# CSC501 / Cyber Security

## Syllabus

{% file src="<https://3148391480-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FoWho7cxjZIbvsuDwIAzB%2Fuploads%2F6et9tg3kDUrgAjpBLgyi%2FY3S5-CSC501-SYLLABUS-BTECH-CSE-IT.pdf?alt=media&token=17be7225-399b-49a3-9e32-7e61b69b8880>" %}

{% file src="<https://3148391480-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FoWho7cxjZIbvsuDwIAzB%2Fuploads%2FX4SljgituZDxVRXQPeoI%2FY3S5-CSC521-SYLLABUS-BTECH-CSE-IT.pdf?alt=media&token=8e03a1cb-7d7b-44fc-9419-46a7b717ab71>" %}

***

## Resources

<details>

<summary>M1: Introduction to Cyber Laws &#x26; Cyber Forensics</summary>

* **Classifications of Cyber Crimes**
  * Against individuals
  * Against property
  * Against the nation
* **Need for Digital Forensics**
  * Steps in digital forensics (scientific methods)
* **Number Systems for Data Representation**
  * Binary
  * Decimal
  * Hexadecimal
  * ASCII and Unicode
* **Arenas for Digital Forensics**
  * Disk
  * Network
  * Wireless
  * Database
  * Mobile
  * Email
  * GPS
  * Memory
* **Incident Handling and Response**
  * Forensic triage
* **Ethical Hacking**
* **Future of Cybercrime**

***

<table><thead><tr><th width="81.0859375">[⤓]</th><th>Content Preview</th></tr></thead><tbody><tr><td><a href="https://drive.google.com/uc?export=download&#x26;id=1zC2vMNUKdfK7BkyPEv13ChdB-zBPBy2a" class="button primary" data-icon="arrow-down-to-square"></a></td><td><a href="https://drive.google.com/file/d/1zC2vMNUKdfK7BkyPEv13ChdB-zBPBy2a/view?usp=drive_link">M1-Complete-Lectures-CSC501</a></td></tr></tbody></table>

</details>

<details>

<summary>M2: Fundamentals for Cyber Forensics</summary>

* Locard's Exchange Principle and Digital Forensic Investigation Models
* Types of digital evidence artifacts
* Raw vs proprietary forensic storage formats
* Identification of potential evidence:
  * Slack space
  * Swap space
  * Steganography
* Recovery of:
  * Hidden data
  * Deleted data
  * Corrupt data
* Standard file formats & headers
* Forensic file carving
* Investigation planning:
  * Order of volatility
  * Forensic triage
* Overview of file systems

***

<table><thead><tr><th width="81.0859375">[⤓]</th><th>Content Preview</th></tr></thead><tbody><tr><td><a href="https://drive.google.com/uc?export=download&#x26;id=1tnLxCzRVwWEobbLjMWe3jcIqyxtcpL06" class="button primary" data-icon="arrow-down-to-square"></a></td><td><a href="https://drive.google.com/file/d/1tnLxCzRVwWEobbLjMWe3jcIqyxtcpL06/view?usp=drive_link">M2-Complete-Lectures-CSC501</a></td></tr></tbody></table>

</details>

<details>

<summary>M3: Rules for Cyber Security and Digital Forensics</summary>

* Rules of collecting digital evidence
* Standard collection procedures:
  * Seizure
  * Write blockers
  * Bit-stream imaging
  * Hashing
  * Chain of Custody (COC)
  * Evidence bags
  * Standard Operating Procedures (SOP)
* Sources and locations of digital evidence
* Duplicating and preserving evidence
* Importance of MAC timings
* Types of system logs
* Windows Registry

***

<table><thead><tr><th width="81.0859375">[⤓]</th><th>Content Preview</th></tr></thead><tbody><tr><td><a href="https://drive.google.com/uc?export=download&#x26;id=1HWe5xVRvBsmYspExYPCYXtBK5OqatqHk" class="button primary" data-icon="arrow-down-to-square"></a></td><td><a href="https://drive.google.com/file/d/1HWe5xVRvBsmYspExYPCYXtBK5OqatqHk/view?usp=drive_link">M3-Complete-Lectures-CSC501</a></td></tr></tbody></table>

</details>

<details>

<summary>M4: Implementation of Cyber Law and Digital Forensics</summary>

* Forensic laboratory requirements:
  * Setting up a lab
  * Evaluating lab staff
  * Selecting forensic workstations
* Backup and recovery plans
* Generating forensically sound reports
* Intellectual Property Rights and Cyber Laws in India:
  * IT Act 2000
  * 2008 Amendment
  * Related IPC sections
* Code of Ethics
* Role of Expert Witnesses
* Analysis of sample forensic reports

***

<table><thead><tr><th width="81.0859375">[⤓]</th><th>Content Preview</th></tr></thead><tbody><tr><td><a href="https://drive.google.com/uc?export=download&#x26;id=1IRSk2Mvm6TYJZk0CM3Q1sxLAv2RYgiEZ" class="button primary" data-icon="arrow-down-to-square"></a></td><td><a href="https://drive.google.com/file/d/1IRSk2Mvm6TYJZk0CM3Q1sxLAv2RYgiEZ/view?usp=drive_link">M4-Complete-Lectures-CSC501</a></td></tr></tbody></table>

</details>

<details>

<summary>M5: Practical Approaches to Cyber Forensics</summary>

* Evidence validation and gathering using:
  * DOS commands
  * Unix/Linux commands
* Forensic imaging with DD commands
* Software tools:
  * Open source frameworks
  * Proprietary frameworks
* Hardware tools:
  * Write blockers
  * Images and evidence protection containers/bags
* NIST tools:
  * CFReDS
  * CTFF
  * NSRL
* Analysing:
  * Email headers
  * Network packets

***

<table><thead><tr><th width="81.0859375">[⤓]</th><th>Content Preview</th></tr></thead><tbody><tr><td><a href="https://drive.google.com/uc?export=download&#x26;id=1RzdDTZhTHmiUY2YaL85ejiZOGrTKv8h1" class="button primary" data-icon="arrow-down-to-square"></a></td><td><a href="https://drive.google.com/file/d/1RzdDTZhTHmiUY2YaL85ejiZOGrTKv8h1/view?usp=drive_link">M5-Complete-Lectures-CSC501</a></td></tr></tbody></table>

</details>

## Notes

### MidTerm

<a href="https://drive.google.com/uc?export=download&#x26;id=1xhNwLk0QYKf7nMCdrpaY393gZSytfFuq" class="button primary" data-icon="arrow-down-to-square"></a> [CSC501-CL\&DF-M1+M2-MidTerm-Notes](https://drive.google.com/file/d/1xhNwLk0QYKf7nMCdrpaY393gZSytfFuq/view?usp=drive_link)

{% embed url="<https://drive.google.com/file/d/1xhNwLk0QYKf7nMCdrpaY393gZSytfFuq/view?usp=drive_link>" %}

<a href="https://drive.google.com/uc?export=download&#x26;id=19WPt__O8QZtu2hxQVhEhQ-xiOhVQ81iE" class="button primary" data-icon="arrow-down-to-square"></a> [CSC501-CL\&DF-M1+M2-Concept-Diagrams](https://drive.google.com/file/d/19WPt__O8QZtu2hxQVhEhQ-xiOhVQ81iE/view?usp=drive_link)

{% embed url="<https://drive.google.com/file/d/19WPt__O8QZtu2hxQVhEhQ-xiOhVQ81iE/view?usp=drive_link>" %}

### EndSem

\[⤓]

## Question Directory

<table><thead><tr><th width="81.0859375">[⤓]</th><th>Content Preview</th></tr></thead><tbody><tr><td><a href="https://drive.google.com/uc?export=download&#x26;id=1WAK5dOqUFOg4bF1iAkEjM-OhcIZpDtCo" class="button primary" data-icon="arrow-down-to-square"></a></td><td>Y3S5-CSC501-M1+2-Qs-Bank+MidTerm-Assignment</td></tr><tr><td><a href="https://drive.google.com/uc?export=download&#x26;id=1YprlZln2ryib_6FH14BvQIswFB0As43j" class="button primary" data-icon="arrow-down-to-square"></a></td><td>Y3S5-CSC501-M3+4+5-Qs-Bank+MidTerm-Assignment</td></tr></tbody></table>

### Previous Year Questions

#### Mid-Sem-PYQ

<table><thead><tr><th width="81.90771484375">[⤓]</th><th width="554.568115234375">Content Preview</th></tr></thead><tbody><tr><td><a href="https://drive.google.com/uc?export=download&#x26;id=10_N6PWQ49DDwUwX21Y_CQ-J6idiwG3RJ" class="button primary" data-icon="arrow-down-to-square"></a></td><td><a href="https://drive.google.com/file/d/10_N6PWQ49DDwUwX21Y_CQ-J6idiwG3RJ/view?usp=drive_link">Y3S5-CSC501-CL&#x26;CF-MidTerm-Set-A-PYQ-OCT25</a></td></tr></tbody></table>

#### End-Sem-PYQ

<table><thead><tr><th width="81.9005126953125">[⤓]</th><th width="547.80322265625">Content Preview</th></tr></thead><tbody><tr><td><a href="https://drive.google.com/uc?export=download&#x26;id=16-YT2Xdx_KwMwW0eVOyqTUYDqfHV4Iy1" class="button primary" data-icon="arrow-down-to-square"></a></td><td><a href="https://drive.google.com/file/d/16-YT2Xdx_KwMwW0eVOyqTUYDqfHV4Iy1/view?usp=drive_link">Y3S5-CSC501-CL&#x26;CF-EndSem-PYQ-DEC24</a></td></tr></tbody></table>

***

{% embed url="<https://discord.gg/6ywR3zbNfg>" %}

{% embed url="<https://mantavyam.notion.site/18152f7cde8880d699a5f2e65f87374e>" %}

{% embed url="<https://mantavyam.notion.site/17e52f7cde8880e0987fd06d33ef6019>" %}
