0% found this document useful (0 votes)
10 views3 pages

IT - T4 - BCC 301 Er. Aleesha Khan

This document is a tutorial sheet for B. Tech students at Shri Ramswaroop Memorial College of Engineering & Management, focusing on Cyber Security and Computer Forensics. It includes subjective, supplementary, and short-answer questions related to digital forensics, email analysis, network forensics, and challenges in computer forensics. Additionally, it lists references for textbooks and online resources relevant to the course.

Uploaded by

Ally Khan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
10 views3 pages

IT - T4 - BCC 301 Er. Aleesha Khan

This document is a tutorial sheet for B. Tech students at Shri Ramswaroop Memorial College of Engineering & Management, focusing on Cyber Security and Computer Forensics. It includes subjective, supplementary, and short-answer questions related to digital forensics, email analysis, network forensics, and challenges in computer forensics. Additionally, it lists references for textbooks and online resources relevant to the course.

Uploaded by

Ally Khan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

F:/Academic/27

Refer/WI/ACAD/1

SHRI RAMSWAROOP MEMORIAL COLLEGE OF ENGINEERING & MANAGEMENT

B. Tech. [SEM III (CE+ME 31-32)]


TUTORIAL SHEET-4
(Session: 2024-25)

BCC-301: Cyber Security

Unit No. & Name: IV- Understanding Course Outcome: CO4-Understand The
Computer forensics concepts of cyber
forensics

Date of Distribution: 28 DEC 2024 Name of Faculty: Er. Aleesha Khan

SUBJECTIVE QUESTIONS BL

Introduction, Digital Forensics Science, The Need for Computer Forensics, Cyber forensics and
Digital Evidence.
Q1) Analyze the Historical background of Cyber forensics. 4
Q2) Explain the need of computer forensic. 2
Q3) Describe digital evidence in computer forensic. 2

Forensics Analysis of E-Mail, Digital Forensics Life Cycle, Chain of Custody Concept

Q4) Write about Forensics analysis of E-mail. 2

Q5) Explain digital Forensics lifecycle. 2

Q6) Explain Chain of Custody with Example. 2


Network Forensics, Approaching a Computer Forensics Investigation.

Q7) Summarize Network Forensics with practical example. 2


Q8) Write about Forensics Investigations. 2

Forensics and Social Networking Sites: The Security/Privacy Threats, Challenges in Computer
Forensics.
Q9) Discuss the challenges in computer forensics. 2
Q10) Explain the techniques of computer forensics. 2

SUPPLEMENTARY QUESTIONS BL
Introduction, Digital Forensics Science, The Need for Computer Forensics, Cyber
forensics and Digital Evidence.
Q1) What constitutes digital evidence in the context of computer 4
forensics, and how does it differ from other types of evidence in
legal proceedings?

Virus and Worms, Steganography


Q2) What type of email analysis experience do you have? Explain with 2

Page 1 of 3
example.

SHORT-ANSWER TYPE QUESTIONS BL

Introduction, Digital Forensics Science, The Need for Computer Forensics, Cyber forensics and
Digital Evidence.
Q1) Define the term forensics. 1
Q2) What do you mean by digital? 1
Q3) Define evidence. 1
Forensics Analysis of E-Mail, Digital Forensics Life Cycle, Chain of Custody Concept
Q4) What is E-Mail? 1
Q5) What is DF life cycle?
Q6) Define digital forensics. 1
Network Forensics, Approaching a Computer Forensics Investigation.
Q7) What are the main function of network? 1
Q8) What do you mean by investigation? 1
Forensics and Social Networking Sites: The Security/Privacy Threats, Challenges in Computer Forensics.
Q9) Define the privacy. 1
Q10) Write two names of social networking sites . 1

CROSSWORD-PUZZLE BL
1

Page 2 of 3
Across Down
5. Interprets and routs incoming radio frequencies. 1. Node that requests and uses resources available from
8. Any device that is connected to a network other nodes
9. Continuous electronic waves. 2. Short range wireless communication standard.
10. Each device in the network handles its own 3. Transfer speed or transfer rate.
communications. 4. 3 Device that allows links between LANs.
11. Network interface card. 6. Process that converts digital to analog. modulation
12. Measurement of the width of the communication 7. Pieces of a message sent over the Internet.
channel. 13. Uses existing telephone lines to provide high-speed
16. Configuration of a network. connections.
14. Central node for other nodes.
15. Global positioning system.

REFERENCES

TEXT BOOKS:
No. of Books
Ref. Edition &Year of
Authors Book Title Publisher/Press Available in
[ID] Publication Library
Sunit Belapure and Cyber Security: 05
Wiley India Pvt Ltd 4th
[T1] Nina Godbole Understanding Cyber Ed.,2013
Crimes
Basta, Basta, Brown, Cyber Security and Cyber 10
Cengage Learning 2nd
[T2] Kumar Laws Ed.,2004
publication
REFERENCE BOOKS:
Ref. Edition &Year of
Authors Book Title Publisher/Press
[ID] Publication
Introduction to DreamtechPress 130
Dr. S.P.
information Security and 1st
[R1] Tripathi,RetendrP.K. Ed.,2015
Cyber Laws
Shykla Goyal, p
ONLINE/DIGITALREFERENCES:
Ref.
Source Name Source Hyperlink
[ID]
[D1] NPTEL https://www.youtube.com/watch?v=KqSqyKwVuA8

…………………. X………………….

Signature of Faculty: _ Signature of HOD:


(With Date) (With Date)

Page 3 of 3

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy