BC4152 Cyber Forensics and Investigation Syllabus:

BC4152 Cyber Forensics and Investigation Syllabus – Anna University PG Syllabus Regulation 2021

COURSE OBJECTIVES:

 To gain a comprehensive understanding of cyber forensic principles and the collection, preservation, and analysis of digital evidence
 To combine both the technical expertise and the knowledge required to investigate, detect and prevent digital crimes.
 To understand the different applications and methods for conducting network and digital forensic acquisition and analysis
 To learn the E-evidence collection and preservation, investigating operating systems and file systems, network, cloud and mobile device forensics
 To gain knowledge on digital forensics legislations, digital crime, forensic processes and procedures.

UNIT I CYBER FORENSICS SCIENCE

Cyber Forensics Science: Forensics Science, Forensics Fundamentals, Computer Forensics, and Digital Forensics. Cyber Crime: Criminalistics as it relates to the Investigative Process, Analysis of Cyber Criminalistics Area, Holistic Approach to Cyber-forensics, Computer Forensics and Law Enforcement- Indian Cyber Forensic – Forensics Services, Professional Forensics Methodology Types of Forensics Technology

UNIT II NETWORK SECURITY FORENSICS SYSTEM AND SERVICES

Forensics system and Services : Forensics on – Internet Usage – Intrusion – Firewall and Storage Area Network; Occurrence of Cyber-crimes- Cyber Detectives- Fighting Cyber Crimes- Forensic Process Open-source Security Tools for Network Forensic Analysis, Requirements for Preservation of Network Data Computer Forensics – Data Backup and Recovery – Test Disk Suite.

UNIT III DIGITAL FORENSICS PRESERVATION AND FORENSIC DATA ANALYSIS

Digital Repositories – Evidence Collection – Data Preservation Approaches – Meta Data and Historic records – Legal aspects. Basic Steps of Forensic Analysis in Windows and Linux – Forensic Scenario – Email Analysis – File Signature Analysis – Hash Analysis – Forensic Examination of log files Data-Recovery Solution, Hiding and Recovering Hidden Data, Evidence Collection and Data Seizure

UNIT IV CLOUD, NETWORK AND MOBILE FORENSICS

Working with the cloud vendor, obtaining evidence, reviewing logs and APIs Mobile Forensics techniques, Mobile Forensics Tools – Android Device – Analysis- Android Malware – iOS Forensic Analysis – SIM Forensic Analysis – Case study Recent trends in Mobile Forensic Technique and methods to Search and Seize Electronic Evidence

UNIT V LEGAL ASPECTS OF DIGITAL FORENSICS

IT Laws and Ethics, Digital Evidence Controls, Evidence Handling Procedures, Basics of Indian Evidence ACT IPC and CrPC , Electronic Communication Privacy ACT, Legal Policies, Act 2000, amendment of IT Act 2008. Current Cyber Forensic Tools: Overview of different software packages – Encase-Autopsy Magnet – Wireshark – Mobile Forensic Tools – SQLite

TOTAL : 45 PERIODS

COURSE OUTCOMES:

At the end of this course, the students will be able to :
CO1: Understand the responsibilities and liabilities of a computer forensic investigator
CO2: Identify potential sources of electronic evidence.
CO3: Understand the importance of maintaining the integrity of digital evidence.
CO4: Demonstrate the ability to perform basic forensic data acquisition and analysis using computer and network based applications and utilities.
CO5: Understand relevant legislation and codes of ethics.

REFERENCES:

1. J. R. Vacca, Computer forensics: Computer Crime Scene investigation, 2nd Ed. Hanover, NH, United States: Charles River Media, 2002, Laxmi Publications, 1st Edition, 2015.
2. C. Altheide, H. Carvey, and R. Davidson, Digital Forensics with Open Source Tools: Using Open Source Platform Tools for Performing Computer Forensics on Target Systems: Windows, Mac, Linux, Unix, etc, 1st Ed. United States: Syngress, 2011.
3. S. Bommisetty, R. Tamma, and H. Mahalik, Practical Mobile Forensics: Dive into Mobile Forensics on IOS, Android, Windows, and blackBerry devices with this action-packed, practical guide. United Kingdom: Packt Publishing, 2014.
4. G. Gogolin, Digital Forensics Explained, 1st Ed. Boca Raton, FL: CRC Taylor & Francis, 1st Edition, Auerbach Publications, 2013.
5. A. Hoog and J. McCash, Android forensics: Investigation, Analysis, and Mobile Security for Google Android. Waltham, MA: Syngress Media, U.S., 2011.
6. B. Nelson, A. Phillips, F. Enfinger, and C. Steuart, Guide to Computer Forensics and Investigations, Second edition, 2nd Ed. Boston: Thomson Course Technology, 2009.
7. C. Altheide and H. Carvey, “Digital Forensics with Open Source Tools”, 2011 Publisher(s): Syngress.
8. J. Sammons, “The Basics of Digital Forensics- The Primer for Getting Started in Digital Forensics”, 1st Edition, Syngress, 2012.
9. Nelson, Phillips and Enfinger Steuart, “Guide to Computer Forensics and Investigations”, 6th Edition, Cengage Learning, New Delhi, 2020.