0% found this document useful (0 votes)
108 views

In The Name of Allah, The Most Beneficent and The Most Merciful

This document provides information about an upcoming computer forensics course. It introduces the instructor, Dr. Zunera Jalil, and provides details about the course code, title, credit hours, schedule, and learning methodology. It outlines the assessment plan, grading scale, research project requirements, and recommended textbooks and resources. It also discusses some key trends in cybercrimes and digital forensics. Finally, it lists potential course contents and provides links for students to explore related topics.

Uploaded by

Faisal Shahzad
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
108 views

In The Name of Allah, The Most Beneficent and The Most Merciful

This document provides information about an upcoming computer forensics course. It introduces the instructor, Dr. Zunera Jalil, and provides details about the course code, title, credit hours, schedule, and learning methodology. It outlines the assessment plan, grading scale, research project requirements, and recommended textbooks and resources. It also discusses some key trends in cybercrimes and digital forensics. Finally, it lists potential course contents and provides links for students to explore related topics.

Uploaded by

Faisal Shahzad
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 27

In the name of Allah,

the most Beneficent and the most Merciful


Dr. Zunera Jalil
Email: zunera.jalil@mail.au.edu.pk

17th September, 2020


Course Information

Course Code: CY 620/ CY 825


Course Title: Computer Forensics/
Advanced Topics in Digital Forensics
Credit Hours: 03
Class Schedule: Thursday ( 4:40 – 7:30 pm)
Office Hours: To be announced

Google Class Room Joining Code: fgnjllg


Instructor Information

Dr. Zunera Jalil,


PhD (Computer Science), FAST-NUCES, 2010.
Co-PI (Computer Forensics), National Cybercrimes and Forensics Lab, National Center for Cyber Security.
Trainings: CHFI, Autopsy, AccessData FTK

Email: zunera.jalil@mail.au.edu.pk
Ext: 680

Research Interests:
Cyber attacks detection using deep learning, AI for audio, video and log data processing, criminal profiling,
digital forensics for cyber physical systems, and Digital Forensics as a Service (DfaaS)
Google Scholar Profile:
https://scholar.google.com.pk/citations?user=BlsdhzYAAAAJ&hl=en
Your Introduction

Name
Last Degree & Year
CGPA
Why Cyber Security?
Any work/training/skills in
digital forensics?
Text/Reference Books
Other Sources

• Guide to Computer Forensics and Investigations, by


Bill Nelson, Amelia Phillips and Christopher Steuart

• Computer Forensics: Computer Crime Scene Investigation, by


John R. Vacca

• Computer Forensics: Cybercriminals, Laws and Evidence, by


Marie-Helen Maras

• CHFI course ware


• Research Articles from reputed computer forensics journals
Learning Methodology in this course

• Lectures
• Reading Assignments
• Practical Assignments
• Research – Analysis/Problem solving
• Presentations
• Written Exams
Assessment Plan (Tentative)

Assessment Type Number Weightage

Quiz 04 10%
Assignments 04 10%
Research Project 01 (6 phases) 20%
Midterm Exam (8th Week) 01 20%
Final Exam (18th Week) 01 40%
Grading 10

Marks in %age Grades GPA


80 – 100 A 4.00
75 – 79.99 A- 3.67
70 – 74.99 B+ 3.33
65 – 69.99 B 3.00
60 - 64.99 B- 2.67
55 – 59.99 C+ 2.33
50 – 54.00 C 2.00
Below 50 F 0.00
Research Project 11

• Divided in 6 phases.
• Each phase will have its deadline and unique
requirements.
• Will be announced in third week of semester
• Group Work (Maximum 2 students in one group)
Remember

• In this course you will study concepts, acquire skills and learn about
principles of digital forensics.
• Open source forensics tools will be used and developed.
• Learn PYTHON if you are not familiar with it yet.
• Copied assignments or project reports will be awarded ZERO marks.
• Minimum 75% attendance is mandatory to appear in final exam.
• Keep your returned quizzes, assignments and mid-term exam safe with
you, no claim of any marks correction will be entertained without
them.
14
Cyber Attacks Landscape
Data presented below is based from the Check Point Threat Cloud
Cyber Threat Map between January and June 2020

GLOBAL
Asia & Pacific Region (APAC)
47%
34% 30%
20% 18%
8%

Europe, Middle East & Africa (EMEA)


38%
26% 23% 15% 15% 7%

38% North & South America


28% 27%
18% 18% 33% 24% 22% 14% 13%
7% 5%
Cybercrimes Trends in 2020
• Business' infrastructures moving online

• Technological development at an ever


increasing pace

• Emerging new cyber threats

• Businesses and government agencies


vulnerable to cyber attacks and data breaches

• Political interference and state-sanctioned


cyber crimes
Source
Cybercrimes Trends in 2020… 17

• Increase in Ransomware Attacks

• Artificial Intelligence in Cybercrimes and Protection

• More Security Threats after development of 5G and Adoption of


IoT Devices

• Rise in Vehicle Hacking

• Cyber Security Skills Gap

• Mobile Devices prone to attacks

Source
Top Malicious Files Types – Email Vs Web

EMAIL WEB
68% 32%

.doc file extension 38% 36% .exe file extension


.exe file extension 25% 12% .pdf file extension
.rtf file extension 11% 9% .swf file extension
.xlsx file extension 6% 6% .doc file extension
Digital Forensics 19

Preservation, identification, extraction,


documentation, and interpretation of
computer media for evidentiary
and/or root cause analysis using
well-defined methodologies and
procedures.
Need for Digital Forensics 20

• The growth of the Internet and the worldwide proliferation of


computers have increased the need for digital investigations.

• Computers can be used to commit crimes, and crimes can be


recorded on computers, including company policy violations,
embezzlement, e-mail harassment, leaks of proprietary information,
and even terrorism.

• Law enforcement, network administrators, attorneys, and private


investigators now rely on the skills of professional digital forensics
experts to investigate criminal and civil cases.
Methodology 21

▪ Acquire the evidence without altering or


damaging the original.
▪ Authenticate that the recovered evidence is the
same as the original seized.
▪ Analyze the data without modifying it.
▪ Document and Report your findings
Course Contents in Brief 22

• Digital Forensics in Today’s World


• Data Acquisition and Forensics Investigation Process
• Study of File Systems and Storage- Data Recovery and carving
• OS Forensics –WINDOWS, LINUX, UNIX, MacOS, Android OS
• Information Hiding and anti-forensic methods
• Network Forensics
• Email Forensics
• Memory Acquisition and analysis
• Database Forensics
• Multimedia Forensics
• Smart Devices Forensics
• Case management, Documentation and Reporting
23
Home Task

Explore
Links to explore 26

• https://www.journals.elsevier.com/forensic-science-international-
digital-investigation

• https://link.springer.com/chapter/10.1007/978-981-15-1480-7_20

• https://www.nist.gov/news-events/news/2020/06/nist-digital-
forensics-experts-show-us-what-you-got

• https://www.computer.org/publications/tech-
news/research/digital-forensics-security-challenges-cybercrime
ANY QUESTIONS

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy