Subject Details
Dept     : ECE
Sem      : 6
Regul    : 2019
Faculty : K.Sangeetha
phone  : NIL
E-mail  : sangeethak.ece.snsce@gmail.com
126
Page views
21
Files
1
Videos
1
R.Links

Icon
Syllabus

UNIT
1
NETWORK LAYER SECURITY &TRANSPORT LAYER SECURITY

IPSec Protocol - IP Authentication Header - IP ESP - Key Management Protocol for IPSec. Transport layer Security: SSL protocol, Cryptographic Computations - TLS Protocol

UNIT
2
E-MAIL SECURITY & FIREWALLS

PGP - S/MIME - Internet Firewalls for Trusted System: Roles of Firewalls - Firewall related terminology- Types of Firewalls - Firewall designs - SET for E-Commerce Transactions.

UNIT
3
INTRODUCTION TO COMPUTER FORENSICS

Introduction to Traditional Computer Crime, Traditional problems associated with Computer Crime. Introduction to Identity Theft & Identity Fraud. Types of CF techniques - Incident and incident response methodology - Forensic duplication and investigation. Preparation for IR: Creating response tool kit and IR team. - Forensics Technology and Systems - Understanding Computer Investigation – Data Acquisition.

UNIT
4
EVIDENCE COLLECTION AND FORENSICS TOOLS

Processing Crime and Incident Scenes -Working with Windows and DOS Systems. Current Computer Forensics Tools: Software/ Hardware Tools

UNIT
5
ANALYSIS AND VALIDATION

Validating Forensics Data - Data Hiding Techniques- Performing Remote Acquisition -Network Forensics - Email Investigations - Cell Phone and Mobile Devices Forensics.

Reference Book:

John R.Vacca, Computer Forensics, Cengage Learning, 2005 MarjieT.Britz, Computer Forensics and Cyber Crime: An Introduction, 3rd Edition, Prentice Hall, 2013. AnkitFadia Ethical Hacking Second Edition, Macmillan India Ltd, 2006 Kenneth C.Brancik Insider Computer Fraud Auerbach Publications Taylor & Francis Group-2008.

Text Book:

Bill Nelson, Amelia Phillips, Frank Enfinger, Christopher Steuart, Computer Forensics and Investigations, Cengage Learning, India Edition, 2016. CEH official Certfied Ethical Hacking Review Guide, Wiley India Edition, 2015.