BCI4001 Cyber Forensics and Investigation: LTPJC 3 0 0 4 4

Download as pdf or txt
Download as pdf or txt
You are on page 1of 4

L T P J C

BCI4001 Cyber Forensics and Investigation


3 0 0 4 4
1. To present the students with a comprehensive understanding of digital
forensic principles and the collection, preservation, and analysis of digital
evidence
2. To enlighten the importance of forensic principles and procedures, legal
Objectives
considerations, digital evidence controls, and the documentation of
forensic analysis
3. To develop an understanding of the different applications and methods for
conducting network and digital forensic acquisition and analysis
After completion of this course, the student shall be able to:
1. Explain the responsibilities and liabilities of a computer forensic
investigator
2. Plan and prepare for an incident requiring computer forensic skills
3. Seize a computer from a crime scene without damaging it or risking it
becoming inadmissible in a court of law
Expected Outcome 4. Identify potential sources of electronic evidence.
5. Understand the importance of maintaining the integrity of digital
evidence.
6. Demonstrate the ability to perform basic forensic data acquisition and
analysis using computer and network based applications and utilities.
7. Demonstrate the ability to accurately document forensic procedures and
results
1) Having an ability to apply mathematics and science in engineering
Student Learning applications
Outcome
2) Having a clear understanding of the subject related concepts and of
contemporary issues
4) Having Sense-Making Skills of creating unique insights in what is being
seen or observed
7) Having computational thinking
10) Having a clear understanding of professional and ethical responsibility
14) Having an ability to design and conduct experiments, as well as to
analyse and interpret data
17) Having an ability to use techniques, skills and modern engineering tools
necessary for engineering practice
Module Topics L Hrs SLO
1 UNDERSTANDING CYBER FORENSICS AND LEGAL
ASPECTS : Forensics Fundamentals ; Computer Forensics and Law
Enforcement- Indian Cyber Forensic - Forensics Services, Professional
Forensics Methodology- Types of Forensics Technology 7 1,2
Forensics system and Services : Forensics on - Internet Usage –
Intrusion - Firewall and Storage Area Network; Occurrence of Cyber-
crimes- Cyber Detectives- Fighting Cyber Crimes- Forensic Process
2 COMPUTER FORENSICS - Data Backup and Recovery - Test Disk
Suite, Data-Recovery Solution, Hiding and Recovering Hidden data,
6 4,10
Evidence Collection and Data Seizure.

3 DIGITAL FORENSICS AND PRESERVATION


Digital Repositories - Evidence Collection – Data Preservation
6 4,10
Approaches – Meta Data and Historic records – Legal aspects

4 FORENSIC DATA ANALYSIS


Basic Steps of Forensic Analysis in Windows and Linux – Forensic
6 4,10
Scenario – Email Analysis – File Signature Analysis – Hash Analysis –
Forensic Examination of log files
5 MOBILE DEVICE SECURITY AND FORENSICS
Introduction to Mobile Forensic – Android Device – Analysis- Android
6 4,7
Malware – iOS Forensic Analysis – SIM Forensic Analysis – Case
study
6 CLOUD FORENSICS
Working with the cloud vendor, obtaining evidence, reviewing logs and 5 4,7
APIs
7 CURRENT COMPUTER FORENSIC TOOLS
Overview of different software packages – Encase-Autopsy-Magnet –
Wireshark - Mobile Forensic Tools – SQLite
7 17
Case study Report Preparation
A real Forensic case study – Processing a complete Forensic case –
Preparing Forensic Report
8 CONTEMPORARY ISSUES (To be handled by experts from
industry) 2 2
Text Books
1. J. R. Vacca, Computer forensics: Computer Crime Scene investigation, 2nd Ed. Hanover, NH,
United States: Charles River Media, 2002.(ISBN No.: 978-1-58-450389-7)
2. C. Altheide, H. Carvey, and R. Davidson, Digital Forensics with Open Source Tools: Using Open
Source Platform Tools for Performing Computer Forensics on Target Systems: Windows, Mac,
Linux, Unix, etc, 1st Ed. United States: Syngress Media,U.S., 2011.(ISBN No. : 978-1-59-749586-
8)
3. S. Bommisetty, R. Tamma, and H. Mahalik, Practical Mobile Forensics: Dive into Mobile
Forensics on IOS, Android, windows, and blackBerry devices with this action-packed, practical
guide. United Kingdom: Packt Publishing, 2014. (ISBN No. : 978-1783288311)
4. G. Gogolin, Digital Forensics Explained, 1st Ed. Boca Raton, FL: CRC Taylor & Francis, 2013.
(ISBN No. : 978-1-43-987495-0)
5. M. Dawson and M. Omar, Eds., New Threats and Countermeasures in Digital Crime and Cyber
Terrorism. Boca Raton, FL, United States: Idea Group,U.S., 2015. (ISBN No.: 978-1-46-668345-
7)
Reference Books
1. A. Hoog and J. McCash, Android forensics: Investigation, Analysis, and Mobile Security for
Google Android. Waltham, MA: Syngress Media,U.S., 2011. (ISBN No.: 1597496510 )
2. B. Nelson, A. Phillips, F. Enfinger, and C. Steuart, Guide to Computer Forensics and
Investigations, Second edition, 2nd Ed. Boston: Thomson Course Technology, 2009. (ISBN No. : 0-
619-21706-5)

You might also like