Types of Cyber Crime – Classification of Cyber Criminals – Tools used in Cyber Crime – Challenges – Strategies – Cryptocurrency – Bitcoin – Blockchain - Ransomware
Cyber Forensics - Definition – Disk Forensics – Network Forensics – Wireless Forensics – Database Forensics – Malware Forensics – Mobile Forensics – Email Forensics
Essential Terminology, Hacking windows – Network hacking – Web hacking – Password hacking, Malware, Scanning, Cracking.
The Analog and Digital World, Training and Education in digital evidence, Evidence Collection and Data Seizure: Why Collect Evidence, Collection Options Obstacles, Types of Evidence, The Rules of Evidence, Volatile Evidence.
Intrusion, Physical Theft, Abuse of Privileges, Unauthorized Access by Outsider, Malware infection, Intrusion detection and Prevention Techniques, Anti-Malware software, Network based Intrusion detection Systems, Network based Intrusion Prevention Systems, Host based Intrusion prevention Systems, Security Information Management, Network Session Analysis, System Integrity Validation
Reference Book:
1. Dejey, Dr.Murugan, “Cyber Forensics”, Oxford University Press, India, 2018. 2. William Stallings and Lawrie Brown, “Computer Security: Principles and Practice”, Prentice Hall. 3. Swiderski, Frank and Syndex, “Threat Modeling”, Microsoft Press. 4. John W. Rittinghouse, William M. Hancock, “Cyber Security Operations Handbook”, ElsevierPub.
Text Book:
1. Bushan Mayank “Fundamentals of Cyber Security” ISBN: 9789386551559,9789386551559 BPB Publications