Connected successfully
Network and Security concepts – Information Assurance – Cryptography – Domain Name System (DNS) – Firewall – Virtualization – Radio-Frequency Identification. Attacker technique and motivation – proxy – tunnelling Technique – fraud techniques – Threat Infrastructure.
Introduction, Historical background of Cyber forensics, Digital Forensics Science, The Need for Computer Forensics, Cyber Forensics and Digital evidence, Forensics Analysis of Email, Digital Forensics Lifecycle, Forensics Investigation, Challenges in Computer Forensics.
Introduction, Proliferation of Mobile and Wireless Devices, Trends in Mobility, Credit card Frauds in Mobile and Wireless Computing Era, Security Challenges Posed by Mobile Devices, Registry Settings for Mobile Devices, Authentication service Security, Attacks on Mobile/Cell Phones, Organizational security Policies and Measures in Mobile Computing Era, Laptops.
Memory Forensics – Honeypots – Malicious Code Naming – Automated Malicious Code Analysis System – passive and active analysis – Intrusion Detection System.
Introduction, cost of cybercrimes and IPR issues, web threats for organizations, security and privacy implications, social media marketing: security risks and perils for organizations, social computing and the associated challenges for organizations Case Study: Ransomware Attack( WannaCry, Petya, Sodinokibi, Ryuk)
Reference Book:
1 RaefMeeuwisse, Cyber Security for Beginners, Cyber Simplicity Ltd., 2017. 2 William Stallings, "Cryptography and Network Security: Principles and Practice.†Fifth Edition Prentice Hall 2011. 3 William R. Cheswick and Steven M. Bellovin, "Firewalls and Internet Security: Repelling the Wily Hacker", Second Edition, Addison-Wesley, 2003. 4 Charles P. Pfleeger, "Security in Computing", Fifth Edition, Pearson Education 2015.
Text Book:
1.James Graham, Richard Howard and Ryan Otson,†Cyber Security Essentialsâ€, First Edition, CRC Press, 2011. 2.Nina Godbole and SunitBelpure, “Cyber Security Understanding Cyber Crimes, Computer Forensics and Legal Perspectivesâ€, Wiley 2011.