Professional Documents
Culture Documents
Course Code INT881 Course Category Course Title CYBER CRIME AND COMPUTER FORENSIC Courses with skill focus Course Planner 16495::Manmeet Kaur Lectures 3.0 Tutorials Practicals Credits 0.0 0.0 3.0
TextBooks Sr No T-1 Title Author Edition 1st Year Publisher Name Wiley Cyber Security - Understanding cyber Nina Godbole and Sunit crimes,computer forensics and legal Belapure perspectives Reference Books Sr No R-1 Other Reading Sr No OR-1 Journals articles as Compulsary reading (specific articles, complete reference) THE INFORMATION TECHNOLOGY ACT, 2000 And THE INFORMATION TECHNOLOGY (AMENDMENT) ACT, 2008 , Title System Forensics Author Edition Year Publisher Name Vikas Publication Ankit Fadia,Boonlia Prince 1st Komal
Relevant Websites Sr No RW-1 RW-2 RW-3 (Web address) (only if relevant to the course) http://www.asianlaws.org/library/cyber-laws/intro-indian-cyber- law.pdf http://www.asianlaws.org/library/cci/evolution-cyber-crime.pdf http://www.asianlaws.org/library/cyber-laws/real-world-cyber- crime-cases.pdf Salient Features Indian Cyber Law: PDF Evolution of Cyber Crimes: PDF Real World Cyber Crime Cases: PDF
LTP week distribution: (LTP Weeks) Weeks before MTE Weeks After MTE Spill Over 7 6 2
Week Number
Lecture Number
Other Readings, Lecture Description Relevant Websites, Audio Visual Aids, software and Virtual Labs RW-1 Basic introduction of cyber crime Description of IPR and need of cyber law Description of IPR and need of cyber law
Learning Outcomes
Pedagogical Tool Demonstration/ Case Study / Images / animation / ppt etc. Planned Slide Show by the teacher
Week 1
Lecture 1
Cyber Crime Introduction(Cyber Crimes and Jurisprudence of Cyber Law) Cyber Crime Introduction(What is cyber law and IPRs) Cyber Crime Introduction(Need for cyber law)
Lecture 2
RW-1
Student will be able to Slide Show by the understand the IPR and teacher cyber crime Student will be able to Slide Show by the understand the IPR and teacher cyber crime Slide Show by the teacher
RW-1
Lecture 3
Cyber Crime Introduction (Evolution of key terms and concepts) Cyber Crime Introduction (Introduction of IT Act)
RW-1
Description of keyterms Student will learn keyterms with respect to IT act Brief view of IT act
Week 2
Lecture 4
RW-1
Student will come to Slide Show by the know about the teacher crimesdefined under IT act Students will know Slide Show by the about the various types teacher of financial crimes,online gambling,etc Students will know Slide Show by the about intellectual teacher Property Crimes, Email Spoofing, Forgery, Cyber Defamation Students will get to know about cyber stalling and computer related crime Slide Show by the teacher
Lecture 5
Evolution of Cyber Crimes (Financial crimes,Cyber Pornography,Sale of illegal articles,online gambling) Evolution of Cyber Crimes (Intellectual Property Crimes,Email Spoofing,Forgery,Cyber Defamation) Evolution of Cyber Crimes(Cyber Stalking,Web Defacement,Email Bombing,Data Diddling) Evolution of Cyber Crimes(Salami attacks,Denial of Service attack,virus/worm attacks,trojans and keyloggers)
T-1:1-17
RW-2
Lecture 6
T-1:17-31
RW-2
Week 3
Lecture 7
RW-2
Description of cyber stalling,Web Defacement, Email Bombing, Data Diddling Description of DoS and virus attacks
Lecture 8
RW-2
Students will Know Slide Show by the about the salami attack teacher and Denial of Service Attackand VirusWorm Attacks, Trojans and Keyloggers Students will be able to Slide Show by the understand Internet teacher crimes and cyber terrorism
Lecture 9
Evolution of Cyber Crimes (Internet time theft,web jacking,email frauds,cyber terrorism,use of encryption by terrorists)
T-1:2-15
RW-2
Week 4
Lecture 10
Description of what is phishing and identity theft Description of various methods of phishing Description of identity theft and its methods RW-3 Description of Orkut Fake Profile Cases, Email Account Hacking case, Credit Card Fraud case Description of Online Share Trading Fraud , Tax Evasion and Money Laundering, Source Code Theft Description of Theft of confidential information ,software piracy,music piracy Description of Email scams,phishing , Cyber Pornography Description of online sale of illegal articles,use of internet and computer by terrorists,virusattacks,we b defacement Description of cyber laws around the world Description of cyber laws around the world
Lecture 11
Phishing and Identity Theft (Phishing) Phishing and Identity Theft (Identity theft) Real World Cyber Crime Cases from Indian Perspective(Orkut fake profile cases,email account hacking,credit card fraud) Real World Cyber Crime Cases from Indian Perspective(Online share trading fraud,tax evasion and money laundering,source code theft) Real World Cyber Crime Cases from Indian Perspective(Theft of confidential information ,software piracy,music piracy) Real World Cyber Crime Cases from Indian Perspective(Email scams,phishing , Cyber Pornography) Real World Cyber Crime Cases from Indian Perspective(Online sale of illegal articles,use of internet and computer by terrorists,virus attacks,web defacement) Cyber Crime and Cyber Security : The Legal Perspective (Introduction) Cyber Crime and Cyber Security : The Legal Perspective(Cyber Crime and the Legal landscape around the world)
T-1:187-206
Will learn about various Slide Show by the phishing techniques teacher Will learn about various Slide Show by the types and techniques of teacher identity theft Will examine Real World Cyber Crime Cases from IndianPerspective Will examine Real World Cyber Crime Cases from IndianPerspective Will examine Real World Cyber Crime Cases from IndianPerspective Will examine Real World Cyber Crime Cases from IndianPerspective Will examine Real World Cyber Crime Cases from IndianPerspective Slide Show by the teacher
Lecture 12
T-1:206-225
Week 5
Lecture 13
Lecture 14
RW-3
Lecture 15
RW-3
Week 6
Lecture 16
RW-3
Lecture 17
RW-3
Lecture 18
T-1:227 253
Will learn about the legal status of cyber laws around the world Will learn about the legal status of cyber laws around the world Learn the present contribution of Indian IT Act Learn the present contribution of Indian IT Act
T-1:227 253
Week 7
Lecture 19
Cyber Crime and Cyber Security : The Legal Perspective(Why do we need Cyber laws: the Indian Perspective) Cyber Crime and Cyber Security : The Legal Perspective(The Indian IT Act)
T-1:253-270
OR-1
Lecture 20
T-1:253-270
OR-1
Week 7
Lecture 21
Cyber Crime and Cyber Security : The Legal Perspective(Challenges to Indian law and cyber crime scenario in India,Amendment to the Indian IT Act)
T-1:271-316
OR-1
MID-TERM
Week 8 Lecture 22 Computer Forensics(Introduction) R-1:1-13 Description of computer Students will get to forensics understand computer forensics and its subdivisions Description of computer Students will get to forensics understand computer forensics and its subdivisions Information of various steps involved in computer forensics Slide Show by the teacher
Computer Forensics(Subdivisions)
R-1:1-13
Lecture 23
R-1:1-13
Students will come to Slide Show by the know how the computer teacher forensics is performed in various steps Slide Show by the teacher
Lecture 24
R-1:1-13
Describe how to analyze Students will come to the suspected computer know that how performanalyzing and incidence response Describe how to analyze Students will come to the suspected computer know that how performanalyzing and incidence response Description of Digital Forensics
R-1:1-13
Week 9
Lecture 25
Understanding Computer Forensics T-1:317-318 and 318 (Digital Forensic Science) -320 and 320-323 and 323-327 Understanding Computer Forensics T-1:317-318 and 318 (The need for Computer Forensics) -320 and 320-323 and 323-327
Students will learn Slide Show by the digital forensics and teacher understand the need for computer forensics Students will learn Slide Show by the digital forensics and teacher understand the need for computer forensics Students will come to know the rules of evidence Slide Show by the teacher Slide Show by the teacher
Lecture 26
Understanding Computer Forensics (Cyber Forensics and Digital Evidence) Understanding Computer Forensics (Digital Forensics Life Cycle)
T-1:327-331
Lecture 27
T-1:339-355
Description of the digital Students will come to forensics process know the rules of evidence Students will learn the Phases in computer forensics
Week 10
Lecture 28
Understanding Computer Forensics T-1:368-373 and 355 (Computer Forensics and -357 and 389-396 Steganography and other data hiding techniques and chain of custody concept and Challenges in Computer Forensics) Tools and Techniques in Computer Forensics(Data Recovery Tools) Tools and Techniques in Computer Forensics(Partition Recovery Tools) Tools and Techniques in Computer Forensics(File Carving Tools) T-1:396-403
Description of Steganography
Lecture 29
Description of Data Recovery Tools Description of Partition Recovery Tools Description of File Carving Tools Concept of data mining in cyber forensics and Forensics Auditing
Students will learn about various data recovery tools Students will learn various partition recovery tools Students will learn various file carving tools
Slide Show by the teacher Slide Show by the teacher Slide Show by the teacher
Lecture 30
T-1:396-403
Week 11
Lecture 31
T-1:396-403
Lecture 32
Tools and Techniques in Computer T-1:396-403 and 403 Forensics(Data mining used in -406 Cyber Forensics)
Students will come to Slide Show by the know the role of data teacher mining in cyber forensics and will learn about Forensics auditing Students will learn categories of antiforensics Students will come to know data is being stored on a hard drive Slide Show by the teacher Slide Show by the teacher
Tools and Techniques in Computer T-1:396-403 and 403 Forensics(Forensics Auditing and -406 and 406-422 anti Forensics) Week 12 Lecture 34 Data Storage and Recovery(Data Storage on a Hard Drive) Data Storage and Recovery(Data Storage Process) Data Storage and Recovery(Hard Disk Drive addressing) R-1:29-38
Description of Anti Forensics Concept of data storage on a hard drive Description of data storage
Lecture 35
R-1:29-38
Students will learn how Slide Show by the data storage process teacher takes place Slide Show by the teacher
Lecture 36
R-1:29-38
Description of hard disk Students will learn drive addressing different methods of hard disk drive addressing Description of data storage and recovery on a CD Concept of file corruption and recovery Concept of drive imaging Description of forensic imaging and cloning Description of all issues related to imaging
Week 13
Lecture 37
Data Storage and Recovery(Data Storage and recovery on a CD) Data Storage and Recovery(File corruption and recovery)
Students will learn how Slide Show by the data is stored and teacher recovered on a CD Students will learn file structure Students will understand drive imaging Students will learn forensic imaging and cloning Slide Show by the teacher Slide Show by the teacher Slide Show by the teacher
R-1: 52-59
Lecture 38
Drive Imaging(Fundamentals)
R-1:287-295
Lecture 39
R-1:287-295
R-1:287-295
Students will learn Slide Show by the various issues involved teacher in imaging
SPILL OVER
Week 14 Lecture 40 T-1:332-339 Forensics analysis of EMail Network Forensics Concept of Forensics of Slide Show by the emails teacher Concept of network forensics Description of requirements of a computer forensics lab Slide Show by the teacher Slide Show by the teacher
Lecture 41
T-1:357-358
Lecture 42
T-1:362-368
Homework 1
To test the learning skills and analysis power of the students Primarily Term Paper is a record of intelligent, careful and systematic reading, noting and presentation of several sources on a particular subject under study.
Term Paper 1
1.Attacking WiFi nets with traffic injection 2 Wireless Forensic- Individual Tapping the Air 3 Smashing the Stack for Fun and Profit 5 Security Kernel Design and Implementation 5 Unsettling Parallels Between Security and the Environment 6 How to Break Web Software 7 Liability and Computer Security: Nine Principles 8 Finding and Fixing Vulnerabilities in Information Systems 9 Phishing Activity Trends Report 10 Your 802.11 Wireless Network Has No Clothes 11 Privacy Defended: How to Protect Your Privacy and Secure Your PC 12 Privacy Enhancement for Internet Electronic Mail 13 Civil and Military Applications of Trusted Systems Criteria 14 Security Problems in the TCP/IP Protocol Suite 15 Firewalls and Internet Security Topics covered till week 10th Individual
3 / 10
Homework,Term Paper,Test 1
10 / 11
List of suggested topics for term paper[at least 15] (Student to spend about 15 hrs on any one specified term paper)
Sr. No.
Topic 1 Attacking WiFi nets with traffic injection 2 Wireless Forensic- Tapping the Air 3 Smashing the Stack for Fun and Profit 4 Security Kernel Design and Implementation 5 Unsettling Parallels Between Security and the Environment 6 How to Break Web Software 7 Liability and Computer Security: Nine Principles 8 Finding and Fixing Vulnerabilities in Information Systems 9 Phishing Activity Trends Report
10 Your 802.11 Wireless Network Has No Clothes 11 Privacy Defended: How to Protect Your Privacy and Secure Your PC 12 Privacy Enhancement for Internet Electronic Mail 13 Civil and Military Applications of Trusted Systems Criteria 14 Security Problems in the TCP/IP Protocol Suite 15 Firewalls and Internet Security