You are on page 1of 7

Lovely Professional University, Punjab

Course Code INT881 Course Category Course Title CYBER CRIME AND COMPUTER FORENSIC Courses with skill focus Course Planner 16495::Manmeet Kaur Lectures 3.0 Tutorials Practicals Credits 0.0 0.0 3.0

TextBooks Sr No T-1 Title Author Edition 1st Year Publisher Name Wiley Cyber Security - Understanding cyber Nina Godbole and Sunit crimes,computer forensics and legal Belapure perspectives Reference Books Sr No R-1 Other Reading Sr No OR-1 Journals articles as Compulsary reading (specific articles, complete reference) THE INFORMATION TECHNOLOGY ACT, 2000 And THE INFORMATION TECHNOLOGY (AMENDMENT) ACT, 2008 , Title System Forensics Author Edition Year Publisher Name Vikas Publication Ankit Fadia,Boonlia Prince 1st Komal

Relevant Websites Sr No RW-1 RW-2 RW-3 (Web address) (only if relevant to the course) http://www.asianlaws.org/library/cyber-laws/intro-indian-cyber- law.pdf http://www.asianlaws.org/library/cci/evolution-cyber-crime.pdf http://www.asianlaws.org/library/cyber-laws/real-world-cyber- crime-cases.pdf Salient Features Indian Cyber Law: PDF Evolution of Cyber Crimes: PDF Real World Cyber Crime Cases: PDF

LTP week distribution: (LTP Weeks) Weeks before MTE Weeks After MTE Spill Over 7 6 2

Detailed Plan For Lectures

Week Number

Lecture Number

Broad Topic(Sub Topic)

Chapters/Sections of Text/reference books

Other Readings, Lecture Description Relevant Websites, Audio Visual Aids, software and Virtual Labs RW-1 Basic introduction of cyber crime Description of IPR and need of cyber law Description of IPR and need of cyber law

Learning Outcomes

Pedagogical Tool Demonstration/ Case Study / Images / animation / ppt etc. Planned Slide Show by the teacher

Week 1

Lecture 1

Cyber Crime Introduction(Cyber Crimes and Jurisprudence of Cyber Law) Cyber Crime Introduction(What is cyber law and IPRs) Cyber Crime Introduction(Need for cyber law)

Student will get the idea of cyber crime

Lecture 2

RW-1

Student will be able to Slide Show by the understand the IPR and teacher cyber crime Student will be able to Slide Show by the understand the IPR and teacher cyber crime Slide Show by the teacher

RW-1

Lecture 3

Cyber Crime Introduction (Evolution of key terms and concepts) Cyber Crime Introduction (Introduction of IT Act)

RW-1

Description of keyterms Student will learn keyterms with respect to IT act Brief view of IT act

Week 2

Lecture 4

RW-1

Student will come to Slide Show by the know about the teacher crimesdefined under IT act Students will know Slide Show by the about the various types teacher of financial crimes,online gambling,etc Students will know Slide Show by the about intellectual teacher Property Crimes, Email Spoofing, Forgery, Cyber Defamation Students will get to know about cyber stalling and computer related crime Slide Show by the teacher

Lecture 5

Evolution of Cyber Crimes (Financial crimes,Cyber Pornography,Sale of illegal articles,online gambling) Evolution of Cyber Crimes (Intellectual Property Crimes,Email Spoofing,Forgery,Cyber Defamation) Evolution of Cyber Crimes(Cyber Stalking,Web Defacement,Email Bombing,Data Diddling) Evolution of Cyber Crimes(Salami attacks,Denial of Service attack,virus/worm attacks,trojans and keyloggers)

T-1:1-17

RW-2

Financial types of cyber crime and other online crime

Lecture 6

T-1:17-31

RW-2

Description of IPR and email related crime

Week 3

Lecture 7

T-1:32-35and 6567and 125-129

RW-2

Description of cyber stalling,Web Defacement, Email Bombing, Data Diddling Description of DoS and virus attacks

Lecture 8

T-1:36-44 and 137164

RW-2

Students will Know Slide Show by the about the salami attack teacher and Denial of Service Attackand VirusWorm Attacks, Trojans and Keyloggers Students will be able to Slide Show by the understand Internet teacher crimes and cyber terrorism

Lecture 9

Evolution of Cyber Crimes (Internet time theft,web jacking,email frauds,cyber terrorism,use of encryption by terrorists)

T-1:2-15

RW-2

Internet and web crimes

Week 4

Lecture 10

Phishing and Identity Theft (Introduction)

T-1:131-132 and 185 -186

Description of what is phishing and identity theft Description of various methods of phishing Description of identity theft and its methods RW-3 Description of Orkut Fake Profile Cases, Email Account Hacking case, Credit Card Fraud case Description of Online Share Trading Fraud , Tax Evasion and Money Laundering, Source Code Theft Description of Theft of confidential information ,software piracy,music piracy Description of Email scams,phishing , Cyber Pornography Description of online sale of illegal articles,use of internet and computer by terrorists,virusattacks,we b defacement Description of cyber laws around the world Description of cyber laws around the world

Will learn how phishing works

Slide Show by the teacher

Lecture 11

Phishing and Identity Theft (Phishing) Phishing and Identity Theft (Identity theft) Real World Cyber Crime Cases from Indian Perspective(Orkut fake profile cases,email account hacking,credit card fraud) Real World Cyber Crime Cases from Indian Perspective(Online share trading fraud,tax evasion and money laundering,source code theft) Real World Cyber Crime Cases from Indian Perspective(Theft of confidential information ,software piracy,music piracy) Real World Cyber Crime Cases from Indian Perspective(Email scams,phishing , Cyber Pornography) Real World Cyber Crime Cases from Indian Perspective(Online sale of illegal articles,use of internet and computer by terrorists,virus attacks,web defacement) Cyber Crime and Cyber Security : The Legal Perspective (Introduction) Cyber Crime and Cyber Security : The Legal Perspective(Cyber Crime and the Legal landscape around the world)

T-1:187-206

Will learn about various Slide Show by the phishing techniques teacher Will learn about various Slide Show by the types and techniques of teacher identity theft Will examine Real World Cyber Crime Cases from IndianPerspective Will examine Real World Cyber Crime Cases from IndianPerspective Will examine Real World Cyber Crime Cases from IndianPerspective Will examine Real World Cyber Crime Cases from IndianPerspective Will examine Real World Cyber Crime Cases from IndianPerspective Slide Show by the teacher

Lecture 12

T-1:206-225

Week 5

Lecture 13

Lecture 14

RW-3

Slide Show by the teacher

Lecture 15

RW-3

Slide Show by the teacher

Week 6

Lecture 16

RW-3

Slide Show by the teacher

Lecture 17

RW-3

Slide Show by the teacher

Lecture 18

T-1:227 253

Will learn about the legal status of cyber laws around the world Will learn about the legal status of cyber laws around the world Learn the present contribution of Indian IT Act Learn the present contribution of Indian IT Act

Slide Show by the teacher Slide Show by the teacher

T-1:227 253

Week 7

Lecture 19

Cyber Crime and Cyber Security : The Legal Perspective(Why do we need Cyber laws: the Indian Perspective) Cyber Crime and Cyber Security : The Legal Perspective(The Indian IT Act)

T-1:253-270

OR-1

Role of IT act in Indian legal system

Slide Show by the teacher

Lecture 20

T-1:253-270

OR-1

Role of IT act in Indian legal system

Slide Show by the teacher

Week 7

Lecture 21

Cyber Crime and Cyber Security : The Legal Perspective(Challenges to Indian law and cyber crime scenario in India,Amendment to the Indian IT Act)

T-1:271-316

OR-1

Challenges to IT Act in present scenario world

Students will Learn challenges and amendments to Indian IT Act

Slide Show by the teacher

MID-TERM
Week 8 Lecture 22 Computer Forensics(Introduction) R-1:1-13 Description of computer Students will get to forensics understand computer forensics and its subdivisions Description of computer Students will get to forensics understand computer forensics and its subdivisions Information of various steps involved in computer forensics Slide Show by the teacher

Computer Forensics(Subdivisions)

R-1:1-13

Slide Show by the teacher

Lecture 23

Computer Forensics(Steps of Computer Forensics)

R-1:1-13

Students will come to Slide Show by the know how the computer teacher forensics is performed in various steps Slide Show by the teacher

Lecture 24

Computer Forensics(Analyzing the Suspected Computer)

R-1:1-13

Describe how to analyze Students will come to the suspected computer know that how performanalyzing and incidence response Describe how to analyze Students will come to the suspected computer know that how performanalyzing and incidence response Description of Digital Forensics

Computer Forensics(Incidence Response)

R-1:1-13

Slide Show by the teacher

Week 9

Lecture 25

Understanding Computer Forensics T-1:317-318 and 318 (Digital Forensic Science) -320 and 320-323 and 323-327 Understanding Computer Forensics T-1:317-318 and 318 (The need for Computer Forensics) -320 and 320-323 and 323-327

Students will learn Slide Show by the digital forensics and teacher understand the need for computer forensics Students will learn Slide Show by the digital forensics and teacher understand the need for computer forensics Students will come to know the rules of evidence Slide Show by the teacher Slide Show by the teacher

Description of Digital Forensics

Lecture 26

Understanding Computer Forensics (Cyber Forensics and Digital Evidence) Understanding Computer Forensics (Digital Forensics Life Cycle)

T-1:327-331

Description of the domains of cyber forensics

Lecture 27

T-1:339-355

Description of the digital Students will come to forensics process know the rules of evidence Students will learn the Phases in computer forensics

Week 10

Lecture 28

Understanding Computer Forensics T-1:368-373 and 355 (Computer Forensics and -357 and 389-396 Steganography and other data hiding techniques and chain of custody concept and Challenges in Computer Forensics) Tools and Techniques in Computer Forensics(Data Recovery Tools) Tools and Techniques in Computer Forensics(Partition Recovery Tools) Tools and Techniques in Computer Forensics(File Carving Tools) T-1:396-403

Description of Steganography

Students will learn various data hiding techniques

Slide Show by the teacher

Lecture 29

Description of Data Recovery Tools Description of Partition Recovery Tools Description of File Carving Tools Concept of data mining in cyber forensics and Forensics Auditing

Students will learn about various data recovery tools Students will learn various partition recovery tools Students will learn various file carving tools

Slide Show by the teacher Slide Show by the teacher Slide Show by the teacher

Lecture 30

T-1:396-403

Week 11

Lecture 31

T-1:396-403

Lecture 32

Tools and Techniques in Computer T-1:396-403 and 403 Forensics(Data mining used in -406 Cyber Forensics)

Students will come to Slide Show by the know the role of data teacher mining in cyber forensics and will learn about Forensics auditing Students will learn categories of antiforensics Students will come to know data is being stored on a hard drive Slide Show by the teacher Slide Show by the teacher

Tools and Techniques in Computer T-1:396-403 and 403 Forensics(Forensics Auditing and -406 and 406-422 anti Forensics) Week 12 Lecture 34 Data Storage and Recovery(Data Storage on a Hard Drive) Data Storage and Recovery(Data Storage Process) Data Storage and Recovery(Hard Disk Drive addressing) R-1:29-38

Description of Anti Forensics Concept of data storage on a hard drive Description of data storage

Lecture 35

R-1:29-38

Students will learn how Slide Show by the data storage process teacher takes place Slide Show by the teacher

Lecture 36

R-1:29-38

Description of hard disk Students will learn drive addressing different methods of hard disk drive addressing Description of data storage and recovery on a CD Concept of file corruption and recovery Concept of drive imaging Description of forensic imaging and cloning Description of all issues related to imaging

Week 13

Lecture 37

Data Storage and Recovery(Data Storage and recovery on a CD) Data Storage and Recovery(File corruption and recovery)

R-1:29-38 and 52-59

Students will learn how Slide Show by the data is stored and teacher recovered on a CD Students will learn file structure Students will understand drive imaging Students will learn forensic imaging and cloning Slide Show by the teacher Slide Show by the teacher Slide Show by the teacher

R-1: 52-59

Lecture 38

Drive Imaging(Fundamentals)

R-1:287-295

Lecture 39

Drive Imaging(Forensic Imaging and Cloning) Drive Imaging(Issues in Imaging)

R-1:287-295

R-1:287-295

Students will learn Slide Show by the various issues involved teacher in imaging

SPILL OVER
Week 14 Lecture 40 T-1:332-339 Forensics analysis of EMail Network Forensics Concept of Forensics of Slide Show by the emails teacher Concept of network forensics Description of requirements of a computer forensics lab Slide Show by the teacher Slide Show by the teacher

Lecture 41

T-1:357-358

Lecture 42

T-1:362-368

Setting up a computer forensics laboratory

Scheme for CA:


Component Homework,Term Paper,Test Frequency 2 Total :Out Of 3 Each Marks Total Marks 10 10 20 20

Details of Academic Task(s)


AT No. Objective Topic of the Academic Task Nature of Academic Task (group/individuals/field work Individual Evaluation Mode Allottment / submission Week 4/6

Homework 1

To test the learning skills and analysis power of the students Primarily Term Paper is a record of intelligent, careful and systematic reading, noting and presentation of several sources on a particular subject under study.

from lecture 1 to lecture 12

Step by step evaluation of attempted questions. Presentation,depth of analysis

Term Paper 1

1.Attacking WiFi nets with traffic injection 2 Wireless Forensic- Individual Tapping the Air 3 Smashing the Stack for Fun and Profit 5 Security Kernel Design and Implementation 5 Unsettling Parallels Between Security and the Environment 6 How to Break Web Software 7 Liability and Computer Security: Nine Principles 8 Finding and Fixing Vulnerabilities in Information Systems 9 Phishing Activity Trends Report 10 Your 802.11 Wireless Network Has No Clothes 11 Privacy Defended: How to Protect Your Privacy and Secure Your PC 12 Privacy Enhancement for Internet Electronic Mail 13 Civil and Military Applications of Trusted Systems Criteria 14 Security Problems in the TCP/IP Protocol Suite 15 Firewalls and Internet Security Topics covered till week 10th Individual

3 / 10

Homework,Term Paper,Test 1

To test the skills of students

Step by step evaluation of attempted questions in the test.

10 / 11

List of suggested topics for term paper[at least 15] (Student to spend about 15 hrs on any one specified term paper)

Sr. No.

Topic 1 Attacking WiFi nets with traffic injection 2 Wireless Forensic- Tapping the Air 3 Smashing the Stack for Fun and Profit 4 Security Kernel Design and Implementation 5 Unsettling Parallels Between Security and the Environment 6 How to Break Web Software 7 Liability and Computer Security: Nine Principles 8 Finding and Fixing Vulnerabilities in Information Systems 9 Phishing Activity Trends Report

10 Your 802.11 Wireless Network Has No Clothes 11 Privacy Defended: How to Protect Your Privacy and Secure Your PC 12 Privacy Enhancement for Internet Electronic Mail 13 Civil and Military Applications of Trusted Systems Criteria 14 Security Problems in the TCP/IP Protocol Suite 15 Firewalls and Internet Security

You might also like