Skip to content

Latest commit

 

History

History
142 lines (128 loc) · 6.31 KB

PE201-Cyber-Forensics.org

File metadata and controls

142 lines (128 loc) · 6.31 KB

<<<PE201>>> CYBER FORENSICS

CO PO MAPPING

PO1PO2PO3PO4PO5PO6PO7PO8PO9PO10PO11PO12PSO1PSO2PSO3
K3K4K5K5K6-------K5K3K6
CO1K2221011010000121
CO2K3322011010000231
CO3K3322011010000231
CO4K2221011010000121
CO5K3322011010000231
Score131080550500008135
Course Mapping322011010000231

{{{credits}}}

LTPC
3003

REVISION 2018

  1. Almost the same as AU
  2. The changes are listed below.
    • Unit-1: AU-Unit I included.
    • Unit-2: AU-Unit I topics included AU-Unit I data acquisition topics is elaborated
    • Unit-3: AU-Unit II topics included AU-Unit III topics included
    • Unit-4: AU-Unit III topics included
    • Unit-5: New tools topics included Ehtical hacking given in AU-Unit IV in SNU syllabus and V is not included in SNU.
  3. Not Applicable
  4. Five Course outcomes specified and aligned with units
  5. Not Applicable
  6. Did not include Kali Linux or Metasploit tools, as they are penetration testing tools to detect the vulnerabilities.

COURSE OBJECTIVES

  • To learn computer forensics and understand incident response
  • To know the methods to collect and store digital evidence
  • To understand the approaches to analyse and validate data
  • To investigate network and mobile forensic data
  • To be familiar with forensics tools.

{{{unit}}}

UNIT IINTRODUCTION TO COMPUTER FORENSICS9

Understanding Computer Forensics; Introduction to the Incident Response Process; Preparing for Incident Response: Overview of pre-incident preparation – Identifying risk – Preparing individual hosts – Preparing a network – Establishing appropriate policies and procedures – Creating a response toolkit – Establishing an incident response team.

{{{unit}}}

UNIT IIDATA ACQUISITION9

After Detection of an Incident: Initial response phase – Incident notification procedure – Recording the details – Incident declaration – Assembling the CSIRT – Traditional investigative steps – Conducting interviews – Response strategy; Data Acquisition: Storage formats – Best acquisition method – Image acquisitions – Acquisition tools – Validating data acquisitions – RAID data acquisitions – Remote network acquisition tools.

{{{unit}}}

UNIT IIIANALYSIS AND VALIDATION9

Processing Crime and Incident Scenes: Identifying digital evidence – Private sector IS – Processing law enforcement CS – Search – Securing CS – Seizing – Storing – Digital hash – Reviewing a case; Working with Windows and DOS Systems: Examining NTFS disks; Computer Forensics Analysis and Validation: Data to collect and analyze – Validating – Data hiding techniques – Remote acquisition.

{{{unit}}}

UNIT IVNETWORK AND MOBILE FORENSICS9

Network Forensics: Developing standard procedures for network forensics – Using network tools; E-mail Investigations: Understanding e-mail servers – Using specialized e-mail forensics tools; Cell Phone and Mobile Device Forensics: Understanding mobile device forensics – Understanding acquisition procedures for cell phones and mobile devices.

{{{unit}}}

UNIT VCOMPUTER FORENSIC TOOLS9

The Investigator’s Office and Laboratory: Understanding forensics lab certification requirements – Determining the physical requirements for a computer forensics lab; Computer Forensic tools: Encase – Helix – FTK – Autopsy – Sleuth kit forensic browser – FIRE – Found stone forensic toolKit – WinHex – Linux and other open source tools; Case Study : Banking Industry Executive Level Financial Fraud .

\hfill Total Periods: 45

COURSE OUTCOMES

After the completion of this course, students will be able to:

  • Understand the preparation of incident response (K2)
  • Apply data acquisition techniques (K3)
  • Analyze and validate forensics data (K3)
  • Understand network and mobile forensics (K2)
  • Use forensics tools (K3).

TEXT BOOKS

  1. Chris Prosise, Kevin Mandia, “Incident Response and Computer Forensics”, 2nd Edition, McGraw-Hill 2003.
  2. Nelson, Phillips, Enfinger, Steuart, “Computer Forensics and Investigations”, Cengage Learning, India Edition, 2008.

REFERENCES

  1. Dhillon G, “Principles of Information Systems Security”, John Wiley & Sons, 2007.
  2. Whitman M E, Mattord H J, “Principles of Information Security”, 3rd Edition, Thompson Course Technology, 2009.
  3. John R Vacca, “Computer Forensics”, Cengage Learning, 2005.
  4. Marjie T Britz, “Computer Forensics and Cyber Crime: An Introduction”, 3rd Edition, Prentice Hall, 2013.
  5. Marcella Jr, Albert, and Doug Menendez, “Cyber Forensics: a Field Manual for Collecting, Examining, and Preserving Evidence of Computer Crimes”, Auerbach Publications, 2007.
  6. https://evestigate.com/Case_Studies/Case%20Study%20Banking%20Industry%20Finacial%20Fraud%20by%20Board%20Member%20Director%20CFO.pdf