0% found this document useful (0 votes)
40 views2 pages

CFS Mid2

The document discusses topics related to cyber security and forensics including precautions when collecting electronic evidence, the digital forensics process, key aspects of email investigation, recovery and tracking, cyber forensics and digital evidence, computer forensic software and hardware tools, Windows and Linux system forensics, validating forensic software, and biometric authentication methods.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
40 views2 pages

CFS Mid2

The document discusses topics related to cyber security and forensics including precautions when collecting electronic evidence, the digital forensics process, key aspects of email investigation, recovery and tracking, cyber forensics and digital evidence, computer forensic software and hardware tools, Windows and Linux system forensics, validating forensic software, and biometric authentication methods.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 2

NRI INSTITUTE OF TECHNOLOGY

Class: B.TECH (R20) Branche :CSE Mid- II

Subject: CYBER SECURITY & FORENSICS

UNIT-III

What are the precautions to be taken when collecting


1. a) electronic evidence? 2M C411.3 L1 APPLICATION

b Describe the Digital forensics process? 3M C411.3 L4 APPLICATION


)
5M
2. Briefly Explain the Key Aspects of E-mail Investigation. C411.3 L1 APPLICATION

Briefly Explain the Key Aspects of E-mail Recovery. 5M C411.3 L4 APPLICATION


3.
Briefly Explain the Key Aspects of E-mail Tracking. 5M C411.3 L4 APPLICATION
4.

UNIT-IV

1. a) Describe the Cyber forensics and Digital Evidence? 3M C411.4 L1 APPLICATION


2M
b) Explain the need for computer forensics? C411.4 L1 APPLICATION
5M
2 C411.4 L4 APPLICATION
List and Explain Computer Forensic Software Tools.

5M
3 List and Explain Computer Forensic Hardware Tools. C411.4 L4 APPLICATION

5M
Explain the Following:
4 C411.4 L1 APPLICATION
a) Windows System Forensics
b) LINUX System Forensics.

5M
Briefly Explain Steps to Validate and Test Forensic
5 C411.4 L4 APPLICATION
Software.

5M
6 Explain three Biometric Authentication Methods. C411.4 L4 APPLICATION
UNIT-V

1. Briefly Narrate about CYBER LAW 5M C411.5


L1 APPLICATION

Explain the Several Key Components involved in Legal


2 5M C411.5 L4 APPLICATION
Perspectives of Cyber Crime.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy