MU Computer Engineering (Semester 8)
Digital Forensics
May 2016
Total marks: --
Total time: --
INSTRUCTIONS
(1) Assume appropriate data and state your reasons
(2) Marks are given to the right of every question
(3) Draw neat diagrams wherever necessary


1(a) What is Cyber Crime? How do we classify Cyber Crimes?
5 M
1(b) What is some of the volatile information you would retrieve from a computer system before powering it off?
5 M
1(c) What is Evidence? Explain the types of Evidence.
5 M
1(d) What is DOS attack? How to achieve recovery from DOS attack?
5 M

2(a) What is digital Forensic? What are the phases of Digital Forensics process?
10 M
2(b) Define Forensic Duplicate? How you will create Forensic Duplicate of a hard drive.
10 M

3(a) Briefly explain the process of collecting the volatile data in digital forensics.
10 M
3(b) What are the steps involved in computer evidence handling? Explain in detail.
10 M

4(a) What are the tools used in Networks forensics.
10 M
4(b) Discuss the techniques of tracing an e-mail message.
10 M

5(a) Explain how law enforcement is done in computer forensics.
10 M
5(b) Worksource Private Limited is a business process outsourcing (BPO) outfit handling business process outsourcing for various clients in North America and Europe. The employees of Worksource become privy to confidential customer information during the course of their work. The nature of this information ranges from medical records of individuals to financial data of companies. The unprocessed data is transmitted from the client's location to Worksource offices in Gurgaon, Pune and Hyderabad through the Internet using VPN (Virtual Private Network) connections on broadband. Worksource allows clients to transfer information via dedicated FTP servers on the Internet, which can then be accessed and processed by its employees. Worksource, through its website, worksource.com allows its clients to log in and view billing and other information specific to them. Access to this information is restricted through the usual user name - password combination found on most websites.
Looking at the above scenario, discuss the threats Workforce faces to its information and suggest controls which it may put in place to secure its information from such Threats.
10 M

Write short note on
6(a) NTFS Disk
10 M
6(b) Windows Registry
10 M



More question papers from Digital Forensics
SPONSORED ADVERTISEMENTS