0% found this document useful (0 votes)
211 views

Cyber Forensics

The document outlines the content and modules of a course on Cyber Forensics. The 6 modules are: 1) Introduction to cyber forensics including history, definitions, and investigations. 2) Crimes related to unauthorized access such as hacking and cybercrimes. 3) Mobile and wireless technologies as new areas for cyber criminals. 4) Forensics investigations including evidence collection and analysis. 5) Security issues related to outsourcing such as non-disclosure agreements and security service level agreements. 6) Legal aspects of digital forensics including relevant laws and recent trends in techniques for electronic evidence collection.

Uploaded by

Jeree
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
211 views

Cyber Forensics

The document outlines the content and modules of a course on Cyber Forensics. The 6 modules are: 1) Introduction to cyber forensics including history, definitions, and investigations. 2) Crimes related to unauthorized access such as hacking and cybercrimes. 3) Mobile and wireless technologies as new areas for cyber criminals. 4) Forensics investigations including evidence collection and analysis. 5) Security issues related to outsourcing such as non-disclosure agreements and security service level agreements. 6) Legal aspects of digital forensics including relevant laws and recent trends in techniques for electronic evidence collection.

Uploaded by

Jeree
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 9

18CS3026

Cyber Forensics
Content Overview
• Module 1: Introduction
• Module 2: Crime Related to Unauthorized Access
• Module 3: Mobile and Wireless Technology
• Module 4: Forensics Investigation
• Module 5: Security Issues with Outsourcing
• Module 6: Legal Aspects of Digital Forensics
Module 1: Introduction

• History and evolution- Definition and nature- Forensic Computing:


Collection- Investigation and examination of digital evidence -
Forensics Investigation- Collection and Examination & Authentication-
Response - Cyber terrorism.
Module 2: Crime Related to Unauthorized Access

• Hacking - Types of hackers - Examples of hackers- The techniques of


hacking- Reasons of hacking- Prevention of hacking- Benefits of
hacking- Cybercrimes in financial activities- Cyber terrorism -
Electronic-Surveillance
Module 3: Mobile and Wireless Technology

• New playgrounds for cyber criminals - The computer and Internet


security - Functions related to computer and internet security-
Security threat- suggestions for security- Economic Aspects of
Computer and Internet security- Internet security and Children-
Security Standards for Information Security- Future trends in Security-
Blended Attacks- The Future of Wireless.
Module 4: Forensics Investigation

• Response- Computer forensics and the law- Cybercrime examples-


Forensic evidence- Forensics casework- Preserving the integrity of the
crime scene- Investigating incident-Response actions- Forensics
analysis investigative actions- Computer forensic tools.
Module 5: Security Issues with
Outsourcing
• The nondisclosure agreement - Myths about outsourcing security -
Security Service level agreements- Developing SLA- Components of an
SLA- Adding security to the SLA equation - Future trends in security
Module 6: Legal Aspects of Digital
Forensics
• IT Act 2000, amendment of IT Act 2008-Recent trends in Cyber
forensic technique and methods to search and seizure electronic
evidence.
Text Book
• 1. R. K. Chaubey, “An Introduction to cybercrime and cyber law”,
Kamal Law House, Second Edition 2014. ISBN: 9780111445512

• 2.John W. Rittinghouse, William M. Hancock, “Cybersecurity


Operations Handbook”, Elsevier ISBN-13: 9781555583064, 2005

You might also like