Here you can download the free lecture Notes of Computer Forensics Pdf Notes – CF Notes Pdf materials with multiple file links to download. The Computer Forensics notes pdf book (CF Pdf Notes) starts with the topics covering What is Computer Forensics, Data Recovery Defined, Preserving the Digital Crime Scene, Determining what data to collect and analyze, Identifying digital evidence, evaluating computer forensic tool needs, Exploring the role of e-mail in investigation, understanding file systems etc.
Computer Forensics Pdf Notes – CF Notes Pdf
Computer forensics pdf free download
Link : Complete Notes
Note :- These notes are according to the R09 Syllabus book of JNTU.In R13 and R15,8-units of R09 syllabus are combined into 5-units in R13 and R15 syllabus. If you have any doubts please refer to the JNTU Syllabus Book.
Computer Forensics Notes Pdf – CF Notes Pdf
UNIT-I
Computer Forensics Fundamentals: What is Computer Forensics?. Use of Computer Forensics in Law Enforcement, Computer Forensics Assistance to Human Resources/Employment Proceedings. Computer Forensics Services, Benefits of Professional Forensics Methodology, Steps taken by Computer Forensics Specialists ‘Types of Computer Forensics Technology: Types of Military Computer Forensic ‘Technology, Types of Law Enforcement — Computer Forensic Technology – Types of Business Computer Forensic Technology
UNIT-II
Computer Forensics Evidence and Capture: Data Recovery Defined – Data Back-up and Recovery – The Role of Back-up in Data Recovery – The Data- Reoovery Solution Evidence Collection and Data Seizure: Why Collect Evidence? Collection Options – Obstacles – Types of Evidence – The Rules of Evidence — Volatile Evidence – General Procedure — Collection and Archiving – Methods of Collection – Artifacts – Collection Steps – Controlling Contamination: The Chain of Custody
UNIT-III
Duplication and Preservation of Digital Evidence: Preserving the Digital Crime Scene – Computer Evidence Processing Steps — Legal Aspects of Collecting and Preserving Computer Forensic Evidence Computer Image Verification and Authentication: Special Needs of Evidential Authentication – Practical Consideration – Practical Implementation
UNIT-IV
Computer Forensics analysis and validation: Determining what data to collect and analyze, validating forensic data. addressing data-hiding techniques, performing remote acquisitions Network Forensics: Network forensics overview. performing live acquisitions, developing standard procedures for network forensics, unsing network tools. examining the honeynet project.
Computer Forensics Notes pdf – CF Notes Pdf
UNIT-V
Processing Crime and Incident Scenes: Identifying digital evidence. collecting evidence in private-sector incident scens. processing law enforcement crime scenes. preparing for a search. securing a computer incident or crime scene. seizing digital evidence at the scene. storing digital evidence. obtaing a digital hash. reviewing a case
UNIT-VI
Current Computer Forensic tools: evaluating computer forensic tool needs. computer forensics software tools. computer forensics hardware tools. validating and testing forensics software
UNIT-VII
E-Mail Investigations: Exploring the role of e-mail in investigation, exploring the roles of the client and server in e-mail. investigating e~mail crimes and violations. understanding e-mail servers. using specialized e-mail forensic tools Cell phone and mobile device forensics: Understanding mobile device forensics. understanding acquisition procedures for cell phones and mobile devices.
UNIT-VIII
Working with Windows and DOS Systems: understanding file systems. exploring Microsoft File Structures, Examinig NTFS disks. Understanding whole disk encryption, windows registry. Microsoft stanup tasks. MS—DOS startup tasks. virtual machines.
Reference:
1. Real Digital Forensics by Keith I. Jones. Richard Bej tlich. Curtis W. Rose. Addison Wesley Pearson Education
2. Forensic Compiling. A Tractitioneris Guide by Tony Sammes and Brian Jenkinson. Springer international edition.
3. Computer Evidence Collection & Presentation by Christopher LT. Brown, Firewall Media.
4. Homeland Security. Techniques 82 Technologies by Jesus Menu. Fuewall Media.
5. Software Forensics Collecting Evidence from the Scene of a Digital Crime by Robert M.Slade. TM]-l 2005
6 Windows Forensics by Chad Steel. Wiley India Edition.
Text books:
1. Computer Forensics. Computer Crime Investigation by John R. Vaoca. Firewall Media, New Delhi.
2 Computer Forensics and Investigations by Nelson. Phillipe Enfinger. Steuan. CENGAGE Learning
Follow us on FB – Smartzworld
Frequently asked questions
Q1: What is computer forensics?
A1: Computer forensic is a process/discipline of receiving digital evidence. It includes different analytical techniques through which one can identify, collect, preserve and examine the information that is magnetically encoded or stored. It combines law and computer science in a certain way that is admissible as evidence in a court of law. It includes finding random effect, bugs, deliberate attack, identifying IP address or a person who tried to retrieve the data, finding results from the intrusion, process of blocking the crime in future etc.
Q2: What are the different characteristics of computer forensic evidence?
A2: Computer forensic evidence should be complete, authentic, believable, admissible, reliable.
Q3: Where do we find the computer forensic evidence?
A3: We can find the computer forensic evidences in hard disks, floppy disks, USB disks, tapes, mobile phones, MP3 players, PDAs, USB sticks, game consoles, Cameras, GPS tracker, audio recorders, digital copiers/printers.