Publisher | Technical Publications |
Product Format | Paper Back |
Language Published | English |
Volume Number | -- |
Number of Pages | -- |
Product ID | 9789333211475 |
CYBER FORENSICS :
UNIT - I NETWORK LAYER SECURITY & TRANSPORT LAYER SECURITY
IPSec Protocol - IP Authentication Header - IP ESP - Key Management Protocol for IPSec. Transport layer Security : SSL protocol, Cryptographic Computations - TLS Protocol.
UNIT - II E-MAIL SECURITY & FIREWALLS
PGP - S/MIME - Internet Firewalls for Trusted System : Roles of Firewalls - Firewall related terminology - Types of Firewalls - Firewall designs - SET for E-Commerce Transactions.
UNIT - III INTRODUCTION TO COMPUTER FORENSICS
Introduction to Traditional Computer Crime, Traditional problems associated with Computer Crime. Introduction to Identity Theft & Identity Fraud. Types of CF techniques - Incident and incident response methodology - Forensic duplication and investigation. Preparation for IR : Creating response tool kit and IR team. - Forensics Technology and Systems - Understanding Computer Investigation - Data Acquisition.
UNIT - IV EVIDENCE COLLECTION AND FORENSICS TOOLS
Processing Crime and Incident Scenes - Working with Windows and DOS Systems. Current Computer Forensics Tools : Software/ Hardware Tools
UNIT - V ANALYSIS AND VALIDATION
Validating Forensics Data - Data Hiding Techniques - Performing Remote Acquisition - Network Forensics - Email Investigations - Cell Phone and Mobile Devices Forensics