0% found this document useful (0 votes)
1K views2 pages

BCAI061 - Cyber Forensic analytics

Uploaded by

kumarijyoti19197
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
1K views2 pages

BCAI061 - Cyber Forensic analytics

Uploaded by

kumarijyoti19197
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

BCAI061 CYBER FORENSIC ANALYTICS

Course Outcome (CO) Bloom’s Knowledge Level (KL)

At the end of course, the student will be able to:

CO 1 Outline the Cyber Crime and its types. K1, K2

CO 2 Explore the Cyber Forensics Techniques K1, K2

CO 3 Use the Cyber Investigation Techniques K3, K4

CO 4 Explore the Cyber Evidence Management Techniques K3, K4

CO 5 Outline the Cyber Laws in India K1, K2

DETAILED SYLLABUS 3-0-0

Unit Topic Proposed


Lecture
Cyber Crime:
Cyber Space – Cyber Crime – Criminal Behaviour – Jurisdictional Concerns - Jurisprudential
Inconsistency – eCash Security – Prepaid Cards – Stored Values Cards – Mobile Payments –
Internet Payment Services -Cyber stalking - Cyber extortion – Cyber terrorism - Cyber warfare
I 08
–Cyber weapons -ATM frauds – Phreaking – Internet Gambling
Practical Component:
1. Key logger
2. Email Fraud
Cyber Forensics:
Digital device – Hard disk –Disk characteristics - Disk imaging - Data Carving – Techniques –
commercial piracy - soft lifting – Steganography – Network components - Port scans - Wireshark
- pcap analysis - Trojans and Backdoors – Botnets - DoS – DDoS Attacks - Honey Pots –
II 08
Malware – Virus and Worms
Practical Component:
1. Pcab file Analysis – Case Study
2. Network Port Scan – Forensics
Cyber Investigation
Concepts of Investigation - cyber investigation, Network Investigation - Investigating audit logs
-Investigating Web attacks - Investigating Computer Intrusions - Profiling – Cyber Criminal
profiling – Stylometric Techniques – Warranted searches – Warrantless searches – Undercover
III 08
Techniques
Practical Component:
1. Investigating Audit Logs
2. Investigating Web attacks
Evidence Management:
Evidence – Digital Evidence - Types – physical evidence – Real evidence – Circumstantial
evidence –network evidence - Evidence collection – Evidence Analysis - Contextual Information
IV –Evidence Management – pre search activities – On Scene activities – Report Preparations 08
Practical Component:
1. Digital Evidence Analysis
2. Network Analysis
Cyber Laws and Authorities
Information Technology Act 2000 – Digital signature - Electronic Governance - Secure electronic
records
V - Regulation of certifying authorities – CERNTin - Electronic signature certificates - Penalties
compensation - Future Trends and Emerging Concerns Practical Component:
1. Digital Signature 08

Text Books:
1. Marjie T. Britz, “Computer Forensics and Cyber Crime”, Pearson, 2013.
2. Garima Tiwari, “Understanding Laws– Cyber Laws And Cyber Crimes”, Lexis Nexis, 2014.
3. Chuck Easttom, Jeff Taylor, “Computer Crime, Investigation, and the Law”, Course Technology, 2018.
4. Eoghan Casey, “Digital Evidence and Computer Crime: Forensic Science, Computers, and the Internet”,
Eoghan Casey, 2018.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy