COURSE OBJECTIVES: After studying this paper the students will know –
CO 1: The basics of digital forensics.
CO 2: The cases which fall under the purview of digital crimes.
CO 3: The types of digital crimes.
CO 4: The elements involved in investigation of digital crimes.
Fundamentals of computers Hardware and accessories – development of hard disk, physical construction, CHS and LBA addressing, encoding methods and formats.
Memory and processor. Methods of storing data. Operating system. Software. Introduction to network, LAN, WAN and MAN.
Definition and types of computer crimes. Distinction between computer crimes and conventional crimes. Reasons for commission of computer crimes. Breaching security and operation of digital systems.
Computer virus, and computer worm – Trojan horse, trap door, super zapping, logic bombs. Types of computer crimes – computer stalking, pornography, hacking, crimes related to intellectual property rights, computer terrorism, hate speech, private and national security in cyber space. An overview of hacking, spamming, phishing and stalking.
Seizure of suspected computer. Preparation required prior to seizure.
Protocol to be taken at the scene. Extraction of information from the hard disk. Treatment of exhibits. Creating bitstream of the original media.
Legal and privacy issues. Examining forensically sterile media. Restoration of deleted files. Password cracking and E-mail tracking. Encryption and decryption methods. Tracking users.
R.K. Tiwari, P.K. Sastry and K.V. Ravikumar, Computer Crimes and Computer Forensics, Select Publishers, New Delhi (2003).
C.B. Leshin, Internet Investigations in Criminal Justice, Prentice Hall, New Jersey (1997).
R. Saferstein, Criminalistics, 8th Edition, Prentice Hall, New Jersey (2004).
E. Casey, Digital Evidence and Computer Crime, Academic Press, London (2000).
Links:
[1] https://forensicscience.iisuniv.ac.in/courses/subjects/digital-forensic
[2] https://forensicscience.iisuniv.ac.in/academic-year/2022-2023