This course provides a comprehensive understanding of digital forensic principles and the collection, preservation, and analysis of digital evidence. It covers topics like cyber forensics and investigation, computer forensics, data acquisition and analysis, mobile device forensics, cloud forensics, and current forensic tools. The course aims to help students explain forensic procedures, seize computers properly, identify evidence sources, and document investigations. It involves hands-on labs and a case study to apply skills like evidence collection, analysis, and report writing.
This course provides a comprehensive understanding of digital forensic principles and the collection, preservation, and analysis of digital evidence. It covers topics like cyber forensics and investigation, computer forensics, data acquisition and analysis, mobile device forensics, cloud forensics, and current forensic tools. The course aims to help students explain forensic procedures, seize computers properly, identify evidence sources, and document investigations. It involves hands-on labs and a case study to apply skills like evidence collection, analysis, and report writing.
This course provides a comprehensive understanding of digital forensic principles and the collection, preservation, and analysis of digital evidence. It covers topics like cyber forensics and investigation, computer forensics, data acquisition and analysis, mobile device forensics, cloud forensics, and current forensic tools. The course aims to help students explain forensic procedures, seize computers properly, identify evidence sources, and document investigations. It involves hands-on labs and a case study to apply skills like evidence collection, analysis, and report writing.
This course provides a comprehensive understanding of digital forensic principles and the collection, preservation, and analysis of digital evidence. It covers topics like cyber forensics and investigation, computer forensics, data acquisition and analysis, mobile device forensics, cloud forensics, and current forensic tools. The course aims to help students explain forensic procedures, seize computers properly, identify evidence sources, and document investigations. It involves hands-on labs and a case study to apply skills like evidence collection, analysis, and report writing.
3 0 0 4 4 1. To present the students with a comprehensive understanding of digital forensic principles and the collection, preservation, and analysis of digital evidence 2. To enlighten the importance of forensic principles and procedures, legal Objectives considerations, digital evidence controls, and the documentation of forensic analysis 3. To develop an understanding of the different applications and methods for conducting network and digital forensic acquisition and analysis After completion of this course, the student shall be able to: 1. Explain the responsibilities and liabilities of a computer forensic investigator 2. Plan and prepare for an incident requiring computer forensic skills 3. Seize a computer from a crime scene without damaging it or risking it becoming inadmissible in a court of law Expected Outcome 4. Identify potential sources of electronic evidence. 5. Understand the importance of maintaining the integrity of digital evidence. 6. Demonstrate the ability to perform basic forensic data acquisition and analysis using computer and network based applications and utilities. 7. Demonstrate the ability to accurately document forensic procedures and results 1) Having an ability to apply mathematics and science in engineering Student Learning applications Outcome 2) Having a clear understanding of the subject related concepts and of contemporary issues 4) Having Sense-Making Skills of creating unique insights in what is being seen or observed 7) Having computational thinking 10) Having a clear understanding of professional and ethical responsibility 14) Having an ability to design and conduct experiments, as well as to analyse and interpret data 17) Having an ability to use techniques, skills and modern engineering tools necessary for engineering practice Module Topics L Hrs SLO 1 UNDERSTANDING CYBER FORENSICS AND LEGAL ASPECTS : Forensics Fundamentals ; Computer Forensics and Law Enforcement- Indian Cyber Forensic - Forensics Services, Professional Forensics Methodology- Types of Forensics Technology 7 1,2 Forensics system and Services : Forensics on - Internet Usage – Intrusion - Firewall and Storage Area Network; Occurrence of Cyber- crimes- Cyber Detectives- Fighting Cyber Crimes- Forensic Process 2 COMPUTER FORENSICS - Data Backup and Recovery - Test Disk Suite, Data-Recovery Solution, Hiding and Recovering Hidden data, 6 4,10 Evidence Collection and Data Seizure.
3 DIGITAL FORENSICS AND PRESERVATION
Digital Repositories - Evidence Collection – Data Preservation 6 4,10 Approaches – Meta Data and Historic records – Legal aspects
4 FORENSIC DATA ANALYSIS
Basic Steps of Forensic Analysis in Windows and Linux – Forensic 6 4,10 Scenario – Email Analysis – File Signature Analysis – Hash Analysis – Forensic Examination of log files 5 MOBILE DEVICE SECURITY AND FORENSICS Introduction to Mobile Forensic – Android Device – Analysis- Android 6 4,7 Malware – iOS Forensic Analysis – SIM Forensic Analysis – Case study 6 CLOUD FORENSICS Working with the cloud vendor, obtaining evidence, reviewing logs and 5 4,7 APIs 7 CURRENT COMPUTER FORENSIC TOOLS Overview of different software packages – Encase-Autopsy-Magnet – Wireshark - Mobile Forensic Tools – SQLite 7 17 Case study Report Preparation A real Forensic case study – Processing a complete Forensic case – Preparing Forensic Report 8 CONTEMPORARY ISSUES (To be handled by experts from industry) 2 2 Text Books 1. J. R. Vacca, Computer forensics: Computer Crime Scene investigation, 2nd Ed. Hanover, NH, United States: Charles River Media, 2002.(ISBN No.: 978-1-58-450389-7) 2. C. Altheide, H. Carvey, and R. Davidson, Digital Forensics with Open Source Tools: Using Open Source Platform Tools for Performing Computer Forensics on Target Systems: Windows, Mac, Linux, Unix, etc, 1st Ed. United States: Syngress Media,U.S., 2011.(ISBN No. : 978-1-59-749586- 8) 3. S. Bommisetty, R. Tamma, and H. Mahalik, Practical Mobile Forensics: Dive into Mobile Forensics on IOS, Android, windows, and blackBerry devices with this action-packed, practical guide. United Kingdom: Packt Publishing, 2014. (ISBN No. : 978-1783288311) 4. G. Gogolin, Digital Forensics Explained, 1st Ed. Boca Raton, FL: CRC Taylor & Francis, 2013. (ISBN No. : 978-1-43-987495-0) 5. M. Dawson and M. Omar, Eds., New Threats and Countermeasures in Digital Crime and Cyber Terrorism. Boca Raton, FL, United States: Idea Group,U.S., 2015. (ISBN No.: 978-1-46-668345- 7) Reference Books 1. A. Hoog and J. McCash, Android forensics: Investigation, Analysis, and Mobile Security for Google Android. Waltham, MA: Syngress Media,U.S., 2011. (ISBN No.: 1597496510 ) 2. B. Nelson, A. Phillips, F. Enfinger, and C. Steuart, Guide to Computer Forensics and Investigations, Second edition, 2nd Ed. Boston: Thomson Course Technology, 2009. (ISBN No. : 0- 619-21706-5)