SlideShare a Scribd company logo
ONLINE
FACULTY ORIENTATION PROGRAMME
ON
CYBER SECURITY
(TE IT 2019 Course)
RESOURCE PERSON
Mr. Tushar A. Rane, PICT, Pune
tarane@pict.edu
+ 91 9850960081
ORGANIZED BY
Department of Information Technology,
D. Y. Patil College of Engineering, Akurdi, Pune.
IN ASSOCIATION WITH
BoS-IT, Savitribai Phule Pune University (SPPU), Pune.
Computer Network & Security
August 18, 2022 2
Programme: UG Programme in
Information Technology
Class: T.E (Info. Tech.)
A.Y. 2021-22
Sem. II
Course Code : 314454 (B) Course : Cyber Security
Corresponding Lab Code : 314458 Lab Name: Cyber Security Lab
Teaching Scheme Examination Scheme
Theory Practical Tutorial Theory Lab
(hrs/week) (hrs/week) (hrs/week)
Online/
Insem
Endsem Sessional
Term
Work
Practical Oral
3 hrs 4 hrs ---- 30 70 --- 25 50 --
August 18, 2022
3
Cyber Security: Course Outcomes
UNIT – III : Cyber Forensics
Course Objectives:
3
To understand the basics cyber forensics, network forensics,
Email forensics, web forensics and crypto currency forensics.
Course Outcomes:
CO – 3
Illustrate cyber forensic techniques to identify the
criminal activities.
UNIT – II : Cyber Security
4
Sr No Contents Ref.
1 Introduction to Cyber Forensics: What are cyber forensics,
cyber forensics investigation process, digital evidence,
challenges in cyber forensics;
T – 1
2 Web Attack Forensics: Intrusion forensics, database forensics,
preventive forensics; Anti- forensics practices, Anti-forensics
detection techniques, Network forensics analysis tools;
T – 1
3 Forensics: Malware types, Malware Analysis, Tools for
analysis;
T – 1
4 Email Forensics: e-mail Protocols, e-mail crimes, email
forensics;
T – 1
5 Bitcoin : Forensics: crypto currency, crimes related to bitcoin; T – 1
6 Case Study: A detailed case study on cyber forensics and its
Investigation Reports.
T – 1
References
1. Practical Cyber Forensics : An Incident-Based Approach to Forensic
Investigations - Niranjan Reddy
August 18, 2022
UNIT – II : Cyber Security
5
August 18, 2022
Introduction to Cyber Forensics:
 What are cyber forensics,
 Brief about Cyber
 Forensics investigation process,
Forensic protocol for Ev Incident, Identification,
Seizure, Imaging, Hashing,
Analysis, Reporting, Preservationidence Acquisition,
 Digital Forensics standards and guidelines.
 Digital evidence,
 Challenges in cyber forensics.
UNIT – II : Cyber Security
6
August 18, 2022
Web Attack Forensics:
 OWASP – Open Web Application Security Project.
 Injection
 Broken authentication
 Sensitive data exposure
 Broken access control
 Security mis-configurations
 Cross site scripting (XSS)
 Web Attack Tests
 Static Analysis
 Dynamic Analysis
 Hybrid Analysis.
UNIT – II : Cyber Security
7
August 18, 2022
 Intrusion forensics
 Forensic approach
 Data Monitoring
 Data Analysis
 Traceback
 IP Traceback
 ICMP Traceback
 Hash-Based Traceback
 Database forensics
 Log Forensics
 Preventive forensics.
UNIT – II : Cyber Security
8
August 18, 2022
 Anti-forensics practices
 Data wiping & shredding : Data Remanence, Degaussing,
 Trail obfuscation : Spoofing, Data Modification
 Encryption : Different Techniques
 Data Hiding : Steganography and Cryptography
 Anti-forensics Detection Techniques
 Network Forensics
 OSI Model, Forensic Footprints, Seizure of N/W Devices,
Network Forensic Artifacts, Attacks, Drive-By Downloads.
 Network forensics Analysis Tools
 Wire shark, Network Miner, Xplico
UNIT – II : Cyber Security
9
August 18, 2022
Malware Forensics
 Malware types
 Viruses, Worms, Trojan, Rootkits, Spyware, Adware,
Exploits, Ransomware, Bot
 Malware Analysis
 Static Analysis, Dynamic Analysis
 Tools for analysis
 Cuckoo Sandbox, Yara Rules/Analyzer, ReMnux,
Google Rapid Response Framework, Radare
 Challenges
UNIT – II : Cyber Security
10
August 18, 2022
Email Forensics
 Email Protocols
 SMTP, POP3, IMAP
 Email Crimes
 Phishing, Spam, Email Harvesting, Email Bombing
 Email forensics
 Recovering Emails, Some Techniques,
Email Header Analysis, Retrieve Email Headers,
Bait Method
UNIT – II : Cyber Security
11
August 18, 2022
Bitcoin Forensics
 Crypto currency
 Bitcoin, Ether, Ripple, Monero, Litecoin
 Wallet
 Hot Wallet – Desktop, Mobile, Online Wallets
 Cold Wallet – Hardware, Trezor, Paper Wallets
 Crimes related to Bitcoin
 Using Bitcoins Over Dark Web for Illegal Purchase
 Ponzi Schemes
 Fake Exchanges, Wallets
 Cryptojacking
UNIT – II : Cyber Security
12
August 18, 2022
Case Study:
A detailed case study on cyber forensics and its
Investigation Reports.
August 18, 2022 13
Suggestions are Welcome!
14
Thank you!!
August 18, 2022

More Related Content

Similar to unit 3.pptx

CYBER SECURITY (R18A0521).pdf
CYBER SECURITY (R18A0521).pdfCYBER SECURITY (R18A0521).pdf
CYBER SECURITY (R18A0521).pdf
JayaMalaR6
 
11th International Conference on Cryptography and Information Security (CRYPI...
11th International Conference on Cryptography and Information Security (CRYPI...11th International Conference on Cryptography and Information Security (CRYPI...
11th International Conference on Cryptography and Information Security (CRYPI...
ijdms
 
Cyber security
Cyber security Cyber security
Cyber security
Shivam Yadav
 
cyber security.pdf
cyber security.pdfcyber security.pdf
cyber security.pdf
Arivukkarasu Dhanapal
 
Research Topics in Network Security for PhD
Research Topics in Network Security for PhDResearch Topics in Network Security for PhD
Research Topics in Network Security for PhD
Phdtopiccom
 
Digital Security Capacity Building: Role of the University
Digital Security Capacity Building: Role of the UniversityDigital Security Capacity Building: Role of the University
Digital Security Capacity Building: Role of the University
Nizar Ben Neji
 
15th International Conference on Network Security & Applications (CNSA 2022)
15th International Conference on Network Security & Applications (CNSA 2022)15th International Conference on Network Security & Applications (CNSA 2022)
15th International Conference on Network Security & Applications (CNSA 2022)
ijcisjournal
 
Call for Papers - 15th International Conference on Network Security & Applica...
Call for Papers - 15th International Conference on Network Security & Applica...Call for Papers - 15th International Conference on Network Security & Applica...
Call for Papers - 15th International Conference on Network Security & Applica...
IJNSA Journal
 
Cyber security
Cyber securityCyber security
Cyber security
SAKSHIMAHADIK
 
L12. Digital Forensics BS.pptx
L12. Digital Forensics BS.pptxL12. Digital Forensics BS.pptx
L12. Digital Forensics BS.pptx
talhajann43
 
Implications of GDPR for IoT Big Data Security and Privacy Fabric
Implications of GDPR for IoT Big Data Security and Privacy FabricImplications of GDPR for IoT Big Data Security and Privacy Fabric
Implications of GDPR for IoT Big Data Security and Privacy Fabric
Mark Underwood
 
Call For papers - CRYPIS 2022 : 11th International Conference on Cryptography...
Call For papers - CRYPIS 2022 : 11th International Conference on Cryptography...Call For papers - CRYPIS 2022 : 11th International Conference on Cryptography...
Call For papers - CRYPIS 2022 : 11th International Conference on Cryptography...
IJITCA Journal
 
11th International Conference on Cryptography and Information Security (CRYPI...
11th International Conference on Cryptography and Information Security (CRYPI...11th International Conference on Cryptography and Information Security (CRYPI...
11th International Conference on Cryptography and Information Security (CRYPI...
ijcsity
 
Review on Computer Forensic
Review on Computer ForensicReview on Computer Forensic
Review on Computer Forensic
Editor IJCTER
 
A Comprehensive Survey on Exiting Solution Approaches towards Security and Pr...
A Comprehensive Survey on Exiting Solution Approaches towards Security and Pr...A Comprehensive Survey on Exiting Solution Approaches towards Security and Pr...
A Comprehensive Survey on Exiting Solution Approaches towards Security and Pr...
IJECEIAES
 
Cyber Law and Security
Cyber Law and SecurityCyber Law and Security
Cyber Law and Security
IMT CDL
 
Security and Authentication of Internet of Things (IoT) Devices
Security and Authentication of Internet of Things (IoT) DevicesSecurity and Authentication of Internet of Things (IoT) Devices
Security and Authentication of Internet of Things (IoT) Devices
SanjayKumarYadav58
 
CALL FOR PAPERS - 4th International Conference on Networks and Security (NSEC...
CALL FOR PAPERS - 4th International Conference on Networks and Security (NSEC...CALL FOR PAPERS - 4th International Conference on Networks and Security (NSEC...
CALL FOR PAPERS - 4th International Conference on Networks and Security (NSEC...
pijans
 
11th International Conference on Cryptography and Information Security (CRYP...
11th International Conference on Cryptography and Information  Security (CRYP...11th International Conference on Cryptography and Information  Security (CRYP...
11th International Conference on Cryptography and Information Security (CRYP...
IJCSEA Journal
 
Internet of Things Forensics
Internet of Things ForensicsInternet of Things Forensics
Internet of Things Forensics
Aakashjit Bhattacharya
 

Similar to unit 3.pptx (20)

CYBER SECURITY (R18A0521).pdf
CYBER SECURITY (R18A0521).pdfCYBER SECURITY (R18A0521).pdf
CYBER SECURITY (R18A0521).pdf
 
11th International Conference on Cryptography and Information Security (CRYPI...
11th International Conference on Cryptography and Information Security (CRYPI...11th International Conference on Cryptography and Information Security (CRYPI...
11th International Conference on Cryptography and Information Security (CRYPI...
 
Cyber security
Cyber security Cyber security
Cyber security
 
cyber security.pdf
cyber security.pdfcyber security.pdf
cyber security.pdf
 
Research Topics in Network Security for PhD
Research Topics in Network Security for PhDResearch Topics in Network Security for PhD
Research Topics in Network Security for PhD
 
Digital Security Capacity Building: Role of the University
Digital Security Capacity Building: Role of the UniversityDigital Security Capacity Building: Role of the University
Digital Security Capacity Building: Role of the University
 
15th International Conference on Network Security & Applications (CNSA 2022)
15th International Conference on Network Security & Applications (CNSA 2022)15th International Conference on Network Security & Applications (CNSA 2022)
15th International Conference on Network Security & Applications (CNSA 2022)
 
Call for Papers - 15th International Conference on Network Security & Applica...
Call for Papers - 15th International Conference on Network Security & Applica...Call for Papers - 15th International Conference on Network Security & Applica...
Call for Papers - 15th International Conference on Network Security & Applica...
 
Cyber security
Cyber securityCyber security
Cyber security
 
L12. Digital Forensics BS.pptx
L12. Digital Forensics BS.pptxL12. Digital Forensics BS.pptx
L12. Digital Forensics BS.pptx
 
Implications of GDPR for IoT Big Data Security and Privacy Fabric
Implications of GDPR for IoT Big Data Security and Privacy FabricImplications of GDPR for IoT Big Data Security and Privacy Fabric
Implications of GDPR for IoT Big Data Security and Privacy Fabric
 
Call For papers - CRYPIS 2022 : 11th International Conference on Cryptography...
Call For papers - CRYPIS 2022 : 11th International Conference on Cryptography...Call For papers - CRYPIS 2022 : 11th International Conference on Cryptography...
Call For papers - CRYPIS 2022 : 11th International Conference on Cryptography...
 
11th International Conference on Cryptography and Information Security (CRYPI...
11th International Conference on Cryptography and Information Security (CRYPI...11th International Conference on Cryptography and Information Security (CRYPI...
11th International Conference on Cryptography and Information Security (CRYPI...
 
Review on Computer Forensic
Review on Computer ForensicReview on Computer Forensic
Review on Computer Forensic
 
A Comprehensive Survey on Exiting Solution Approaches towards Security and Pr...
A Comprehensive Survey on Exiting Solution Approaches towards Security and Pr...A Comprehensive Survey on Exiting Solution Approaches towards Security and Pr...
A Comprehensive Survey on Exiting Solution Approaches towards Security and Pr...
 
Cyber Law and Security
Cyber Law and SecurityCyber Law and Security
Cyber Law and Security
 
Security and Authentication of Internet of Things (IoT) Devices
Security and Authentication of Internet of Things (IoT) DevicesSecurity and Authentication of Internet of Things (IoT) Devices
Security and Authentication of Internet of Things (IoT) Devices
 
CALL FOR PAPERS - 4th International Conference on Networks and Security (NSEC...
CALL FOR PAPERS - 4th International Conference on Networks and Security (NSEC...CALL FOR PAPERS - 4th International Conference on Networks and Security (NSEC...
CALL FOR PAPERS - 4th International Conference on Networks and Security (NSEC...
 
11th International Conference on Cryptography and Information Security (CRYP...
11th International Conference on Cryptography and Information  Security (CRYP...11th International Conference on Cryptography and Information  Security (CRYP...
11th International Conference on Cryptography and Information Security (CRYP...
 
Internet of Things Forensics
Internet of Things ForensicsInternet of Things Forensics
Internet of Things Forensics
 

Recently uploaded

Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming PipelinesHarnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
Christina Lin
 
A review on techniques and modelling methodologies used for checking electrom...
A review on techniques and modelling methodologies used for checking electrom...A review on techniques and modelling methodologies used for checking electrom...
A review on techniques and modelling methodologies used for checking electrom...
nooriasukmaningtyas
 
ML Based Model for NIDS MSc Updated Presentation.v2.pptx
ML Based Model for NIDS MSc Updated Presentation.v2.pptxML Based Model for NIDS MSc Updated Presentation.v2.pptx
ML Based Model for NIDS MSc Updated Presentation.v2.pptx
JamalHussainArman
 
Recycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part IIIRecycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part III
Aditya Rajan Patra
 
Recycled Concrete Aggregate in Construction Part II
Recycled Concrete Aggregate in Construction Part IIRecycled Concrete Aggregate in Construction Part II
Recycled Concrete Aggregate in Construction Part II
Aditya Rajan Patra
 
spirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptxspirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptx
Madan Karki
 
ACEP Magazine edition 4th launched on 05.06.2024
ACEP Magazine edition 4th launched on 05.06.2024ACEP Magazine edition 4th launched on 05.06.2024
ACEP Magazine edition 4th launched on 05.06.2024
Rahul
 
Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...
IJECEIAES
 
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
insn4465
 
New techniques for characterising damage in rock slopes.pdf
New techniques for characterising damage in rock slopes.pdfNew techniques for characterising damage in rock slopes.pdf
New techniques for characterising damage in rock slopes.pdf
wisnuprabawa3
 
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
Yasser Mahgoub
 
Question paper of renewable energy sources
Question paper of renewable energy sourcesQuestion paper of renewable energy sources
Question paper of renewable energy sources
mahammadsalmanmech
 
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
University of Maribor
 
Embedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoringEmbedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoring
IJECEIAES
 
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.pptUnit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
KrishnaveniKrishnara1
 
5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...
5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...
5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...
ihlasbinance2003
 
Comparative analysis between traditional aquaponics and reconstructed aquapon...
Comparative analysis between traditional aquaponics and reconstructed aquapon...Comparative analysis between traditional aquaponics and reconstructed aquapon...
Comparative analysis between traditional aquaponics and reconstructed aquapon...
bijceesjournal
 
Iron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdf
Iron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdfIron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdf
Iron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdf
RadiNasr
 
Manufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptxManufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptx
Madan Karki
 
Understanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine LearningUnderstanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine Learning
SUTEJAS
 

Recently uploaded (20)

Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming PipelinesHarnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
 
A review on techniques and modelling methodologies used for checking electrom...
A review on techniques and modelling methodologies used for checking electrom...A review on techniques and modelling methodologies used for checking electrom...
A review on techniques and modelling methodologies used for checking electrom...
 
ML Based Model for NIDS MSc Updated Presentation.v2.pptx
ML Based Model for NIDS MSc Updated Presentation.v2.pptxML Based Model for NIDS MSc Updated Presentation.v2.pptx
ML Based Model for NIDS MSc Updated Presentation.v2.pptx
 
Recycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part IIIRecycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part III
 
Recycled Concrete Aggregate in Construction Part II
Recycled Concrete Aggregate in Construction Part IIRecycled Concrete Aggregate in Construction Part II
Recycled Concrete Aggregate in Construction Part II
 
spirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptxspirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptx
 
ACEP Magazine edition 4th launched on 05.06.2024
ACEP Magazine edition 4th launched on 05.06.2024ACEP Magazine edition 4th launched on 05.06.2024
ACEP Magazine edition 4th launched on 05.06.2024
 
Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...
 
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
 
New techniques for characterising damage in rock slopes.pdf
New techniques for characterising damage in rock slopes.pdfNew techniques for characterising damage in rock slopes.pdf
New techniques for characterising damage in rock slopes.pdf
 
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
 
Question paper of renewable energy sources
Question paper of renewable energy sourcesQuestion paper of renewable energy sources
Question paper of renewable energy sources
 
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
 
Embedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoringEmbedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoring
 
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.pptUnit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
 
5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...
5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...
5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...
 
Comparative analysis between traditional aquaponics and reconstructed aquapon...
Comparative analysis between traditional aquaponics and reconstructed aquapon...Comparative analysis between traditional aquaponics and reconstructed aquapon...
Comparative analysis between traditional aquaponics and reconstructed aquapon...
 
Iron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdf
Iron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdfIron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdf
Iron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdf
 
Manufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptxManufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptx
 
Understanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine LearningUnderstanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine Learning
 

unit 3.pptx

  • 1. ONLINE FACULTY ORIENTATION PROGRAMME ON CYBER SECURITY (TE IT 2019 Course) RESOURCE PERSON Mr. Tushar A. Rane, PICT, Pune tarane@pict.edu + 91 9850960081 ORGANIZED BY Department of Information Technology, D. Y. Patil College of Engineering, Akurdi, Pune. IN ASSOCIATION WITH BoS-IT, Savitribai Phule Pune University (SPPU), Pune.
  • 2. Computer Network & Security August 18, 2022 2 Programme: UG Programme in Information Technology Class: T.E (Info. Tech.) A.Y. 2021-22 Sem. II Course Code : 314454 (B) Course : Cyber Security Corresponding Lab Code : 314458 Lab Name: Cyber Security Lab Teaching Scheme Examination Scheme Theory Practical Tutorial Theory Lab (hrs/week) (hrs/week) (hrs/week) Online/ Insem Endsem Sessional Term Work Practical Oral 3 hrs 4 hrs ---- 30 70 --- 25 50 --
  • 3. August 18, 2022 3 Cyber Security: Course Outcomes UNIT – III : Cyber Forensics Course Objectives: 3 To understand the basics cyber forensics, network forensics, Email forensics, web forensics and crypto currency forensics. Course Outcomes: CO – 3 Illustrate cyber forensic techniques to identify the criminal activities.
  • 4. UNIT – II : Cyber Security 4 Sr No Contents Ref. 1 Introduction to Cyber Forensics: What are cyber forensics, cyber forensics investigation process, digital evidence, challenges in cyber forensics; T – 1 2 Web Attack Forensics: Intrusion forensics, database forensics, preventive forensics; Anti- forensics practices, Anti-forensics detection techniques, Network forensics analysis tools; T – 1 3 Forensics: Malware types, Malware Analysis, Tools for analysis; T – 1 4 Email Forensics: e-mail Protocols, e-mail crimes, email forensics; T – 1 5 Bitcoin : Forensics: crypto currency, crimes related to bitcoin; T – 1 6 Case Study: A detailed case study on cyber forensics and its Investigation Reports. T – 1 References 1. Practical Cyber Forensics : An Incident-Based Approach to Forensic Investigations - Niranjan Reddy August 18, 2022
  • 5. UNIT – II : Cyber Security 5 August 18, 2022 Introduction to Cyber Forensics:  What are cyber forensics,  Brief about Cyber  Forensics investigation process, Forensic protocol for Ev Incident, Identification, Seizure, Imaging, Hashing, Analysis, Reporting, Preservationidence Acquisition,  Digital Forensics standards and guidelines.  Digital evidence,  Challenges in cyber forensics.
  • 6. UNIT – II : Cyber Security 6 August 18, 2022 Web Attack Forensics:  OWASP – Open Web Application Security Project.  Injection  Broken authentication  Sensitive data exposure  Broken access control  Security mis-configurations  Cross site scripting (XSS)  Web Attack Tests  Static Analysis  Dynamic Analysis  Hybrid Analysis.
  • 7. UNIT – II : Cyber Security 7 August 18, 2022  Intrusion forensics  Forensic approach  Data Monitoring  Data Analysis  Traceback  IP Traceback  ICMP Traceback  Hash-Based Traceback  Database forensics  Log Forensics  Preventive forensics.
  • 8. UNIT – II : Cyber Security 8 August 18, 2022  Anti-forensics practices  Data wiping & shredding : Data Remanence, Degaussing,  Trail obfuscation : Spoofing, Data Modification  Encryption : Different Techniques  Data Hiding : Steganography and Cryptography  Anti-forensics Detection Techniques  Network Forensics  OSI Model, Forensic Footprints, Seizure of N/W Devices, Network Forensic Artifacts, Attacks, Drive-By Downloads.  Network forensics Analysis Tools  Wire shark, Network Miner, Xplico
  • 9. UNIT – II : Cyber Security 9 August 18, 2022 Malware Forensics  Malware types  Viruses, Worms, Trojan, Rootkits, Spyware, Adware, Exploits, Ransomware, Bot  Malware Analysis  Static Analysis, Dynamic Analysis  Tools for analysis  Cuckoo Sandbox, Yara Rules/Analyzer, ReMnux, Google Rapid Response Framework, Radare  Challenges
  • 10. UNIT – II : Cyber Security 10 August 18, 2022 Email Forensics  Email Protocols  SMTP, POP3, IMAP  Email Crimes  Phishing, Spam, Email Harvesting, Email Bombing  Email forensics  Recovering Emails, Some Techniques, Email Header Analysis, Retrieve Email Headers, Bait Method
  • 11. UNIT – II : Cyber Security 11 August 18, 2022 Bitcoin Forensics  Crypto currency  Bitcoin, Ether, Ripple, Monero, Litecoin  Wallet  Hot Wallet – Desktop, Mobile, Online Wallets  Cold Wallet – Hardware, Trezor, Paper Wallets  Crimes related to Bitcoin  Using Bitcoins Over Dark Web for Illegal Purchase  Ponzi Schemes  Fake Exchanges, Wallets  Cryptojacking
  • 12. UNIT – II : Cyber Security 12 August 18, 2022 Case Study: A detailed case study on cyber forensics and its Investigation Reports.
  • 13. August 18, 2022 13 Suggestions are Welcome!