0% found this document useful (0 votes)
36 views4 pages

Notes On Prde

Uploaded by

rjvyshak05
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
36 views4 pages

Notes On Prde

Uploaded by

rjvyshak05
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 4

SRINIVAS UNIVERSITY

INSTITUTE OF ENGINEERING
AND TECHNOLOGY
MUKKA,
MANGALURU

DEPARTMENT OF CYBER SECURITY


AND CYBER FORENSIC

COURSE MATERIAL FOR


PRESERVING AND RECOVERING DIGITAL EVIDENCE
SUBJECT CODE: 23SCF554

PREPARED BY:
Mr. VYSHAK R, Assistant Professor
Module 1: Digital Evidence and Computer Crime
History and Fundamentals of Computer Crime:
Origins of Digital Crime: Understanding the historical context of computer crimes,
including the evolution from simple data breaches to complex cybercrimes.
Types of Digital Crimes: Overview of different types of digital crimes (e.g., hacking, data
theft, cyberstalking, and financial fraud).
Terminology: Common terms used in computer crime and digital forensics.
Investigation Process in Computer Forensics:
Stages of Digital Investigation: A structured approach to investigation, which includes
preparation, identification, containment, eradication, recovery, and follow-up.
Role of Digital Evidence: How digital evidence plays a critical role in legal proceedings
and criminal investigations.
Chain of Custody: Maintaining integrity of digital evidence through documentation and
preservation techniques.
Reconstruction and Modus Operandi Analysis:
Investigation Reconstruction: Techniques used to piece together digital actions and
reconstruct a crime scene virtually.
Modus Operandi: Understanding the methods or patterns used by cybercriminals to
commit crimes, which helps in profiling and pattern recognition.
Role of Technology and Law:
Legal Frameworks: Overview of relevant laws and regulations governing digital evidence
and computer crime.
Technology in Forensics: The impact of advanced forensic tools, software, and
technologies in evidence gathering and analysis.
Digital Evidence in the Courtroom: How digital evidence is presented in legal
proceedings, including guidelines for admissibility and credibility.

Module 2: Computer Basics for Digital Investigators


Applying Forensic Science to Computer Systems:
Fundamentals of Digital Forensics: Introduction to forensic principles applied to
computer systems, including data acquisition, analysis, and preservation.
Digital Evidence Types: Different types of digital evidence found on computers,
networks, and handheld devices.
Forensic Examination of Operating Systems:
Windows Systems: Tools and techniques for investigating Windows-based systems,
focusing on registry analysis, event logs, and file system structures.
Unix Systems: Analysis of Unix/Linux-based systems, covering file system structures,
permissions, and log analysis.
Macintosh Systems: Specific methods used for forensic examination of macOS, including
HFS+ and APFS file systems.
Forensic Examination of Handheld Devices:
Mobile Device Forensics: Techniques for extracting data from smartphones and tablets,
including Android and iOS.
Challenges in Mobile Forensics: Addressing challenges such as encryption, data volatility,
and device-specific obstacles.
Investigating Specific Cyber Crimes:
Computer Intrusions: Techniques for identifying and investigating unauthorized access
incidents.
Cyberstalking and Cyberbullying: Methods used to trace and investigate cyberstalking
incidents, including IP tracking and social media monitoring.
Data Recovery: Techniques to recover deleted or corrupted data from various digital
storage media.

Module 3: Network Basics for Digital Investigators


Applying Forensic Science to Networks:
Network Forensics Fundamentals: Understanding the key principles of network forensics,
including packet analysis and network intrusion detection.
Network Layers: Detailed analysis of OSI model layers (physical, data link, network,
transport, etc.) and their relevance in forensic investigations.
Digital Evidence on Network Layers:
Physical Layer Evidence: Investigating evidence that resides on physical devices, such as
cables, switches, and routers.
Data Link Layer: Evidence related to MAC addresses, Ethernet frames, and wireless
signals.
Network and Transport Layers: Examination of IP addresses, TCP/UDP connections, and
protocols (e.g., HTTP, DNS) for tracing cyber activities.
Internet-based Evidence:
Internet Forensics: Gathering evidence from internet sources, such as emails, social
media, and websites.
Web-based Evidence Collection: Techniques for capturing and preserving online data,
including screenshots, HTML pages, and metadata.
Challenges in Cloud Forensics: Challenges and solutions for investigating data stored in
cloud environments, including jurisdictional issues and data access limitations.
Handling Digital Crime Scenes:
Digital Crime Scene Management: Techniques for isolating, preserving, and analyzing
digital crime scenes without tampering with evidence.
Digital Evidence Examination Guidelines: Following best practices and legal standards to
ensure evidence is admissible in court.
Documentation: Importance of thorough documentation of all steps taken during network
investigations, including timestamps, tools used, and personnel involved.
Text Books:
Foghann Casey: “Digital Evidence and Computer Crime Forensic science, Computers and
Internet.” This textbook covers core topics of digital evidence in the context of computer
crime, including theoretical and practical aspects.
Reference Books:
Terrence V.Lillard, Glint P.Garrison, Craig A..Schiller, James Steele: “Digital Forensic for
Network, Internet, and Cloud Computing A forensic evidence guide for moving Targets
and Data.” A guide focusing on digital forensics for dynamic environments,

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy