Cyber Security & forensic (IT-7004)

Cyber Security & forensic (IT-7004) RGPV notes CBGS

Syllabus

UNIT 1:
Introduction, Classifications of Cybercrimes: E-Mail Spoofing, Spamming, Cyber defamation, Industrial Spying/Industrial Espionage, Hacking, Software Piracy, Password Sniffing, Credit Card Frauds, Cyberstalking, Botnets, Phishing, Pharming, Man-in-the-Middle attack, Password Cracking, Keyloggers and Spywares, Virus and Worms, Trojan Horses and Backdoors, DoS and DDoS Attacks, SQL Injection, Buffer Overflow, Malware, Ransomware, Types of Identity Theft, Techniques of ID Theft, Cyber terrorism, Browser Attacks, Reverse Engineering, Cross site scripting

UNIT 2:
Introduction to Cyber Security, Cyber Security Goals, Cyber Security policy, Domain of Cyber Security Policy, Elements, Cyber Security Evolution, Implementing Hardware Based Security, Software Based Firewalls, Security Standards, Assessing Threat Levels, Forming an Incident Response Team, Reporting Cybercrime, Difference between cyber forensics and cyber security

UNIT 3:
Introduction to cyber forensics, needs of cyber forensic, cyber forensic and digital evidences, Internet Fraud, Storage Fundamentals, File System Concepts, challenges in cyber forensic, Data and Evidence Recovery- Deleted File Recovery, Data Recovery Tools, Data Recovery Procedures and Ethics, Preserve and safely handle original media, Document a "Chain of Custody", Complete time line analysis of computer files based on file creation, file modification and file access, Recover Internet Usage Data, Recover Swap Files/Temporary Files/Cache Files, Introduction to Encase Forensic Edition, Forensic Tool Kit (FTK) etc,

UNIT 4:
Introduction to Cyber Forensic Investigation, Investigation Tools, e-Discovery, Digital Evidence Collection, Evidence Preservation, E-Mail Investigation, E-Mail Tracking, IP Tracking, E-Mail Recovery, Encryption and Decryption methods, Search and Seizure of Computers, Recovering deleted evidences, Password Cracking.

UNIT 5:
Introduction to IT laws & Cyber Crimes, Cyber Laws, IPR, Legal System of Information Technology, Social Engineering,


NOTES


Reference Books

1. Nina Godbole and Sunit Belpure , Cyber Security Understanding Cyber Crimes, Computer Forensics and Legal Perspectives, Wiley
2. Jennifer L. Bayuk, J. Healey, P. Rohmeyer, Marcus Sachs, Jeffrey Schmidt, Joseph Weiss Cyber Security Policy Guidebook, John Wiley & Sons 2012.
3. Vivek sood, Cyber law simplified, Tata Mc GrawHill, Education (India).
4. Eoghan Casey, Handbook of digital forensic and investigation.
5. Clint P Garrison, Digital forensic for network, internet and cloud computing.
6. Panagiotis Kandlis, Digital crime and forensic science in cyberspace, information society S.A Greece IDEA Group Publishing.


You May Also Like

Comments

Popular posts from this blog

Ergonomics (ME-7004)

Internet of Things (CS-6005)

Turbo Machinery (ME-5001)