You are on page 1of 2

NRI INSTITUTE OF TECHNOLOGY

Class: B.TECH (R20) Branche :CSE Mid- II

Subject: CYBER SECURITY & FORENSICS

UNIT-III

What are the precautions to be taken when collecting


1. a) electronic evidence? 2M C411.3 L1 APPLICATION

b Describe the Digital forensics process? 3M C411.3 L4 APPLICATION


)
5M
2. Briefly Explain the Key Aspects of E-mail Investigation. C411.3 L1 APPLICATION

Briefly Explain the Key Aspects of E-mail Recovery. 5M C411.3 L4 APPLICATION


3.
Briefly Explain the Key Aspects of E-mail Tracking. 5M C411.3 L4 APPLICATION
4.

UNIT-IV

1. a) Describe the Cyber forensics and Digital Evidence? 3M C411.4 L1 APPLICATION


2M
b) Explain the need for computer forensics? C411.4 L1 APPLICATION
5M
2 C411.4 L4 APPLICATION
List and Explain Computer Forensic Software Tools.

5M
3 List and Explain Computer Forensic Hardware Tools. C411.4 L4 APPLICATION

5M
Explain the Following:
4 C411.4 L1 APPLICATION
a) Windows System Forensics
b) LINUX System Forensics.

5M
Briefly Explain Steps to Validate and Test Forensic
5 C411.4 L4 APPLICATION
Software.

5M
6 Explain three Biometric Authentication Methods. C411.4 L4 APPLICATION
UNIT-V

1. Briefly Narrate about CYBER LAW 5M C411.5


L1 APPLICATION

Explain the Several Key Components involved in Legal


2 5M C411.5 L4 APPLICATION
Perspectives of Cyber Crime.

You might also like