You are on page 1of 9

18CS3026

Cyber Forensics
Content Overview
• Module 1: Introduction
• Module 2: Crime Related to Unauthorized Access
• Module 3: Mobile and Wireless Technology
• Module 4: Forensics Investigation
• Module 5: Security Issues with Outsourcing
• Module 6: Legal Aspects of Digital Forensics
Module 1: Introduction

• History and evolution- Definition and nature- Forensic Computing:


Collection- Investigation and examination of digital evidence -
Forensics Investigation- Collection and Examination & Authentication-
Response - Cyber terrorism.
Module 2: Crime Related to Unauthorized Access

• Hacking - Types of hackers - Examples of hackers- The techniques of


hacking- Reasons of hacking- Prevention of hacking- Benefits of
hacking- Cybercrimes in financial activities- Cyber terrorism -
Electronic-Surveillance
Module 3: Mobile and Wireless Technology

• New playgrounds for cyber criminals - The computer and Internet


security - Functions related to computer and internet security-
Security threat- suggestions for security- Economic Aspects of
Computer and Internet security- Internet security and Children-
Security Standards for Information Security- Future trends in Security-
Blended Attacks- The Future of Wireless.
Module 4: Forensics Investigation

• Response- Computer forensics and the law- Cybercrime examples-


Forensic evidence- Forensics casework- Preserving the integrity of the
crime scene- Investigating incident-Response actions- Forensics
analysis investigative actions- Computer forensic tools.
Module 5: Security Issues with
Outsourcing
• The nondisclosure agreement - Myths about outsourcing security -
Security Service level agreements- Developing SLA- Components of an
SLA- Adding security to the SLA equation - Future trends in security
Module 6: Legal Aspects of Digital
Forensics
• IT Act 2000, amendment of IT Act 2008-Recent trends in Cyber
forensic technique and methods to search and seizure electronic
evidence.
Text Book
• 1. R. K. Chaubey, “An Introduction to cybercrime and cyber law”,
Kamal Law House, Second Edition 2014. ISBN: 9780111445512

• 2.John W. Rittinghouse, William M. Hancock, “Cybersecurity


Operations Handbook”, Elsevier ISBN-13: 9781555583064, 2005

You might also like