SlideShare a Scribd company logo
1 of 14
ONLINE
FACULTY ORIENTATION PROGRAMME
ON
CYBER SECURITY
(TE IT 2019 Course)
RESOURCE PERSON
Mr. Tushar A. Rane, PICT, Pune
tarane@pict.edu
+ 91 9850960081
ORGANIZED BY
Department of Information Technology,
D. Y. Patil College of Engineering, Akurdi, Pune.
IN ASSOCIATION WITH
BoS-IT, Savitribai Phule Pune University (SPPU), Pune.
Computer Network & Security
August 18, 2022 2
Programme: UG Programme in
Information Technology
Class: T.E (Info. Tech.)
A.Y. 2021-22
Sem. II
Course Code : 314454 (B) Course : Cyber Security
Corresponding Lab Code : 314458 Lab Name: Cyber Security Lab
Teaching Scheme Examination Scheme
Theory Practical Tutorial Theory Lab
(hrs/week) (hrs/week) (hrs/week)
Online/
Insem
Endsem Sessional
Term
Work
Practical Oral
3 hrs 4 hrs ---- 30 70 --- 25 50 --
August 18, 2022
3
Cyber Security: Course Outcomes
UNIT – III : Cyber Forensics
Course Objectives:
3
To understand the basics cyber forensics, network forensics,
Email forensics, web forensics and crypto currency forensics.
Course Outcomes:
CO – 3
Illustrate cyber forensic techniques to identify the
criminal activities.
UNIT – II : Cyber Security
4
Sr No Contents Ref.
1 Introduction to Cyber Forensics: What are cyber forensics,
cyber forensics investigation process, digital evidence,
challenges in cyber forensics;
T – 1
2 Web Attack Forensics: Intrusion forensics, database forensics,
preventive forensics; Anti- forensics practices, Anti-forensics
detection techniques, Network forensics analysis tools;
T – 1
3 Forensics: Malware types, Malware Analysis, Tools for
analysis;
T – 1
4 Email Forensics: e-mail Protocols, e-mail crimes, email
forensics;
T – 1
5 Bitcoin : Forensics: crypto currency, crimes related to bitcoin; T – 1
6 Case Study: A detailed case study on cyber forensics and its
Investigation Reports.
T – 1
References
1. Practical Cyber Forensics : An Incident-Based Approach to Forensic
Investigations - Niranjan Reddy
August 18, 2022
UNIT – II : Cyber Security
5
August 18, 2022
Introduction to Cyber Forensics:
 What are cyber forensics,
 Brief about Cyber
 Forensics investigation process,
Forensic protocol for Ev Incident, Identification,
Seizure, Imaging, Hashing,
Analysis, Reporting, Preservationidence Acquisition,
 Digital Forensics standards and guidelines.
 Digital evidence,
 Challenges in cyber forensics.
UNIT – II : Cyber Security
6
August 18, 2022
Web Attack Forensics:
 OWASP – Open Web Application Security Project.
 Injection
 Broken authentication
 Sensitive data exposure
 Broken access control
 Security mis-configurations
 Cross site scripting (XSS)
 Web Attack Tests
 Static Analysis
 Dynamic Analysis
 Hybrid Analysis.
UNIT – II : Cyber Security
7
August 18, 2022
 Intrusion forensics
 Forensic approach
 Data Monitoring
 Data Analysis
 Traceback
 IP Traceback
 ICMP Traceback
 Hash-Based Traceback
 Database forensics
 Log Forensics
 Preventive forensics.
UNIT – II : Cyber Security
8
August 18, 2022
 Anti-forensics practices
 Data wiping & shredding : Data Remanence, Degaussing,
 Trail obfuscation : Spoofing, Data Modification
 Encryption : Different Techniques
 Data Hiding : Steganography and Cryptography
 Anti-forensics Detection Techniques
 Network Forensics
 OSI Model, Forensic Footprints, Seizure of N/W Devices,
Network Forensic Artifacts, Attacks, Drive-By Downloads.
 Network forensics Analysis Tools
 Wire shark, Network Miner, Xplico
UNIT – II : Cyber Security
9
August 18, 2022
Malware Forensics
 Malware types
 Viruses, Worms, Trojan, Rootkits, Spyware, Adware,
Exploits, Ransomware, Bot
 Malware Analysis
 Static Analysis, Dynamic Analysis
 Tools for analysis
 Cuckoo Sandbox, Yara Rules/Analyzer, ReMnux,
Google Rapid Response Framework, Radare
 Challenges
UNIT – II : Cyber Security
10
August 18, 2022
Email Forensics
 Email Protocols
 SMTP, POP3, IMAP
 Email Crimes
 Phishing, Spam, Email Harvesting, Email Bombing
 Email forensics
 Recovering Emails, Some Techniques,
Email Header Analysis, Retrieve Email Headers,
Bait Method
UNIT – II : Cyber Security
11
August 18, 2022
Bitcoin Forensics
 Crypto currency
 Bitcoin, Ether, Ripple, Monero, Litecoin
 Wallet
 Hot Wallet – Desktop, Mobile, Online Wallets
 Cold Wallet – Hardware, Trezor, Paper Wallets
 Crimes related to Bitcoin
 Using Bitcoins Over Dark Web for Illegal Purchase
 Ponzi Schemes
 Fake Exchanges, Wallets
 Cryptojacking
UNIT – II : Cyber Security
12
August 18, 2022
Case Study:
A detailed case study on cyber forensics and its
Investigation Reports.
August 18, 2022 13
Suggestions are Welcome!
14
Thank you!!
August 18, 2022

More Related Content

Similar to unit 3.pptx

CYBER SECURITY (R18A0521).pdf
CYBER SECURITY (R18A0521).pdfCYBER SECURITY (R18A0521).pdf
CYBER SECURITY (R18A0521).pdfJayaMalaR6
 
11th International Conference on Cryptography and Information Security (CRYPI...
11th International Conference on Cryptography and Information Security (CRYPI...11th International Conference on Cryptography and Information Security (CRYPI...
11th International Conference on Cryptography and Information Security (CRYPI...ijdms
 
Research Topics in Network Security for PhD
Research Topics in Network Security for PhDResearch Topics in Network Security for PhD
Research Topics in Network Security for PhDPhdtopiccom
 
Digital Security Capacity Building: Role of the University
Digital Security Capacity Building: Role of the UniversityDigital Security Capacity Building: Role of the University
Digital Security Capacity Building: Role of the UniversityNizar Ben Neji
 
15th International Conference on Network Security & Applications (CNSA 2022)
15th International Conference on Network Security & Applications (CNSA 2022)15th International Conference on Network Security & Applications (CNSA 2022)
15th International Conference on Network Security & Applications (CNSA 2022)ijcisjournal
 
Call for Papers - 15th International Conference on Network Security & Applica...
Call for Papers - 15th International Conference on Network Security & Applica...Call for Papers - 15th International Conference on Network Security & Applica...
Call for Papers - 15th International Conference on Network Security & Applica...IJNSA Journal
 
L12. Digital Forensics BS.pptx
L12. Digital Forensics BS.pptxL12. Digital Forensics BS.pptx
L12. Digital Forensics BS.pptxtalhajann43
 
Implications of GDPR for IoT Big Data Security and Privacy Fabric
Implications of GDPR for IoT Big Data Security and Privacy FabricImplications of GDPR for IoT Big Data Security and Privacy Fabric
Implications of GDPR for IoT Big Data Security and Privacy FabricMark Underwood
 
Call For papers - CRYPIS 2022 : 11th International Conference on Cryptography...
Call For papers - CRYPIS 2022 : 11th International Conference on Cryptography...Call For papers - CRYPIS 2022 : 11th International Conference on Cryptography...
Call For papers - CRYPIS 2022 : 11th International Conference on Cryptography...IJITCA Journal
 
11th International Conference on Cryptography and Information Security (CRYPI...
11th International Conference on Cryptography and Information Security (CRYPI...11th International Conference on Cryptography and Information Security (CRYPI...
11th International Conference on Cryptography and Information Security (CRYPI...ijcsity
 
Review on Computer Forensic
Review on Computer ForensicReview on Computer Forensic
Review on Computer ForensicEditor IJCTER
 
A Comprehensive Survey on Exiting Solution Approaches towards Security and Pr...
A Comprehensive Survey on Exiting Solution Approaches towards Security and Pr...A Comprehensive Survey on Exiting Solution Approaches towards Security and Pr...
A Comprehensive Survey on Exiting Solution Approaches towards Security and Pr...IJECEIAES
 
Cyber Law and Security
Cyber Law and SecurityCyber Law and Security
Cyber Law and SecurityIMT CDL
 
Security and Authentication of Internet of Things (IoT) Devices
Security and Authentication of Internet of Things (IoT) DevicesSecurity and Authentication of Internet of Things (IoT) Devices
Security and Authentication of Internet of Things (IoT) DevicesSanjayKumarYadav58
 
CALL FOR PAPERS - 4th International Conference on Networks and Security (NSEC...
CALL FOR PAPERS - 4th International Conference on Networks and Security (NSEC...CALL FOR PAPERS - 4th International Conference on Networks and Security (NSEC...
CALL FOR PAPERS - 4th International Conference on Networks and Security (NSEC...pijans
 
11th International Conference on Cryptography and Information Security (CRYP...
11th International Conference on Cryptography and Information  Security (CRYP...11th International Conference on Cryptography and Information  Security (CRYP...
11th International Conference on Cryptography and Information Security (CRYP...IJCSEA Journal
 

Similar to unit 3.pptx (20)

CYBER SECURITY (R18A0521).pdf
CYBER SECURITY (R18A0521).pdfCYBER SECURITY (R18A0521).pdf
CYBER SECURITY (R18A0521).pdf
 
11th International Conference on Cryptography and Information Security (CRYPI...
11th International Conference on Cryptography and Information Security (CRYPI...11th International Conference on Cryptography and Information Security (CRYPI...
11th International Conference on Cryptography and Information Security (CRYPI...
 
cyber security.pdf
cyber security.pdfcyber security.pdf
cyber security.pdf
 
Cyber security
Cyber security Cyber security
Cyber security
 
Research Topics in Network Security for PhD
Research Topics in Network Security for PhDResearch Topics in Network Security for PhD
Research Topics in Network Security for PhD
 
Digital Security Capacity Building: Role of the University
Digital Security Capacity Building: Role of the UniversityDigital Security Capacity Building: Role of the University
Digital Security Capacity Building: Role of the University
 
15th International Conference on Network Security & Applications (CNSA 2022)
15th International Conference on Network Security & Applications (CNSA 2022)15th International Conference on Network Security & Applications (CNSA 2022)
15th International Conference on Network Security & Applications (CNSA 2022)
 
Call for Papers - 15th International Conference on Network Security & Applica...
Call for Papers - 15th International Conference on Network Security & Applica...Call for Papers - 15th International Conference on Network Security & Applica...
Call for Papers - 15th International Conference on Network Security & Applica...
 
Cyber security
Cyber securityCyber security
Cyber security
 
L12. Digital Forensics BS.pptx
L12. Digital Forensics BS.pptxL12. Digital Forensics BS.pptx
L12. Digital Forensics BS.pptx
 
Implications of GDPR for IoT Big Data Security and Privacy Fabric
Implications of GDPR for IoT Big Data Security and Privacy FabricImplications of GDPR for IoT Big Data Security and Privacy Fabric
Implications of GDPR for IoT Big Data Security and Privacy Fabric
 
Call For papers - CRYPIS 2022 : 11th International Conference on Cryptography...
Call For papers - CRYPIS 2022 : 11th International Conference on Cryptography...Call For papers - CRYPIS 2022 : 11th International Conference on Cryptography...
Call For papers - CRYPIS 2022 : 11th International Conference on Cryptography...
 
11th International Conference on Cryptography and Information Security (CRYPI...
11th International Conference on Cryptography and Information Security (CRYPI...11th International Conference on Cryptography and Information Security (CRYPI...
11th International Conference on Cryptography and Information Security (CRYPI...
 
Review on Computer Forensic
Review on Computer ForensicReview on Computer Forensic
Review on Computer Forensic
 
A Comprehensive Survey on Exiting Solution Approaches towards Security and Pr...
A Comprehensive Survey on Exiting Solution Approaches towards Security and Pr...A Comprehensive Survey on Exiting Solution Approaches towards Security and Pr...
A Comprehensive Survey on Exiting Solution Approaches towards Security and Pr...
 
Cyber Law and Security
Cyber Law and SecurityCyber Law and Security
Cyber Law and Security
 
Security and Authentication of Internet of Things (IoT) Devices
Security and Authentication of Internet of Things (IoT) DevicesSecurity and Authentication of Internet of Things (IoT) Devices
Security and Authentication of Internet of Things (IoT) Devices
 
CALL FOR PAPERS - 4th International Conference on Networks and Security (NSEC...
CALL FOR PAPERS - 4th International Conference on Networks and Security (NSEC...CALL FOR PAPERS - 4th International Conference on Networks and Security (NSEC...
CALL FOR PAPERS - 4th International Conference on Networks and Security (NSEC...
 
11th International Conference on Cryptography and Information Security (CRYP...
11th International Conference on Cryptography and Information  Security (CRYP...11th International Conference on Cryptography and Information  Security (CRYP...
11th International Conference on Cryptography and Information Security (CRYP...
 
Internet of Things Forensics
Internet of Things ForensicsInternet of Things Forensics
Internet of Things Forensics
 

Recently uploaded

Worksharing and 3D Modeling with Revit.pptx
Worksharing and 3D Modeling with Revit.pptxWorksharing and 3D Modeling with Revit.pptx
Worksharing and 3D Modeling with Revit.pptxMustafa Ahmed
 
Adsorption (mass transfer operations 2) ppt
Adsorption (mass transfer operations 2) pptAdsorption (mass transfer operations 2) ppt
Adsorption (mass transfer operations 2) pptjigup7320
 
Seismic Hazard Assessment Software in Python by Prof. Dr. Costas Sachpazis
Seismic Hazard Assessment Software in Python by Prof. Dr. Costas SachpazisSeismic Hazard Assessment Software in Python by Prof. Dr. Costas Sachpazis
Seismic Hazard Assessment Software in Python by Prof. Dr. Costas SachpazisDr.Costas Sachpazis
 
Raashid final report on Embedded Systems
Raashid final report on Embedded SystemsRaashid final report on Embedded Systems
Raashid final report on Embedded SystemsRaashidFaiyazSheikh
 
Research Methodolgy & Intellectual Property Rights Series 1
Research Methodolgy & Intellectual Property Rights Series 1Research Methodolgy & Intellectual Property Rights Series 1
Research Methodolgy & Intellectual Property Rights Series 1T.D. Shashikala
 
NEWLETTER FRANCE HELICES/ SDS SURFACE DRIVES - MAY 2024
NEWLETTER FRANCE HELICES/ SDS SURFACE DRIVES - MAY 2024NEWLETTER FRANCE HELICES/ SDS SURFACE DRIVES - MAY 2024
NEWLETTER FRANCE HELICES/ SDS SURFACE DRIVES - MAY 2024EMMANUELLEFRANCEHELI
 
NO1 Best Powerful Vashikaran Specialist Baba Vashikaran Specialist For Love V...
NO1 Best Powerful Vashikaran Specialist Baba Vashikaran Specialist For Love V...NO1 Best Powerful Vashikaran Specialist Baba Vashikaran Specialist For Love V...
NO1 Best Powerful Vashikaran Specialist Baba Vashikaran Specialist For Love V...Amil baba
 
litvinenko_Henry_Intrusion_Hong-Kong_2024.pdf
litvinenko_Henry_Intrusion_Hong-Kong_2024.pdflitvinenko_Henry_Intrusion_Hong-Kong_2024.pdf
litvinenko_Henry_Intrusion_Hong-Kong_2024.pdfAlexander Litvinenko
 
Filters for Electromagnetic Compatibility Applications
Filters for Electromagnetic Compatibility ApplicationsFilters for Electromagnetic Compatibility Applications
Filters for Electromagnetic Compatibility ApplicationsMathias Magdowski
 
Final DBMS Manual (2).pdf final lab manual
Final DBMS Manual (2).pdf final lab manualFinal DBMS Manual (2).pdf final lab manual
Final DBMS Manual (2).pdf final lab manualBalamuruganV28
 
Interfacing Analog to Digital Data Converters ee3404.pdf
Interfacing Analog to Digital Data Converters ee3404.pdfInterfacing Analog to Digital Data Converters ee3404.pdf
Interfacing Analog to Digital Data Converters ee3404.pdfragupathi90
 
Involute of a circle,Square, pentagon,HexagonInvolute_Engineering Drawing.pdf
Involute of a circle,Square, pentagon,HexagonInvolute_Engineering Drawing.pdfInvolute of a circle,Square, pentagon,HexagonInvolute_Engineering Drawing.pdf
Involute of a circle,Square, pentagon,HexagonInvolute_Engineering Drawing.pdfJNTUA
 
15-Minute City: A Completely New Horizon
15-Minute City: A Completely New Horizon15-Minute City: A Completely New Horizon
15-Minute City: A Completely New HorizonMorshed Ahmed Rahath
 
UNIT 4 PTRP final Convergence in probability.pptx
UNIT 4 PTRP final Convergence in probability.pptxUNIT 4 PTRP final Convergence in probability.pptx
UNIT 4 PTRP final Convergence in probability.pptxkalpana413121
 
Maher Othman Interior Design Portfolio..
Maher Othman Interior Design Portfolio..Maher Othman Interior Design Portfolio..
Maher Othman Interior Design Portfolio..MaherOthman7
 
Artificial intelligence presentation2-171219131633.pdf
Artificial intelligence presentation2-171219131633.pdfArtificial intelligence presentation2-171219131633.pdf
Artificial intelligence presentation2-171219131633.pdfKira Dess
 
Tembisa Central Terminating Pills +27838792658 PHOMOLONG Top Abortion Pills F...
Tembisa Central Terminating Pills +27838792658 PHOMOLONG Top Abortion Pills F...Tembisa Central Terminating Pills +27838792658 PHOMOLONG Top Abortion Pills F...
Tembisa Central Terminating Pills +27838792658 PHOMOLONG Top Abortion Pills F...drjose256
 
Augmented Reality (AR) with Augin Software.pptx
Augmented Reality (AR) with Augin Software.pptxAugmented Reality (AR) with Augin Software.pptx
Augmented Reality (AR) with Augin Software.pptxMustafa Ahmed
 
CLOUD COMPUTING SERVICES - Cloud Reference Modal
CLOUD COMPUTING SERVICES - Cloud Reference ModalCLOUD COMPUTING SERVICES - Cloud Reference Modal
CLOUD COMPUTING SERVICES - Cloud Reference ModalSwarnaSLcse
 
analog-vs-digital-communication (concept of analog and digital).pptx
analog-vs-digital-communication (concept of analog and digital).pptxanalog-vs-digital-communication (concept of analog and digital).pptx
analog-vs-digital-communication (concept of analog and digital).pptxKarpagam Institute of Teechnology
 

Recently uploaded (20)

Worksharing and 3D Modeling with Revit.pptx
Worksharing and 3D Modeling with Revit.pptxWorksharing and 3D Modeling with Revit.pptx
Worksharing and 3D Modeling with Revit.pptx
 
Adsorption (mass transfer operations 2) ppt
Adsorption (mass transfer operations 2) pptAdsorption (mass transfer operations 2) ppt
Adsorption (mass transfer operations 2) ppt
 
Seismic Hazard Assessment Software in Python by Prof. Dr. Costas Sachpazis
Seismic Hazard Assessment Software in Python by Prof. Dr. Costas SachpazisSeismic Hazard Assessment Software in Python by Prof. Dr. Costas Sachpazis
Seismic Hazard Assessment Software in Python by Prof. Dr. Costas Sachpazis
 
Raashid final report on Embedded Systems
Raashid final report on Embedded SystemsRaashid final report on Embedded Systems
Raashid final report on Embedded Systems
 
Research Methodolgy & Intellectual Property Rights Series 1
Research Methodolgy & Intellectual Property Rights Series 1Research Methodolgy & Intellectual Property Rights Series 1
Research Methodolgy & Intellectual Property Rights Series 1
 
NEWLETTER FRANCE HELICES/ SDS SURFACE DRIVES - MAY 2024
NEWLETTER FRANCE HELICES/ SDS SURFACE DRIVES - MAY 2024NEWLETTER FRANCE HELICES/ SDS SURFACE DRIVES - MAY 2024
NEWLETTER FRANCE HELICES/ SDS SURFACE DRIVES - MAY 2024
 
NO1 Best Powerful Vashikaran Specialist Baba Vashikaran Specialist For Love V...
NO1 Best Powerful Vashikaran Specialist Baba Vashikaran Specialist For Love V...NO1 Best Powerful Vashikaran Specialist Baba Vashikaran Specialist For Love V...
NO1 Best Powerful Vashikaran Specialist Baba Vashikaran Specialist For Love V...
 
litvinenko_Henry_Intrusion_Hong-Kong_2024.pdf
litvinenko_Henry_Intrusion_Hong-Kong_2024.pdflitvinenko_Henry_Intrusion_Hong-Kong_2024.pdf
litvinenko_Henry_Intrusion_Hong-Kong_2024.pdf
 
Filters for Electromagnetic Compatibility Applications
Filters for Electromagnetic Compatibility ApplicationsFilters for Electromagnetic Compatibility Applications
Filters for Electromagnetic Compatibility Applications
 
Final DBMS Manual (2).pdf final lab manual
Final DBMS Manual (2).pdf final lab manualFinal DBMS Manual (2).pdf final lab manual
Final DBMS Manual (2).pdf final lab manual
 
Interfacing Analog to Digital Data Converters ee3404.pdf
Interfacing Analog to Digital Data Converters ee3404.pdfInterfacing Analog to Digital Data Converters ee3404.pdf
Interfacing Analog to Digital Data Converters ee3404.pdf
 
Involute of a circle,Square, pentagon,HexagonInvolute_Engineering Drawing.pdf
Involute of a circle,Square, pentagon,HexagonInvolute_Engineering Drawing.pdfInvolute of a circle,Square, pentagon,HexagonInvolute_Engineering Drawing.pdf
Involute of a circle,Square, pentagon,HexagonInvolute_Engineering Drawing.pdf
 
15-Minute City: A Completely New Horizon
15-Minute City: A Completely New Horizon15-Minute City: A Completely New Horizon
15-Minute City: A Completely New Horizon
 
UNIT 4 PTRP final Convergence in probability.pptx
UNIT 4 PTRP final Convergence in probability.pptxUNIT 4 PTRP final Convergence in probability.pptx
UNIT 4 PTRP final Convergence in probability.pptx
 
Maher Othman Interior Design Portfolio..
Maher Othman Interior Design Portfolio..Maher Othman Interior Design Portfolio..
Maher Othman Interior Design Portfolio..
 
Artificial intelligence presentation2-171219131633.pdf
Artificial intelligence presentation2-171219131633.pdfArtificial intelligence presentation2-171219131633.pdf
Artificial intelligence presentation2-171219131633.pdf
 
Tembisa Central Terminating Pills +27838792658 PHOMOLONG Top Abortion Pills F...
Tembisa Central Terminating Pills +27838792658 PHOMOLONG Top Abortion Pills F...Tembisa Central Terminating Pills +27838792658 PHOMOLONG Top Abortion Pills F...
Tembisa Central Terminating Pills +27838792658 PHOMOLONG Top Abortion Pills F...
 
Augmented Reality (AR) with Augin Software.pptx
Augmented Reality (AR) with Augin Software.pptxAugmented Reality (AR) with Augin Software.pptx
Augmented Reality (AR) with Augin Software.pptx
 
CLOUD COMPUTING SERVICES - Cloud Reference Modal
CLOUD COMPUTING SERVICES - Cloud Reference ModalCLOUD COMPUTING SERVICES - Cloud Reference Modal
CLOUD COMPUTING SERVICES - Cloud Reference Modal
 
analog-vs-digital-communication (concept of analog and digital).pptx
analog-vs-digital-communication (concept of analog and digital).pptxanalog-vs-digital-communication (concept of analog and digital).pptx
analog-vs-digital-communication (concept of analog and digital).pptx
 

unit 3.pptx

  • 1. ONLINE FACULTY ORIENTATION PROGRAMME ON CYBER SECURITY (TE IT 2019 Course) RESOURCE PERSON Mr. Tushar A. Rane, PICT, Pune tarane@pict.edu + 91 9850960081 ORGANIZED BY Department of Information Technology, D. Y. Patil College of Engineering, Akurdi, Pune. IN ASSOCIATION WITH BoS-IT, Savitribai Phule Pune University (SPPU), Pune.
  • 2. Computer Network & Security August 18, 2022 2 Programme: UG Programme in Information Technology Class: T.E (Info. Tech.) A.Y. 2021-22 Sem. II Course Code : 314454 (B) Course : Cyber Security Corresponding Lab Code : 314458 Lab Name: Cyber Security Lab Teaching Scheme Examination Scheme Theory Practical Tutorial Theory Lab (hrs/week) (hrs/week) (hrs/week) Online/ Insem Endsem Sessional Term Work Practical Oral 3 hrs 4 hrs ---- 30 70 --- 25 50 --
  • 3. August 18, 2022 3 Cyber Security: Course Outcomes UNIT – III : Cyber Forensics Course Objectives: 3 To understand the basics cyber forensics, network forensics, Email forensics, web forensics and crypto currency forensics. Course Outcomes: CO – 3 Illustrate cyber forensic techniques to identify the criminal activities.
  • 4. UNIT – II : Cyber Security 4 Sr No Contents Ref. 1 Introduction to Cyber Forensics: What are cyber forensics, cyber forensics investigation process, digital evidence, challenges in cyber forensics; T – 1 2 Web Attack Forensics: Intrusion forensics, database forensics, preventive forensics; Anti- forensics practices, Anti-forensics detection techniques, Network forensics analysis tools; T – 1 3 Forensics: Malware types, Malware Analysis, Tools for analysis; T – 1 4 Email Forensics: e-mail Protocols, e-mail crimes, email forensics; T – 1 5 Bitcoin : Forensics: crypto currency, crimes related to bitcoin; T – 1 6 Case Study: A detailed case study on cyber forensics and its Investigation Reports. T – 1 References 1. Practical Cyber Forensics : An Incident-Based Approach to Forensic Investigations - Niranjan Reddy August 18, 2022
  • 5. UNIT – II : Cyber Security 5 August 18, 2022 Introduction to Cyber Forensics:  What are cyber forensics,  Brief about Cyber  Forensics investigation process, Forensic protocol for Ev Incident, Identification, Seizure, Imaging, Hashing, Analysis, Reporting, Preservationidence Acquisition,  Digital Forensics standards and guidelines.  Digital evidence,  Challenges in cyber forensics.
  • 6. UNIT – II : Cyber Security 6 August 18, 2022 Web Attack Forensics:  OWASP – Open Web Application Security Project.  Injection  Broken authentication  Sensitive data exposure  Broken access control  Security mis-configurations  Cross site scripting (XSS)  Web Attack Tests  Static Analysis  Dynamic Analysis  Hybrid Analysis.
  • 7. UNIT – II : Cyber Security 7 August 18, 2022  Intrusion forensics  Forensic approach  Data Monitoring  Data Analysis  Traceback  IP Traceback  ICMP Traceback  Hash-Based Traceback  Database forensics  Log Forensics  Preventive forensics.
  • 8. UNIT – II : Cyber Security 8 August 18, 2022  Anti-forensics practices  Data wiping & shredding : Data Remanence, Degaussing,  Trail obfuscation : Spoofing, Data Modification  Encryption : Different Techniques  Data Hiding : Steganography and Cryptography  Anti-forensics Detection Techniques  Network Forensics  OSI Model, Forensic Footprints, Seizure of N/W Devices, Network Forensic Artifacts, Attacks, Drive-By Downloads.  Network forensics Analysis Tools  Wire shark, Network Miner, Xplico
  • 9. UNIT – II : Cyber Security 9 August 18, 2022 Malware Forensics  Malware types  Viruses, Worms, Trojan, Rootkits, Spyware, Adware, Exploits, Ransomware, Bot  Malware Analysis  Static Analysis, Dynamic Analysis  Tools for analysis  Cuckoo Sandbox, Yara Rules/Analyzer, ReMnux, Google Rapid Response Framework, Radare  Challenges
  • 10. UNIT – II : Cyber Security 10 August 18, 2022 Email Forensics  Email Protocols  SMTP, POP3, IMAP  Email Crimes  Phishing, Spam, Email Harvesting, Email Bombing  Email forensics  Recovering Emails, Some Techniques, Email Header Analysis, Retrieve Email Headers, Bait Method
  • 11. UNIT – II : Cyber Security 11 August 18, 2022 Bitcoin Forensics  Crypto currency  Bitcoin, Ether, Ripple, Monero, Litecoin  Wallet  Hot Wallet – Desktop, Mobile, Online Wallets  Cold Wallet – Hardware, Trezor, Paper Wallets  Crimes related to Bitcoin  Using Bitcoins Over Dark Web for Illegal Purchase  Ponzi Schemes  Fake Exchanges, Wallets  Cryptojacking
  • 12. UNIT – II : Cyber Security 12 August 18, 2022 Case Study: A detailed case study on cyber forensics and its Investigation Reports.
  • 13. August 18, 2022 13 Suggestions are Welcome!