PGDIS, MSCIS courses of IGNOU.
MSEI-027 Solved Assignment Solution by Gyaniversity
Assignment Code: MSEI-027/TMA/2023
Course Code: MSEI-027
Assignment Name: Digital Forensics
Year: 2023
Verification Status: Verified by Professor
Â
There are two questions in this assignment. Answer all the questions. You may use illustrations and diagrams to enhance your explanations.
Â
Question 1: Explain the various types of identity theft and data theft. (10 Marks)
Ans) Thefts of personal information and identities, often known as data theft, are severe offences that can do tremendous damage to both persons and businesses. The following is a list of the numerous types of data theft and identity theft:
 Financial Identity Theft: When somebody steals your personal information and then uses it to commit fraud or other financial crimes, this is what is known as identity theft. Personal information includes things like your name, Social Security number, and credit card information.
Medical Identity Theft: When someone steals your medical information and then uses it to seek medical treatment or prescription drugs, this is known as medical identity theft. Examples of stolen medical information include your health insurance number or medical history.
Criminal Identity Theft: When another person uses your identity to perform a crime, such as identity fraud or theft, this is known as "identity theft."
Synthetic Identity Theft: When someone commits fraud or other crimes using a new identity that they have created by combining actual and fictitious information, such as by using a legitimate Social Security number but a phoney name, this is known as "persona non grata."
Data Theft: This takes place when sensitive information, such as your login credentials, credit card information, or personal data, is taken from a website or database that you use and used by someone else.
Intellectual Property Theft: This takes place when someone steals your intellectual property, such as your patents, trademarks, or copyrights, and utilises it for their own financial advantage. Some examples of intellectual property include patents, trademarks, and copyrights.
Cyber Espionage: This happens when governments from other countries or other groups steal secret information from businesses, governments, or other institutions in order to use it for their own strategic reasons.
Insider Threats: This takes place when workers or contractors working for a business steal sensitive information for the purpose of making personal gains or selling it to the organization's rivals.
Question 2: What are the important points to be considered for E-mail investigation. (10 Marks)
Ans) Email investigations can be difficult, and they call for a methodology that is both methodical and comprehensive in order to guarantee that all pertinent material is obtained and examined. When conducting investigations using emails, the following are some crucial considerations to keep in mind:
Â
Preserve the Evidence
It is essential to maintain the integrity of the evidence connected to the email in question. This involves maintaining the email itself, in addition to any metadata associated with it, such as the information contained in the email header.
Â
Identify the Sender and Recipients
Identify the person who sent the email as well as all of the recipients. This may include tracking the email all the way back to its original source and locating any communications that were forwarded or replied to.
Â
Analyze the Content
Conduct research into the contents of the email to evaluate whether or not it contains any pertinent evidence or information. This may entail examining the tone of the message, the language used in the message, as well as any files or links that were included in the email.
Â
Examine the Attachments and Links
Examine any attachments or links that were provided in the email to see whether or not they contain any malware, viruses, or other forms of potentially harmful content.
Â
Review Email Logs
Check the email logs to see what time and date the email was sent, as well as any other information that may be pertinent to the email transmission.
Interview Witnesses
Interrogate any potential witnesses who could know something about the email. This includes the sender, the recipients, and anyone else who might have been copied on the email.
Â
Follow Applicable Laws and Regulations
Make sure that any and all email investigations are carried out in accordance with the appropriate laws and regulations, particularly those pertaining to privacy and data protection.
Â
Document the Investigation
It is important to keep a record of all parts of the inquiry into the email, including the actions followed, the evidence acquired, and the findings of the investigation.
100% Verified solved assignments from ₹ 40 written in our own words so that you get the best marks!
Don't have time to write your assignment neatly? Get it written by experts and get free home delivery
Get Guidebooks and Help books to pass your exams easily. Get home delivery or download instantly!
Download IGNOU's official study material combined into a single PDF file absolutely free!
Download latest Assignment Question Papers for free in PDF format at the click of a button!
Download Previous year Question Papers for reference and Exam Preparation for free!