analog-vs-digital-communication (concept of analog and digital).pptx
unit 3.pptx
1. ONLINE
FACULTY ORIENTATION PROGRAMME
ON
CYBER SECURITY
(TE IT 2019 Course)
RESOURCE PERSON
Mr. Tushar A. Rane, PICT, Pune
tarane@pict.edu
+ 91 9850960081
ORGANIZED BY
Department of Information Technology,
D. Y. Patil College of Engineering, Akurdi, Pune.
IN ASSOCIATION WITH
BoS-IT, Savitribai Phule Pune University (SPPU), Pune.
2. Computer Network & Security
August 18, 2022 2
Programme: UG Programme in
Information Technology
Class: T.E (Info. Tech.)
A.Y. 2021-22
Sem. II
Course Code : 314454 (B) Course : Cyber Security
Corresponding Lab Code : 314458 Lab Name: Cyber Security Lab
Teaching Scheme Examination Scheme
Theory Practical Tutorial Theory Lab
(hrs/week) (hrs/week) (hrs/week)
Online/
Insem
Endsem Sessional
Term
Work
Practical Oral
3 hrs 4 hrs ---- 30 70 --- 25 50 --
3. August 18, 2022
3
Cyber Security: Course Outcomes
UNIT – III : Cyber Forensics
Course Objectives:
3
To understand the basics cyber forensics, network forensics,
Email forensics, web forensics and crypto currency forensics.
Course Outcomes:
CO – 3
Illustrate cyber forensic techniques to identify the
criminal activities.
4. UNIT – II : Cyber Security
4
Sr No Contents Ref.
1 Introduction to Cyber Forensics: What are cyber forensics,
cyber forensics investigation process, digital evidence,
challenges in cyber forensics;
T – 1
2 Web Attack Forensics: Intrusion forensics, database forensics,
preventive forensics; Anti- forensics practices, Anti-forensics
detection techniques, Network forensics analysis tools;
T – 1
3 Forensics: Malware types, Malware Analysis, Tools for
analysis;
T – 1
4 Email Forensics: e-mail Protocols, e-mail crimes, email
forensics;
T – 1
5 Bitcoin : Forensics: crypto currency, crimes related to bitcoin; T – 1
6 Case Study: A detailed case study on cyber forensics and its
Investigation Reports.
T – 1
References
1. Practical Cyber Forensics : An Incident-Based Approach to Forensic
Investigations - Niranjan Reddy
August 18, 2022
5. UNIT – II : Cyber Security
5
August 18, 2022
Introduction to Cyber Forensics:
What are cyber forensics,
Brief about Cyber
Forensics investigation process,
Forensic protocol for Ev Incident, Identification,
Seizure, Imaging, Hashing,
Analysis, Reporting, Preservationidence Acquisition,
Digital Forensics standards and guidelines.
Digital evidence,
Challenges in cyber forensics.
6. UNIT – II : Cyber Security
6
August 18, 2022
Web Attack Forensics:
OWASP – Open Web Application Security Project.
Injection
Broken authentication
Sensitive data exposure
Broken access control
Security mis-configurations
Cross site scripting (XSS)
Web Attack Tests
Static Analysis
Dynamic Analysis
Hybrid Analysis.
7. UNIT – II : Cyber Security
7
August 18, 2022
Intrusion forensics
Forensic approach
Data Monitoring
Data Analysis
Traceback
IP Traceback
ICMP Traceback
Hash-Based Traceback
Database forensics
Log Forensics
Preventive forensics.
8. UNIT – II : Cyber Security
8
August 18, 2022
Anti-forensics practices
Data wiping & shredding : Data Remanence, Degaussing,
Trail obfuscation : Spoofing, Data Modification
Encryption : Different Techniques
Data Hiding : Steganography and Cryptography
Anti-forensics Detection Techniques
Network Forensics
OSI Model, Forensic Footprints, Seizure of N/W Devices,
Network Forensic Artifacts, Attacks, Drive-By Downloads.
Network forensics Analysis Tools
Wire shark, Network Miner, Xplico