MEDICAPS
UNIVERSITY
Paper- V
Course Code Courses Hours Per Total
week
L P Hrs Credit
FS3SEO7 Digital and Cyber Fraud 3 2 5 4
Investigation
Course Learning Objective (CLO):
After studying this course, the student will know
GLOi lo define and cite appropriate instances for the application of computer
TorensicS and collect and analyze computer forensic evidence.
CLOo2 To identify the essential and up-to-date concepts, algorithms, protocols,
tools, and methodology of computer forensics
CLOo3 To understand the ethics and laws by which
governed in our country and worldwide. cyberspace is
CLOo4 To understand the threats in networks and
CLOos To understand and apply knowledge of mobile security concepts.
forensic investigation. data sources for mobile
Unit-l
Introduction to Cyber Frauds
Cyber rime- Form of Cybercrime: Web
Bombing, Spamming, Internet Time Theft, Jacking, ldentity Theft, Logic
Stalking. Internal, and External Attacks, CrimesPornography, Vishing, Mishing,
banking frauds, credit card frauds, and debit related to social media, ATMs,
Packet sniffing, Spoofing; Types of spoofing, card frauds. Data Privacy issues,
Web security, and vulnerabilities
Unit- ||
Network Forensics
Overview of the OSI Model and TCP/IP
eavesdropping, spoofing, DNS spoofing. Protocol Types of network attacks
authentication, attacks on WEP, WPA, and packet sniffing. types of
hotspots Monitoring of computer WPA-2 encryption, and fake
and analysis Searching and networks and activities,
collection of evidence from thelive packet capture,
Intrusion Detection and Analysis. SQL injection, event log network Network
techniques investigating network attacks. analysis- tools and
other networking devices Evidence collection from routers and
1|Page
MEDICAPS
UNIVERSITY
Unit 3
Mobile and Wireless Device Forensics
International Mobile Equipment
ntroduction to the Mobile Operatina Svstem,
phones - Fles present in
dentity (IMEI). Types of evidence present in mobile
SIM cards, external memory dumps,
extraction prOcess,
And evidence in the memorv card. Mobile phone evidence
acquisition Mobile Forensic
ddta system, files system, logical, and manual locations.
Investigation Tools; Oxygen, XRY Forensic. Tracking of mobile phone
Unit 4
Social Media Forensics and Laws
Introduction to social media, Security Issues in social media, Types of crimes on
SOcial media cyber bullying, online grooming, and cyber stalking Social Media
and its impact on Business, Politics, Law, and Revolutions, Emerging Trends in
SOCial media, Sources for social media evidence, Types of Data Available on
Social Networking Sites, Different evidence collection methods from SOcial
networking sites, Intelligence gathering from social media- tools and techniques
for intelligence gathering- indirect method, direct method with login, direct
method without login. The relevant section of the Cyber Crime IT Act 2000.
Unit 5
Current Computer Forensics Tools
Evaluating Computer Forensics Tool Needs, Types of Computer Forensics
Tools, Tasks Performed byComputer Forensics Tools, Tool Comparisons, Other
Considerations for Tools, Computer Forensics Software Tools, Command-Line
Forensics Tools, UNIX/Linux Forensics Tools, Other GUI Forensics Tools,
Computer Forensics Hardware Tools, Forensic Workstations, Using a Write
Blocker.
2 | Page
MEDICAPS
UNIVERSITY
List of Practical:
1. To
2.
Study and Analysis of Networks.
To Study
3. To PerformNetwork-Related Commands(Windows)
and Collect Information aboutthe given Domain.
4. To perform Network
5. Scanning
To perform Mobile/ Smart
6. Phone Forensic Practical
Top perform Windows Investigation Practical -I
7. To study the
8. Introduction to penetration testing
To Study SQL
9. To perform Email Injections
10. To study the Investigation
case study of Wireless Networks and Attacks
Course Outcomes
After studying this course, the student will able
COo1 Apply afew different computer forensic tools to a given scenario of cybercrime
CO02 Analyse and validate forensic data.
COos ldentify the vulnerabilities in agiven network infrastructure.
COn4Apply the knowledge of social media Forensics in Cybercrime investigation.
CO0s Understand and incorporate new advanced computer forensic tools in cyber-crime investigation.
100| Pag