0% found this document useful (0 votes)
385 views

Cyber Forensics

Unit I covers network layer security using IPSec protocols, transport layer security using SSL and TLS, and key management. Unit II discusses email security using PGP and S/MIME as well as firewalls. Unit III provides an introduction to computer forensics, traditional computer crimes, identity theft, and forensic techniques. Unit IV covers evidence collection and current forensic tools. Unit V analyzes validation of forensic data, data hiding techniques, network forensics, email investigations, and mobile device forensics.
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
385 views

Cyber Forensics

Unit I covers network layer security using IPSec protocols, transport layer security using SSL and TLS, and key management. Unit II discusses email security using PGP and S/MIME as well as firewalls. Unit III provides an introduction to computer forensics, traditional computer crimes, identity theft, and forensic techniques. Unit IV covers evidence collection and current forensic tools. Unit V analyzes validation of forensic data, data hiding techniques, network forensics, email investigations, and mobile device forensics.
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 2

CS6004

UNIT I

CYBER FORENSICS

LTPC 3003

NETWORK LAYER SECURITY &TRANSPORT LAYER SECURITY

IPSec Protocol - IP Authentication Header - IP ESP - Key Management Protocol for IPSec .
Transport layer Security: SSL protocol, Cryptographic Computations TLS Protocol.
UNIT II

E-MAIL SECURITY & FIREWALLS

PGP - S/MIME - Internet Firewalls for Trusted System: Roles of Firewalls Firewall related
terminology- Types of Firewalls - Firewall designs - SET for E-Commerce Transactions.
UNIT III

INTRODUCTION TO COMPUTER FORENSICS

Introduction to Traditional Computer Crime, Traditional problems associated with Computer


Crime. Introduction to Identity Theft & Identity Fraud. Types of CF techniques - Incident and
incident response methodology - Forensic duplication and investigation. Preparation for IR:
Creating response tool kit and IR team. - Forensics Technology and Systems - Understanding
Computer Investigation Data Acquisition.
UNIT IV

EVIDENCE COLLECTION AND FORENSICS TOOLS

Processing Crime and Incident Scenes Working with Windows and DOS Systems. Current
Computer Forensics Tools: Software/ Hardware Tools.
UNIT V

ANALYSIS AND VALIDATION

Validating Forensics Data Data Hiding Techniques Performing Remote Acquisition


Network Forensics Email Investigations Cell Phone and Mobile Devices Forensics
TEXT BOOKS:
1. Man Young Rhee, Internet Security: Cryptographic Principles, Algorithms and Protocols,
Wiley Publications, 2003.

2. Nelson, Phillips, Enfinger, Steuart, Computer Forensics and Investigations, Cengage


Learning,
India Edition, 2008.
REFERENCES:
1. John R.Vacca, Computer Forensics, Cengage Learning, 2005
2. Richard E.Smith, Internet Cryptography, 3rd Edition Pearson Education, 2008.
3. Marjie T.Britz, Computer Forensics and Cyber Crime: An Introduction, 3rd Edition,
Prentice Hall, 2013.

You might also like