IT - T4 - BCC 301 Er. Aleesha Khan
IT - T4 - BCC 301 Er. Aleesha Khan
Refer/WI/ACAD/1
Unit No. & Name: IV- Understanding Course Outcome: CO4-Understand The
Computer forensics concepts of cyber
forensics
SUBJECTIVE QUESTIONS BL
Introduction, Digital Forensics Science, The Need for Computer Forensics, Cyber forensics and
Digital Evidence.
Q1) Analyze the Historical background of Cyber forensics. 4
Q2) Explain the need of computer forensic. 2
Q3) Describe digital evidence in computer forensic. 2
Forensics Analysis of E-Mail, Digital Forensics Life Cycle, Chain of Custody Concept
Forensics and Social Networking Sites: The Security/Privacy Threats, Challenges in Computer
Forensics.
Q9) Discuss the challenges in computer forensics. 2
Q10) Explain the techniques of computer forensics. 2
SUPPLEMENTARY QUESTIONS BL
Introduction, Digital Forensics Science, The Need for Computer Forensics, Cyber
forensics and Digital Evidence.
Q1) What constitutes digital evidence in the context of computer 4
forensics, and how does it differ from other types of evidence in
legal proceedings?
Page 1 of 3
example.
Introduction, Digital Forensics Science, The Need for Computer Forensics, Cyber forensics and
Digital Evidence.
Q1) Define the term forensics. 1
Q2) What do you mean by digital? 1
Q3) Define evidence. 1
Forensics Analysis of E-Mail, Digital Forensics Life Cycle, Chain of Custody Concept
Q4) What is E-Mail? 1
Q5) What is DF life cycle?
Q6) Define digital forensics. 1
Network Forensics, Approaching a Computer Forensics Investigation.
Q7) What are the main function of network? 1
Q8) What do you mean by investigation? 1
Forensics and Social Networking Sites: The Security/Privacy Threats, Challenges in Computer Forensics.
Q9) Define the privacy. 1
Q10) Write two names of social networking sites . 1
CROSSWORD-PUZZLE BL
1
Page 2 of 3
Across Down
5. Interprets and routs incoming radio frequencies. 1. Node that requests and uses resources available from
8. Any device that is connected to a network other nodes
9. Continuous electronic waves. 2. Short range wireless communication standard.
10. Each device in the network handles its own 3. Transfer speed or transfer rate.
communications. 4. 3 Device that allows links between LANs.
11. Network interface card. 6. Process that converts digital to analog. modulation
12. Measurement of the width of the communication 7. Pieces of a message sent over the Internet.
channel. 13. Uses existing telephone lines to provide high-speed
16. Configuration of a network. connections.
14. Central node for other nodes.
15. Global positioning system.
REFERENCES
TEXT BOOKS:
No. of Books
Ref. Edition &Year of
Authors Book Title Publisher/Press Available in
[ID] Publication Library
Sunit Belapure and Cyber Security: 05
Wiley India Pvt Ltd 4th
[T1] Nina Godbole Understanding Cyber Ed.,2013
Crimes
Basta, Basta, Brown, Cyber Security and Cyber 10
Cengage Learning 2nd
[T2] Kumar Laws Ed.,2004
publication
REFERENCE BOOKS:
Ref. Edition &Year of
Authors Book Title Publisher/Press
[ID] Publication
Introduction to DreamtechPress 130
Dr. S.P.
information Security and 1st
[R1] Tripathi,RetendrP.K. Ed.,2015
Cyber Laws
Shykla Goyal, p
ONLINE/DIGITALREFERENCES:
Ref.
Source Name Source Hyperlink
[ID]
[D1] NPTEL https://www.youtube.com/watch?v=KqSqyKwVuA8
…………………. X………………….
Page 3 of 3