PRACTICAL:DE1& DE2- Cyber Crime

Paper Code: 
DFRS 513
Credits: 
2
Contact Hours: 
60.00
Max. Marks: 
100.00

Lab Experiments:

  1. File System Analysis

  2. Log Analysis

  3. Network Devices: Modem, Router, Switch, Hub, Repeater

  4. SQL Injection

  5. Cross Site Scripting

  6. Click Jacking

  7. TCP/IP Attacks

  8. Botnet analysis

  9. Malware Analysis

  10. IR Objectives and Team Building

  11. Email Tracking

  12. IP Tracking

  13. Cyber psychology and Social Engineering Test Profiling

 

PRACTICAL- DIGITAL FORENSIC

Lab Experiments:

  1. To identify, seize and preserve digital evidence from crime scenes.

  2. To detect deletions, obliterations and modifications of files using encase software.

  3. To trace routes followed by e-mails and chats.

  4. To identify the IP address of the sender of e-mails.

  5. To demonstrate concealment techniques using cryptographic PGP.

  6. To identify encrypted files.

  7. To identify hidden files.

  8. To use digital signatures for securing e-mail and online transactions.

  9. To acquire data from PCs/laptops/HDDs/USBs, pen drives, memory cards and SIM cards.

  10. To use symmetric and asymmetric keys for protection of digital record.

  11. To carry out imaging of hard disks.

 

Essential Readings: 
  • Charles P. Fleeger, "Security in Computing", Prentice Hall, New Delhi, 2009.

  • BehrouzA.Forouzan, ―Cryptography & Network Security‖, Tata McGraw Hill, India, New Delhi, 2009.

  • William Stallings, ―Cryptography and Network Security, Prentice Hall, New Delhi, 2006

  • Chalie Kaufman, Radia Perlman, Mike Speciner, ―Network Security: Private Communication in a Public Network‖, Pearson Education, New Delhi, 2004.

  • Neal Krawetz, ―Introduction to Network Security‖, Thomson Learning, Boston, 2007.

  • Bruce Schneier, ―Applied Cryptography‖, John Wiley & Sons, New York, 2004.

  • Samir Nanavati, Michael Thieme, Raj Nanavati “Biometrics – Identity Verification in a Networked World”, WILEY- Dream Tech Edition 2009.(UNIT 1,2,3,4,)

  •  Paul Reid “Biometrics for Network Security”, Pearson Education.2009. (UNIT – V)

  • Daniel Jurafsky and James Martin “Speech and Language Processing”, 2nd edition, Prentice- Hall, 2008.

  • Xuedong Huang, Alex Acero and Hsiao-Wuen Hon, “Spoken Language Processing”, Prentice- Hall, May 2001.

  •  Paul Taylor, ”Text-to-Speech Synthesis”, Cambridge University Press, February 2009.

 

Academic Year: