BC4008 Mobile and Digital Forensics Syllabus:

BC4008 Mobile and Digital Forensics Syllabus – Anna University PG Syllabus Regulation 2021

COURSE OBJECTIVES:

 Understand the basics of wireless technologies and security.
 Become knowledgeable in mobile phone forensics and android forensics.
 Learn the methods of investigation using digital forensic techniques.

UNIT I INTRODUCTION

Overview of wireless technologies and security: Personal Area Networks, Wireless Local Area Networks, Metropolitan Area Networks, Wide Area Networks. Wireless threats, vulnerabilities and security: Wireless LANs, War Driving, War Chalking, War Flying, Common Wi-fi security recommendations, PDA Security, Cell Phones and Security, Wireless DoS attacks, GPS Jamming, Identity theft.

UNIT II CONFIDENTIALITY, INTEGRITY, AVAILABILITY TRIAD IN MOBILE

Confidentiality, integrity, availability (CIA) triad in mobile phones-Voice, SMS and Identification data interception in GSM: Introduction, practical setup and tools, implementation- Software and Hardware Mobile phone tricks: Net monitor, GSM network service codes, mobile phone codes, catalog tricks and AT command set- SMS security issues

UNIT III MOBILE PHONE FORENSICS

Mobile phone forensics: crime and mobile phones, evidences, forensic procedures, files present in SIM card, device data, external memory dump, evidences in memory card, operators systems Android forensics: Procedures for handling an android device, imaging android USB mass storage devices, logical and physical techniques

UNIT IV DIGITAL FORENSICS

Digital forensics: Introduction – Evidential potential of digital devices: closed vs. open systems, evaluating digital evidence potential- Device handling: seizure issues, device identification, networked devices and contamination

UNIT V DIGITAL FORENSICS EXAMINATION PRINCIPLES

Digital forensics examination principles: Previewing, imaging, continuity, hashing and evidence locations- Seven element security model- developmental model of digital systems- audit and logs Evidence interpretation: Data content and context

COURSE OUTCOMES:

After the completion of this course, student will be able to
CO1: Understand the basics of mobile and digital security.
CO2: Explain mobile phone forensics and android forensics.
CO3: Analyse issues in Digital forensics.
CO4: Understand the common data privacy techniques.
CO5: Examine and analyze Digital forensics techniques.

TOTAL: 45 PERIODS

REFERENCES

1. Gregory Kipper, “Wireless Crime and Forensic Investigation”, Auerbach Publications, 2007
2. Iosif I. Androulidakis, “Mobile phone security and forensics: A practical approach”, Springer publications, Second Edition, 2016
3. Andrew Hoog, “Android Forensics: Investigation, Analysis and Mobile Security for Google Android”, Elsevier publications, 2011
4. Angus M.Marshall, “ Digital forensics: Digital evidence in criminal investigation”, John – Wiley and Sons, 2008