CSC 3243 COMPUTER FORENSICS
CSC 3243 COMPUTER FORENSICS
PAUL’S UNIVERSITY
S
UN
P A U L ’
Private Bag 00217 Limuru, 00217, KENYA
I VE R S I TY
Tel: 020-2020505/2020510/0728-669000/0736-424440
.
S T
SE R TY
VANT
S OF GO D AND HUMANI
Page 1 of 2
SECTION B: ANSWER ANY TWO QUESTIONS FROM THIS SECTION
QUESTION 2 (20 MARKS)
a) In order to maintain the integrity of evidence, the claim of custody procedures must be strictly
observed. Describe THREE (3) of the chain of custody procedures. (6 Marks)
b) Explain three functions of computer forensic tools (6 Marks)
c) Explain two current challenge areas for digital forensics (4 Marks)
d) Explain the special needs of evidential authentication in forensic science (4 Marks)
Question Three
a) You are given a hard disk belonging to a suspected criminal. Explain the complete steps to make
forensic copy of the hard disk. The steps should start immediately after you have received the
suspected criminal hard disk. Do not forget to include the steps for change of custodian procedure
and case documentation. (8 Marks)
b) Describe how data backup and recovery is done in computer forensics (6 Marks)
c) Discuss the process of seizing of digital evidence at the scene (6 Marks)
Page 2 of 2