You are on page 1of 1

Course Title: Cyber Forensics

Course Code: No. of Credits: 3 : 0 : 0 No. of lecture


18CS732 (L-T-P) hours/week :
3
Exam Duration : 3 CIE+ Assignment + SEE Total No. of
hours = 45+5+50=100 Contact Hours :
42

Cyber Forensics Question bank UNIT-2


UNIT - 1 1. Explain briefly the four different dimensions of an organization’s security. 8M
2. Describe the various steps involved in Forensic Investigation with a neat
1. Define the term Cybercrime. Wrt Actus reas and Mensrea concepts. 5M or 8 M
Flowchart diagram. 12M
2. Explain the role of Electronic communication devices and information and
3. Briefly discuss the steps of Forensic Examination Process. 8M
communication technologies in Cybercrime. 10 M or 12 M
4. Discuss various methods employed in Forensic Analysis. 5M
3. Define Cybercriminals and Categorize them according to their level of expertise.
5. Define and classify Cyber forensics. 5M
12M or 15 M
6. Explain briefly Disk , Network and Wireless forensics. 12M
4. Elaborate on who are Cybercriminals and how they plan their attacks. 8 M
7. Discuss the various Forensic approaches and methodologies associated with
5. Define a cybercriminal and describe the phases involved in planning the
Database forensics. 12M
cybercrime. 8M
8. Define Mobile forensics and explain briefly various stages of it. 8M
6. List out case studies and preventive measures for cybercrimes against
9. Write short notes on: 10M
individuals. 12 M
a. Malware forensics
7. Explain cyber crime against property in detail. 12 M
b. Memory forensics
8. Discuss briefly Cybercrime against nation with a case study. 12 M
9. Define cyber harassment, cyber bullying and cyber stalking. Explain the
10. Discuss Email forensics using a case study. Distinguish between Email tracing
relationship among them. 8M
and Email tracking. 12M
10. List and explain the types and subtypes of computer threats.8 M
11. Compare virus, worms and Trojan horse. 8M
11. Define an Incident. Explain briefly the stages in Incident handling with a neat
12. Describe the methods of email bombing and email spamming. 8 M
diagram. 10M
13. List and explain different types of Cryptocurrencies. 10M
14. Compare and contrast between Bitcoin and Ethereum. 12 M
15. Differentiate between Deep web and Dark web. Discuss the challenges of Deep
web. 12M
16. Explain Blockchain and its transactions and list out its types. 8M
17. Discuss association between Blockchain and Bitcoin using a neat diagram. 8M

You might also like