githubEdit

CSC501 / Cyber Security

Syllabus


Resources

chevron-rightM1: Introduction to Cyber Laws & Cyber Forensicshashtag
  • Classifications of Cyber Crimes

    • Against individuals

    • Against property

    • Against the nation

  • Need for Digital Forensics

    • Steps in digital forensics (scientific methods)

  • Number Systems for Data Representation

    • Binary

    • Decimal

    • Hexadecimal

    • ASCII and Unicode

  • Arenas for Digital Forensics

    • Disk

    • Network

    • Wireless

    • Database

    • Mobile

    • Email

    • GPS

    • Memory

  • Incident Handling and Response

    • Forensic triage

  • Ethical Hacking

  • Future of Cybercrime


chevron-rightM2: Fundamentals for Cyber Forensicshashtag
  • Locard's Exchange Principle and Digital Forensic Investigation Models

  • Types of digital evidence artifacts

  • Raw vs proprietary forensic storage formats

  • Identification of potential evidence:

    • Slack space

    • Swap space

    • Steganography

  • Recovery of:

    • Hidden data

    • Deleted data

    • Corrupt data

  • Standard file formats & headers

  • Forensic file carving

  • Investigation planning:

    • Order of volatility

    • Forensic triage

  • Overview of file systems


chevron-rightM3: Rules for Cyber Security and Digital Forensicshashtag
  • Rules of collecting digital evidence

  • Standard collection procedures:

    • Seizure

    • Write blockers

    • Bit-stream imaging

    • Hashing

    • Chain of Custody (COC)

    • Evidence bags

    • Standard Operating Procedures (SOP)

  • Sources and locations of digital evidence

  • Duplicating and preserving evidence

  • Importance of MAC timings

  • Types of system logs

  • Windows Registry


chevron-rightM4: Implementation of Cyber Law and Digital Forensicshashtag
  • Forensic laboratory requirements:

    • Setting up a lab

    • Evaluating lab staff

    • Selecting forensic workstations

  • Backup and recovery plans

  • Generating forensically sound reports

  • Intellectual Property Rights and Cyber Laws in India:

    • IT Act 2000

    • 2008 Amendment

    • Related IPC sections

  • Code of Ethics

  • Role of Expert Witnesses

  • Analysis of sample forensic reports


chevron-rightM5: Practical Approaches to Cyber Forensicshashtag
  • Evidence validation and gathering using:

    • DOS commands

    • Unix/Linux commands

  • Forensic imaging with DD commands

  • Software tools:

    • Open source frameworks

    • Proprietary frameworks

  • Hardware tools:

    • Write blockers

    • Images and evidence protection containers/bags

  • NIST tools:

    • CFReDS

    • CTFF

    • NSRL

  • Analysing:

    • Email headers

    • Network packets


Notes

MidTerm

arrow-down-to-square CSC501-CL&DF-M1+M2-MidTerm-Notesarrow-up-right

arrow-down-to-square CSC501-CL&DF-M1+M2-Concept-Diagramsarrow-up-right

EndSem

[⤓]

Question Directory

[⤓]
Content Preview

Y3S5-CSC501-M1+2-Qs-Bank+MidTerm-Assignment

Y3S5-CSC501-M3+4+5-Qs-Bank+MidTerm-Assignment

Previous Year Questions

Mid-Sem-PYQ

End-Sem-PYQ


Last updated