CS6004
UNIT I
CYBER FORENSICS
LTPC 3003
NETWORK LAYER SECURITY &TRANSPORT LAYER SECURITY
IPSec Protocol - IP Authentication Header - IP ESP - Key Management Protocol for IPSec .
Transport layer Security: SSL protocol, Cryptographic Computations TLS Protocol.
UNIT II
E-MAIL SECURITY & FIREWALLS
PGP - S/MIME - Internet Firewalls for Trusted System: Roles of Firewalls Firewall related
terminology- Types of Firewalls - Firewall designs - SET for E-Commerce Transactions.
UNIT III
INTRODUCTION TO COMPUTER FORENSICS
Introduction to Traditional Computer Crime, Traditional problems associated with Computer
Crime. Introduction to Identity Theft & Identity Fraud. Types of CF techniques - Incident and
incident response methodology - Forensic duplication and investigation. Preparation for IR:
Creating response tool kit and IR team. - Forensics Technology and Systems - Understanding
Computer Investigation Data Acquisition.
UNIT IV
EVIDENCE COLLECTION AND FORENSICS TOOLS
Processing Crime and Incident Scenes Working with Windows and DOS Systems. Current
Computer Forensics Tools: Software/ Hardware Tools.
UNIT V
ANALYSIS AND VALIDATION
Validating Forensics Data Data Hiding Techniques Performing Remote Acquisition
Network Forensics Email Investigations Cell Phone and Mobile Devices Forensics
TEXT BOOKS:
1. Man Young Rhee, Internet Security: Cryptographic Principles, Algorithms and Protocols,
Wiley Publications, 2003.
2. Nelson, Phillips, Enfinger, Steuart, Computer Forensics and Investigations, Cengage
Learning,
India Edition, 2008.
REFERENCES:
1. John R.Vacca, Computer Forensics, Cengage Learning, 2005
2. Richard E.Smith, Internet Cryptography, 3rd Edition Pearson Education, 2008.
3. Marjie T.Britz, Computer Forensics and Cyber Crime: An Introduction, 3rd Edition,
Prentice Hall, 2013.