Topic outline
- General
- General
General
Course Code
23CS4601B
Year
III
Semester
II
Course Category
Professional Elective
Branch
CSE
Course Type
Theory
Credits
3
L – T – P
3-0-0
Prerequisites
Operating Systems, Computer Networks
Continuous Evaluation:
30
Semester
End Evaluation:
70
Total Marks:
100
Course Outcomes
Upon successful completion of the course, the student will be able to:
CO1
Understand the basic concepts of cybercrime and cyber forensics.
L2
CO2
Apply various methods and tools to identify various cybercrimes.
L3
CO3
Apply the processes of cyber forensics in collecting, preserving, and preparing of digital evidence for analysis and investigations.
L3
CO4
Apply the legal perspectives of cybercrime in Indian IT Act.
L3
Contribution of Course Outcomes towards achievement of Program Outcomes & Strength of
correlations (3:Substantial, 2: Moderate, 1:Slight)
PO1
PO2
PO3
PO4
PO5
PO6
PO7
PO8
PO9
PO10
PO11
PSO1
PSO2
CO1
3
CO2
3
3
CO3
3
1
CO4
2
1
Avg.
2.67
1
1
3
3
- Unit-1
Unit-1
Introduction to Cybercrime: Introduction, Cybercrime: Definition and Origins of the Word, Cybercrime and Information Security, Cyber criminals, Classifications of Cybercrime, Cyberstalking, Cybercafe and Cybercrimes, Botnets. Attack Vector, Proliferation of Mobile and Wireless Devices, Security Challenges Posed by Mobile Devices, Attacks on Mobile/Cell Phones.
Mapped CO: CO1,CO2
- Unit-2
Unit-2
Tools and Methods : Proxy Servers and Anonymizers, Phishing, Password Cracking, Keyloggers and Spywares, Virus and Worms, Trojan Horses and Backdoors, Steganography, DoS and DDoS Attacks, SQL Injection, Buffer Overflow, Attacks on Wireless Networks, Identity Theft (ID Theft).
Mapped CO: CO1,CO2
- Unit-3
Unit-3
Cyber Crime Investigation: Introduction, Investigation Tools, eDiscovery, Digital Evidence Collection, Evidence Preservation, E-Mail Investigation, E-Mail Tracking, IP Tracking, E-Mail Recovery, Hands on Case Studies. Encryption and Decryption Methods, Search and Seizure of Computers, Recovering Deleted Evidences, Password Cracking
Mapped CO: CO1,CO3
- Unit-4
Unit-4
Computer Forensics and Investigations: Understanding Computer Forensics, Preparing for Computer Investigations. Current Computer Forensics Tools: Evaluating Computer Forensics Tools, Computer Forensics Software Tools, Computer Forensics Hardware Tools, Validating and Testing Forensics Software, Graphics and Network Forensics, E-mail Investigations, Cell Phone and Mobile Device Forensics.
Mapped CO: CO1,CO3
- Unit-5
Unit-5
Cyber Crime Legal Perspectives: Introduction, Cybercrime and the Legal Landscape around the World, The Indian IT Act, Challenges to Indian Law and Cybercrime Scenario in India, Consequences of Not Addressing the Weakness in Information Technology Act, Digital Signatures and the Indian IT Act, Amendments to the Indian IT Act, Cybercrime and Punishment, Cyberlaw, Technology and Students: Indian Scenario
Mapped CO: CO1, CO4
- Others
Others
Text Books:
1. Sunit Belapure Nina Godbole “Cyber Security: Understanding Cyber Crimes, Computer Forensics and Legal Perspectives”, WILEY, 2011.
2. Nelson Phillips and Enfinger Steuart, “Computer Forensics and Investigations”, Cengage Learning, New Delhi, 2009.Reference Books:
1. Michael T. Simpson, Kent Backman and James E. Corley, “Hands on Ethical Hacking and Network Defence”, Cengage, 2019.
2. Computer Forensics, Computer Crime Investigation by John R. Vacca, Firewall Media, New Delhi.
3. Alfred Basta, Nadine Basta,Mary Brown and Ravinder Kumar “Cyber Security and Cyber Laws” , Cengage,2018.