Syllabus
Syllabus
Module 2
System Security
Database Security: The need for database security, SQL injection attacks; Malicious Software:
Types of malicious software (Malware), Advanced persistent threat, Propagation, Payload, 08
Countermeasures
SLT: Propagation – social engineering – spam email, trojans; Payload – stealthing – backdoor,
rootkits
Textbook 3: Ch. 5.1, 5.4, 6.1 – 6.10.
MODULE 3 08
1
Resource Management and Risk Analysis
Denial-of-service (DoS) Attacks: DoS attacks, Flooding attacks, Distributed DoS attacks, Defenses
against DoS attacks, Responding to a DoS attack; IT Security Management and Risk Assessment:
IT security management, Organizational context and security policy, Security risk assessment,
Detailed security risk analysis
SLT: Case study: Silver Star Mines
MODULE 4
Understanding Computer Forensics
Introduction, historical background of cyber forensics, digital forensic science, the need for
computer forensics, cyber forensics and digital evidence, digital forensics life cycle, chain of 08
custody concept, approaching a computer forensics investigation
SLT: Challenges in computer forensics
Textbook 2: Ch. 7.1 – 7.5, 7.7, 7.8, 7.10, 7.16
MODULE 5
Computer Forensics: A Survey on the State-of-the-art
Survey (P1): Introduction, Computer forensic analysis, State-of-the-art computer forensic tools,
Comparative analysis;
Design (P2): Introduction, A brief review of the network forensics education, Challenges in 08
designing network forensics labs
SLT: Discussion and design of the network forensics lab
Paper 1 (P1): Section 1 – Section 5
Paper 2 (P1): Section 1 – Section 4
Textbooks/References
1. Textbook 1: Cyber Security for Beginners, , Akella Sarveswara,Mir Iqbal Faheem
2. Textbook 2: Sunit Belapure and Nina Godbole, "Cyber Security: Understanding Cyber Crimes, Computer
Forensics and Legal Perspectives," Wiley India Pvt Ltd, ISBN: 978-81-265-21791, 2011, First Edition
(Reprinted 2018).
3. Textbook 3: William Stallings and Lawrie Brown, “Computer Security: Principles and Practice,” Pearson, ISBN:
978-0-13-377392-7, Third Edition.
4. Paper 1: Abdul Rehman Javed, Waqas Ahmed, Mahmoun Alazab, Zunera Jalil, Kashif Kifayat, and Thippa Reddy
Gadekallu, “A Comprehensive Survey on Computer Forensics: State-of-the-Art, Tools, Techniques, Challenges,
and Future Directions,” IEEE Access, vol. 10, pp. 11065 – 11089, 2022.
https://doi.org/10.1109/ACCESS.2022.3142508.
5. Paper 2: Kewei Sha, Wei Wei, and Arpit Jain, “Design of Network Forensics Labs for Teaching-oriented
Institutions”, International Conference on Computational Science and Computational Intelligence (CSCI), pp.
959 – 963, 2021. https://doi.org/10.1109/CSCI54926.2021.00213.
1. Simon Holmes, Clive Harber, “Getting MEAN with Mongo, Express, Angular, and Node” second edition, 2019.
2
Reference Books
1. 1 John R Vacca, “Computer Forensics,” 2nd Edition, Charles River Media, Inc., New Delhi, 2017
2. Bill Nelson, Amelia Phillips, Christopher Steuart, “Guide to Computer Forensics and Investigations,”
CENGAGE Learning, 2018
3. Brooks, Charles J, Christopher Grow, Phillip Craig, and Donald Short, “Cybersecurity Essentials,” ISBN:
978-1-119-36239-5, 2018
Course Outcomes (COs):
CO1 Understand the techniques for Cybercrime and cyber forensics
CO2 Illustrate the different types of Cybercrime and cyber forensics
jCO3 Analyze the various tools and techniques for cybercrimes and methods associated with cyber forensics
CO4 Demonstrate real world scenarios of cybercrimes and forensics in a team (PO5,PO8)
CO – PO – PSO Matrix
P PSO
CO O
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PSO1 PSO2 PSO3
CO1 2 2
CO2 3 2
CO3 2 2
CO4 2 2 2
Avg 2.5 2 2 2 2