0% found this document useful (0 votes)
36 views

Cryptography

Uploaded by

Sruja Koshti
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
36 views

Cryptography

Uploaded by

Sruja Koshti
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

GUJARAT TECHNOLOGICAL UNIVERSITY

Master of Engineering

WEF Academic Year : 2021-22


Semester :2
Category of the Course : Program Core Course-III
Course Name & Code : Digital Forensics and Investigations (4725901)

Prerequisite:
• Digital electronics fundamentals, Computer hardware and software knowledge, Internetworking
concepts, Cyber laws, policies and compliances, Cyber evidence act.

Rationale:
• Digital forensic is needed when cybercrime is reported. It is a process to identify the true reasons
behind cybercrime by systematic and scientifically investigation of various collected digital
pieces of evidence.
• Digital forensics refers to the process of collection, acquisition, preservation, analysis, and
presentation of electronic evidence (a.k.a., digital evidence) for intelligence purposes and/or use
in investigations and prosecutions of various forms of crime, including cybercrime.

Course Scheme:
Teaching Scheme Total Credits Assessment Pattern and Marks
Total
Theory Practical
L T PR C Marks
ESE (E) PA(M) ESE (V) PA (I)

03 00 02 04 70 30 30 20 150

Course Content:
Sr No of %
Course Content
No Hours

1 UNIT-I: Digital Forensics and Its Environment 06 10

Concepts in Digital Evidence, Nature and Special Properties of Digital


Evidence, Objective of the Digital Forensics, The key technical Concepts,
Forensic readiness, Computer Forensic Flaws and Risks, Computer
Forensic-Rules, Procedures and Legal Issues

2 UNIT-II: Computer System Forensic and its Investigation Process 08 20

Understanding of Systems, Disks and Media, Understanding Data


Acquisition and Duplication, Principles of Data Acquisition, types, tools

Page 1 of 3
w.e.f. AY 2021-22
GUJARAT TECHNOLOGICAL UNIVERSITY
Master of Engineering

and validation methods. Operating System Forensics, Documentation


Process

3 UNIT-III: Network Forensics 08 20

Network Attacks, Network Forensic, Analysis of network traffic


techniques and Investigating Traffics Logs, Investigation of Web attacks,
Web attack detection tools, Router Forensics, Documentation Process

4 UNIT-IV: Investigation E-mail Crimes 06 10

Email system basics, Email Crimes, Steps to Investigate Email, Email


Forensic Tools.

5 UNIT-V: Investigating Wireless Attacks 06 15

Basics of Wireless, Access Controls, Wireless Penetration Testing

6 UNIT-VI: Mobile Devices/PDA Forensics 06 15

Cellular Networks, Components of PDA, PDA Forensics, Investigation


Methodology and Tips, Mobile Forensics tools

7 UNIT-VII: Current Trends in the Digital Forensics 02 10

Textbooks/Reference Books:
1. The Basics of Digital Forensic – The primer for Getting Started in Digital Forensics by John
Sammons, Elsevier – Syngress publication
2. Practical Digital Forensic by Richard Boddington – PACKT Publication – Open-source
Community
3. Network Forensics – Tracking hackers through Cyberspace by Sherri Davidoff and Jonathan
Ham, Pearson Publication
4. The official CHFI Study Guide for Computer Hacking Forensics Investigators published by
Syngress Publishing Inc. Elsevier.

Course Outcome:
After completion of the Course, Students will be able to:

No Course Outcomes RBT Level*

Understand the nature and special properties of the digital evidence, Digital
01 UN
Forensics rules, Procedures and Legal Issues

Acquire Digital evidence to do Computer System Forensics along with


02 AP
documentation procedure

Page 2 of 3
w.e.f. AY 2021-22
GUJARAT TECHNOLOGICAL UNIVERSITY
Master of Engineering

Acquire Digital evidence to do Network Forensics along with


03 AP
documentation procedure

04 Investigate Email and Wireless Attacks AN

Critiquing various Computer Systems, Network Systems, Email and


05 EL
Wireless System Forensic Tools

*RM: Remember, UN: Understand, AP: Apply, AN: Analyze, EL: Evaluate, CR: Create

Suggested Course Practical List:


• The practical work will be carried out based on the content covered during the academic sessions.

List of Laboratory/Learning Resources Required:


• Course-related online MOOCs on NPTEL/SWAYAM platform
• Recently Published papers/articles in reputed journals

Page 3 of 3
w.e.f. AY 2021-22

You might also like