Introduction to Course Computer Security

kuldeephule1989 48 views 24 slides Jul 18, 2024
Slide 1
Slide 1 of 24
Slide 1
1
Slide 2
2
Slide 3
3
Slide 4
4
Slide 5
5
Slide 6
6
Slide 7
7
Slide 8
8
Slide 9
9
Slide 10
10
Slide 11
11
Slide 12
12
Slide 13
13
Slide 14
14
Slide 15
15
Slide 16
16
Slide 17
17
Slide 18
18
Slide 19
19
Slide 20
20
Slide 21
21
Slide 22
22
Slide 23
23
Slide 24
24

About This Presentation

Computer Security & Digital Forensics


Slide Content

Introduction to Course Prepared By Mr. Hule Kuldeep

Objectives & Announcements Objectives: After end of the session you may understands..... What is Cyber Security? What is Forensics Sciences? Also understand various approaches of Cyber Security. Need of this Course The course structure & their objectives & outcomes Announcements: Cyber Security Forensics Sciences Need of Cyber Security & Forensics Sciences Roadmap to Forensics Sciences Course Structure Course Objectives & Outcomes Course Contents Unit-wise Practical Course Contents Thursday, July 11, 2024 2

What is Cyber Security? Cyber security is the practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks. It's also known as information technology security or electronic information security. Thursday, July 11, 2024 3

Biggest Cyber Security Challenges in 2023 Thursday, July 11, 2024 4

What is Digital Forensics Sciences? Digital forensics is a branch of forensic science that involves the use of scientific methods to identify, acquire, process, analyze, and report on electronic data. The goal of digital forensics is to preserve evidence and establish facts from digital information to help reconstruct criminal events, anticipate disruptive actions, and determine the root cause of an incident. Thursday, July 11, 2024 5

What is Digital Forensics Sciences? Steps of Digital Forensics Phases of Digital Forensics Thursday, July 11, 2024 6

Reasons for studying CSDF Thursday, July 11, 2024 7

Data Structures and Algorithms Career Scope Thursday, July 11, 2024 8 According to 6figr.com website, Employees who knows Data Structure And Algorithms earn an average of ₹23.2lakhs Mostly ranging from ₹16.6lakhs to ₹55.5lakhs based on 55 profiles. https://6figr.com/in/salary/data-structure-and-algorithms--s

Some Important Product-Based Companies & their Average Package Provided Thursday, July 11, 2024 9 Company Average Package in INR Google 25 LPA Amazon 25 LPA WalmartLabs 23 LPA Flipkart 23 LPA Microsoft 24 LPA Uber 21 LPA Adobe 18 LPA Intuit 19 LPA Apple 21 LPA

Roadmap of DSA For Beginners Thursday, July 11, 2024 10

Thursday, July 11, 2024 11

Real-World Applications of C++ Database Management Systems Operating Systems Graphical User Interfaces Computer Networks Compiler Design Artificial Intelligence and Machine Learning Computer Graphics Bioinformatics Web Search Engines Computer Algorithms and Optimization Geographic Information Systems (GIS) Video Games Financial Systems Cryptography Natural Language Processing (NLP) Thursday, July 11, 2024 12

Course Structure Savitribai Phule Pune University Fourth Year of Computer Engineering (2019 Course) 410244(C): Cyber Security and Digital Forensics Teaching Scheme: TH: 03 Hours/Week PR: 02 Hours/Week Credit 03+01 Examination Scheme: In-Sem (Paper): 30 Marks End-Sem (Paper): 70 Marks TW:50 Marks Prerequisite Courses: Good understanding of Programming and Problem-Solving concepts Companion Course: Data Structures Laboratory(210247) Course Objectives: To enhance awareness cyber forensics. To understand issues in cyber crime and different attacks To understand underlying principles and many of the techniques associated with the digital forensic practices To know the process and methods of evidence collection To analyze and validate forensic data collected. To apply digital forensic knowledge to use computer forensic tools and investigation report writing. Course Outcomes: CO1: Analyze threats in order to protect or defend it in cyberspace from cyber-attacks. CO2: Build appropriate security solutions against cyber-attacks. CO3: Underline the need of digital forensic and role of digital evidences. CO4: Explain rules and types of evidence collection CO5: Analyze, validate and process crime scenes CO6: Identify the methods to generate legal evidence and supporting investigation reports. Thursday, July 11, 2024 13

Syllabus Contents Sr. No. Unit Title Marking Scheme In-Sem End-Sem I Introduction to Cyber Security 15 - II Cyber Crime Issues and Cyber attacks 15 - III Introduction to Digital Forensics - 18 IV Evidence Collection and Data Seizure - 17 V Computer Forensics analysis and validation - 18 VI Current Computer Forensic tools - 17 Thursday, July 11, 2024 14

I- Introduction to Cyber Security Thursday, July 11, 2024 15 Introduction and Overview of Cyber Crime, Nature and Scope of Cyber Crime, Types of Cyber Crime: crime against an individual, Crime against property, Cyber extortion, Drug trafficking, cyber terrorism. Need for Information security, Threats to Information Systems, Information Assurance, Cyber Security, and Security Risk Analysis. #Exemplar/Case Studies Data Breach Digest – Perspective & Reality : http://verizonenterprise.com/databreachdigest Mapping of Course Outcomes for Unit I CO1

II: Cyber Crime Issues and Cyber attacks Unauthorized Access to Computers, Computer Intrusions, Viruses, and Malicious Code, Internet Hacking and Cracking, Virus and worms, Software Piracy, Intellectual Property, Mail Bombs, Exploitation, Stalking and Obscenity in Internet, Cybercrime prevention methods, Application security (Database, E-mail, and Internet), Data Security Considerations- Backups, Archival Storage and Disposal of Data, Security Technology-Firewall and VPNs, Hardware protection mechanisms, OS Security #Exemplar/Case Studies Cyber Stalking types & their cases respectively Mapping of Course Outcomes for Unit II CO2 Thursday, July 11, 2024 16

III: Introduction to Digital Forensics What is Computer Forensics?, Use of Computer Forensics in Law Enforcement, Computer Forensics Assistance to Human Resources/Employment Proceedings, Computer Forensics Services, Benefits of Professional Forensics Methodology, Steps taken by Computer Forensics Specialists Types of Computer Forensics Technology: Types of Military Computer Forensic Technology, Types of Law Enforcement — Computer Forensic Technology, Types of Business Computer Forensic Technology Computer Forensics Evidence and Capture: Data Recovery Defined, Data Back-up and Recovery, The Role of Back-up in Data Recovery, The Data-Recovery Solution. #Exemplar/Case Studies Demonstrate practice Linux networking security recovery commands. & Study Tools viz; FTK & The Sleuth Kit Mapping of Course Outcomes for Unit III CO3 Thursday, July 11, 2024 17

IV: Evidence Collection and Data Seizure Why Collect Evidence? Collection Options ,Obstacles, Types of Evidence — The Rules of Evidence, Volatile Evidence, General Procedure, Collection and Archiving, Methods of Collection, Artifacts, Collection Steps, Controlling Contamination: The Chain of Custody Duplication and Preservation of Digital Evidence: Preserving the Digital Crime Scene — Computer Evidence Processing Steps, Legal Aspects of Collecting and Preserving Computer Forensic Evidence Computer Image Verification and Authentication: Special Needs of Evidential Authentication, Practical Consideration, Practical Implementation. #Exemplar/Case Studies Understand how computer forensics works by visiting: http://computer.howstuffworks.com/computer-forensic.htm/printable (23 December 2010) Mapping of Course Outcomes for Unit IV CO4 Thursday, July 11, 2024 18

V: Computer Forensics analysis and validation Determining what data to collect and analyze, validating forensic data, addressing data-hiding techniques, and performing remote acquisitions Network Forensics: Network forensics overview, performing live acquisitions, developing standard procedures for network forensics, using network tools, examining the honeynet project. Processing Crime and Incident Scenes: Identifying digital evidence, collecting evidence in private-sector incident scenes, processing law enforcement crime scenes, preparing for a search, securing a computer incident or crime scene, seizing digital evidence at the scene, storing digital evidence, obtaining a digital hash, reviewing a case Exemplar/Case Studies Discuss cases under Financial Frauds, Matrimonial Frauds, Job Frauds, Spoofing, and Social media. Then write down safety tips, precautionary measures for the discussed fraud cases. Mapping of Course Outcomes for Unit V CO5 Thursday, July 11, 2024 19

VI: Current Computer Forensic tools Evaluating computer forensic tool needs, computer forensics software tools, computer forensics hardware tools, validating and testing forensics software E-Mail Investigations: Exploring the role of e-mail in investigation, exploring the roles of the client and server in e-mail, investigating e-mail crimes and violations, understanding e-mail servers, using specialized e-mail forensic tools. #Exemplar/Case Studies Install Kali Linux & practice following examples: https://www.youtube.com/watch?time_continue=6&v=MZXZctqIU-w&feature=emb_logo Mapping of Course Outcomes for Unit V CO6 Thursday, July 11, 2024 20

Part II: Laboratory Practices[CSDF] (410244(C)) Suggested List of Laboratory Experiments Sr. No. Group 1 1. Write a program for Tracking Emails & Investigating Email Crimes. i.e. Write a program to analyze e–mail header 2. Implement a program to generate & verify CAPTCHA image 3. Write a computer forensic application program for Recovering permanent Deleted Files and Deleted Partitions 4. Write a program for Log Capturing and Event Correlation 5. Study and Implementation of Honeypot. Sr. No. Group 2 1. Mini–project: Perform the following steps: Go to the National Child Exploitation Coordination Centre (NCECC) Web site at http://www.ncecc.ca Click on the Reporting child exploitation link. Read “How to Report Internet Pornography or Internet Luring Related to Children.” 2. Mini- Project: Perform the following steps: Go to http://www.usdoj.gov/criminal/cybercrime/cyberstalking.htm. Read the 1999 report on cyber stalking. Thursday, July 11, 2024 21

Study Material Text Books: John R. Vacca, “Computer Forensics”, Computer Crime Investigation Firewall Media, New Delhi. Nelson, Phillips Enfinger , Steuart , “Computer Forensics and Investigations”, CENGAGE Learning References Books: Keith J. Jones, Richard Bejtiich , Curtis W. Rose, “Real Digital Forensics”, Addison- Wesley Pearson Education Tony Sammes and Brian Jenkinson, “Forensic Compiling”, A Tractitioneris Guide, Springer International edition. Christopher L.T. Brown, “Computer Evidence Collection & Presentation”, Firewall Media. Jesus Mena, “Homeland Security, Techniques & Technologies”, Firewall Media. MOOC Courses: MIT Open CourseWare : https://ocw.mit.edu/courses/ eBooks: https://www.pdfdrive.com/computer-forensics-investigating-network-intrusions-and-cyber-crime-e15858265.html https://dokumen.pub/handbook-of-computer-crime-investigation-forensic-tools-and-technology-1stnbsped-0121631036-9780121631031.html Massachusetts Institute of Technology Open Courseware: https://ocw.mit.edu/courses/electrical-engineering-and-computer-science/6-858-computer-systems-security-fall-2014/ Thursday, July 11, 2024 22

Review Quiz Thursday, July 11, 2024 Translator which is used to convert codes of assembly language into machine language is termed as _____ Assembler Attempter Compiler debugger Programming language which uses both object-oriented programming and functional programming paradigms is____ Ada Pascal Machine language Python Answer: a. Assembler Procedural language contains systematic order of ________ Statements Objects Classes operations Answer: d. Python Microsoft’s object-oriented primary programming languages includes________ Java C# Visual Basic Ada 23 Answer: a. Statements Answer: b. C# & C. Visual Basic

24