JNTUH B.Tech 4th year (4-1) Computer Forensics gives you detail information of Computer Forensics (Elective – II) R13 syllabus It will be help full to understand you complete curriculum of the year.
Objectives
- A brief explanation of the objective is to provide digital evidences which are obtained from digital media.
- In order to understand the objectives of computer forensics, first of all, people have to recognize the different roles computer plays in a certain crime.
- According to a snippet from the United States Security Service, the functions computer has in different kinds of crimes.
UNIT—I
Computer Forensics Fundamentals: What is Computer Forensics?, Use of Computer Forensics in Law Enforcement, Computer Forensics Assistance to Human Resources/Employment Proceedings, Computer Forensics Services, Benefits of Professional Forensics Methodology, Steps taken by Computer Forensics Specialists Types of Computer Forensics Technology: Types of Military Computer Forensic Technology, Types of Law Enforcement — Computer Forensic Technology — Types of Business Computer Forensic Technology Computer Forensics Evidence and Capture: Data Recovery Defined — Data Back-up and Recovery — The Role of Back-up in Data Recovery — The Data-Recovery Solution.
UNIT-II
Evidence Collection and Data Seizure: Why Collect Evidence? Collection Options — Obstacles — Types of Evidence — The Rules of Evidence — Volatile Evidence — General Procedure — Collection and Archiving — Methods of Collection — Artifacts — Collection Steps — Controlling Contamination: The Chain of Custody Duplication and Preservation of Digital Evidence: Preserving the Digital Crime Scene — Computer Evidence Processing Steps — Legal Aspects of Collecting and Preserving Computer Forensic Evidence Computer Image Verification and Authentication: Special Needs of Evidential Authentication — Practical Consideration —Practical Implementation.
UNIT — III
Computer Forensics analysis and validation: Determining what data to collect and analyze, validating forensic data, addressing data-hiding techniques, performing remote acquisitions
Network Forensics: Network forensics overview, performing live acquisitions, developing standard procedures for network forensics, using network tools, examining the honeynet project.
Processing Crime and Incident Scenes: Identifying digital evidence, collecting evidence in private-sector incident scenes, processing law enforcement crime scenes, preparing for a search, securing a computer incident or crime scene, seizing digital evidence at the scene, storing digital evidence, obtaining a digital hash, reviewing a case.
TEXT BOOKS
- Computer Forensics, Computer Crime Investigation by John R. Vacca, Firewall Media, New Delhi.
- Computer Forensics and Investigations by Nelson, Phillips Enfinger, Steuart, CENGAGE Learning
REFERENCE BOOKS
- Real Digital Forensics by Keith J. Jones, Richard Bejtiich, Curtis W. Rose, Addison- Wesley Pearson Education
- Forensic Compiling, A Tractitioneris Guide by Tony Sammes and Brian Jenkinson, Springer International edition.
- Computer Evidence Collection & Presentation by Christopher L.T. Brown, Firewall Media.
- Homeland Security, Techniques & Technologies by Jesus Mena, Firewall Media.
- Software Forensics Collecting Evidence from the Scene of a Digital Crime by Robert M.Slade, TMH 2005
- Windows Forensics by Chad Steel, Wiley India Edition.
Outcomes
- Students will understand the usage of computers in forensic, and how to use various forensic tools for a wide variety of investigations.
- It gives an opportunity to students to continue their zeal in research in computer forensics.
For more information about all JNTU updates please stay connected to us on FB and don’t hesitate to ask any questions in the comment.
material for this computer forensics