You are on page 1of 4

JUSTICE BASHEER AHMED SAYEED COLLEGE FOR WOMEN

DEPARTMENT OF BATCHELOR OF COMPUTER APPLICATIONS


CORE THEORY 3
COURSE NAME: CYBER FORENSIC
CREDITS: 4
COURSE CODE: INSTRUCTIONAL HRS:75 Hours
COURSE OBJECTIVES:

1. Define and discuss the concepts of computer forensics.


2. Identify and apply Evidence Collection and Data Seizure.
3. Analysis of Computer Forensics

UNIT- 1 (15Hrs)
Part I-Overview of Computer Forensics Technology
Computer Forensics Fundamentals: What is Computer Forensics?, Use of
Computer Forensics in Law Enforcement, Computer Forensics Assistance to Human
Resources/Employment Proceedings, Computer Forensics Services, Benefits of
professional Forensics Methodology, Steps taken by Computer Forensics Specialists.
Types of Computer Forensics Technology: Types of Business Computer Forensic,
Technology-Types of Military Computer Forensic Technology-Types of Law
Enforcement-Computer Forensic Technology-Types of Business Computer Forensic
Technology.

UNIT- 2
(15Hrs)
Part II-Computer Forensics Evidence and capture
Data Recovery: Data Recovery Defined, Data Back-up and Recovery, The Role of
Back -up in Data Recovery, The Data -Recovery Solution.
Evidence Collection and Data Seizure: Collection Options, Obstacles, Types of
Evidence, The Rules of Evidence, Volatile Evidence, General Procedure, Collection
and Archiving, Methods of Collections, Artefacts, Collection Steps, Controlling
Contamination: The chain of custody.

UNIT- 3
(15Hrs) Duplication and Preservation of Digital Evidence: Preserving the Digital
Crime Scene, Computer Evidence processing steps, Legal Aspects of collecting and
Preserving Computer forensic Evidence.
Computer image Verification and Authentication: Special needs of Evidential
Authentication, Practical Consideration, Practical Implementation.

UNIT- 4
(15Hrs)
Part III: Computer Forensics Analysis
Discovery of Electronic Evidence: Electronic Document Discovery: A Powerful
New Litigation Tool.
Identification of Data: Time Travel, Forensic Identification and Analysis Of
Technical Surveillance Devices.

UNIT- 5
(15Hrs)
Reconstructing Past Events: How To Become A Digital Detective, Useable File
Formats, Unusable File Formats, Converting Files
Networks: Network Forensics Scenario, A Technical Approach, Destruction Of E-
Mail, Damaging Computer Evidence, Documenting The Intrusion On Destruction Of
Data, System Testing

SELF STUDY / EXPERENTIAL LEARNING


1.What are the different tools used for cyber forensic?

2.Explain briefly

1. Network Forensics
2. Mobile Device Forensics
3. Live Forensics.
4. Memory Forensics
5. Multimedia Forensics
6. Internet Forensics

TEXT BOOKS:
1.Computer Forensics, Computer Crime Investigation by John R. Vacca,
Firewall Media, New Delhi, 2002.

REFERENCE BOOKS:
1. Computer Forensics and Investigations by Nelson, Phillips Enfinger,
Steuart, CENGAGE Learning,2004.
2. Forensic Computing: A Practitioner's Guide, Anthony Sammes and Brian
Jenkinson ,Second Edition, Springer-Verlag London Limited, 2007
3. Software Forensics Collecting Evidence from the Scene of a Digital Crime
by Robert M.Slade ,TMH 2005

ONLINE RESOURCES:
1. https://flylib.com/books/en/3.394.1/
2. https://onlinecourses.swayam2.ac.in/aic20_sp06/preview
3. https://onlinecourses.swayam2.ac.in/arp19_ap79/preview

COURSE OUTCOMES

On the completion of the course, student will be able to


# Course Outcome Knowledg
e Level
CO Understand the definition of computer K2
1 forensics fundamentals.
CO2 Evaluate the different types of computer K5
forensics technology
CO3 Analyze various computer forensics systems. K4
CO4 Apply the methods for data recovery, K3
evidence collection and data seizure
CO5 Gain your knowledge duplication and K1
preservation of digital evidence.

K1-Knowledge, K2-Understand, K3-Apply, K4-Analyze


CO-PSO Mapping Matrix

# PSO1 PSO2 PSO3 PSO4 PSO5


CO1 3 3 1 1 1
CO2 3 3 3 3 3
CO3 3 3 3 3 3
CO4 3 3 3 3 3
CO5 3 3 3 3 3
Average 3 3 2.6 2.6 2.6

METHODOLOGY OF TEACHING:
CHALK & TALK
STUDENT ASSIGNMENT
WEB RESOURCES
LCD/SMART BOARD
STUDENT SEMINARS
GOOGLE CLASSROOM

You might also like