Cyber Security

 

LESSON PLAN

Subject : CYBSER SECURITY

Year : IV B-Tech

Semester : II

Branch : IT

Faculty : G. Durvasi

Reg : R16

Academic Year : 2020-21

  COURSE OBJECTIVES:

·         Understand foundational Cyber Security principles, Security architecture, risk management, attacks, incidents, and emerging IT and IS technologies.

·         Understand the importance of Cyber Security and the integral role of Cyber Security professionals.

 COURSE OUTCOMES :

  

1.

Factual

CO1: Able to Understand Cyber Security architecture principles

2.

Conceptual

CO2: Able to Identifying System and application security threats and vulnerabilities

3.

Procedural

CO3: Able to Identifying different classes of attacks

4.

Applied

CO4: Able to Understand Cyber Security incidents to apply appropriate response

CO5 : Able to Describing risk management processes and practices

CO6:  Able to Evaluation of decision making outcomes of Cyber Security scenarios

 

TEXT BOOKS:

1.      Cyber Security: Understanding Cyber Crimes, Computer Forensics and Legal Perspectives,

Nina Godbole, Sunit Belapure, Wiley.

2.      Principles of Information Security, Micheal E.Whitman and Herbert J.Mattord, Cengage Learning.

 REFERENCE BOOKS:

1. Information Security, Mark Rhodes, Ousley, MGH.

 

UNIT – 1  :  Introduction to Cybercrime                                                    [Total Classes : 10]

 Activity:

 

 

 

1

 

 

Factual

 Reading Prerequisite concepts- networking concepts, basics of mathematics

Basics of Computer networks

Videos of Computer networks

Referring the content on the Internet

 

 

2

 

 

Conceptual

Video Lectures related to networking

NPTEL Videos

Links from the Internet

Examples

 

3

 Procedural

Refer to text book content

 

 

4

 

pplied

 

             Solving Exercises

Assignments

Quiz etc…

 

Activity / Schedule of UNIT-1 :

Pre-Class : Videos, E-books, Web links, Case Studies etc…

In-Class : Explanation on concept, discussion, Poll, doubts clarification, PPT, Demo etc..

Post-Class : Discussion Forum, Review on topic, Assessment, Quiz, Notes etc….

 

 

CLASS

SL NO

 

CONCEPT

 

OBJECTIVES

PRE-CLASS

 

IN-CLASS

 

POST-CLASS

 

1.

Introduction, Cybercrime: Definition and Origins of the Word,

To learn what cybercrime is.

Refer Text Book -1 : Page no. 1

Discussion on pre-requisites (5 min)

 PPT  presentation

        (35 min)

Discussion or

Poll activity  (5 min)

Summary (5min)

Doubts clarification (5 min)

Discussion Forum on the topic in the  group

Review on the topic

Share material on the topic

 

2.

Cybercrime and Information Security

To understand the importance of cyber security

Refer Text Book -1 :

Page no. 13

 

Revise previous class – (5 mins)

 Asking Questions on previous class randomly (5 Mins)

PPT presentation (20 min)

Example (5 min)

Doubts clarification

        (5 min)

.

Discussion Forum on the topic in the  group

 

Review on the topic

 

Share material on the topic

 

 

3

Who are Cybercriminals? 

To understand who is called as a cybercriminal

Refer Text Book -1 :

Page no. 16

 

Revise previous class – (5 mins)

 Asking Questions on previous class randomly (5 Mins)

 

PPT presentation (20 min)

Example (15 min)

 

Doubts clarification

        (5 min)

.

Discussion Forum on the topic in the  group

 

Review on the topic

 

Share material on the topic

 

 

4.

Classifications of Cybercrimes

To understand different types of cybercrime 

Refer Text Book -1 :

Page no. 17

 

Revise previous class – (5 mins)

 

Asking Questions on previous class randomly (5 Mins)

 

PPT presentation (20 min)

Example (15 min)

 

Doubts clarification

        (5 min)

.

Discussion Forum on the topic in the  group

 

Review on the topic

 

Share material on the topic

 

 

5.

Cybercrime: The Legal Perspectives,

To understand the legal perspective on cybercime

Refer Text Book -1 :

Page no. 32

 

Revise previous class – (5 mins)

 

Asking Questions on previous class randomly (5 Mins)

 

PPT presentation (20 min)

Example (15 min)

 

Doubts clarification

        (5 min)

.

Discussion Forum on the topic in the  group

 

Review on the topic

 

Share material on the topic

 

6.

Cybercrimes: An Indian Perspective, Cybercrime and the Indian ITA 2000

To understand the legal perspective on cybercime in india and ITA 2000

Refer Text Book -1 :

Page no. 32

 

Revise previous class – (5 mins)

 

Asking Questions on previous class randomly (5 Mins)

 

PPT presentation (20 min)

Example (15 min)

 

Doubts clarification

        (5 min)

Discussion Forum on the topic in the  group

 

Review on the topic

 

Share material on the topic

 

 

7.

A Global Perspective on Cybercrimes

To get an overview of cybercrime scenario in the overall global perspective.

Refer Text Book -1 :

Page no. 36

 

Revise previous class – (5 mins)

 

Asking Questions on previous class randomly (5 Mins)

 

PPT presentation (20 min)

Example (15 min)

 

Doubts clarification

        (5 min)

.

Discussion Forum on the topic in the  group

 

Review on the topic

 

Share material on the topic

 

 

 

7.

Cybercrime Era: Survival Mantra for the Netizens

To understand Survival Mantra for the Netizens

Refer Text Book -1 :

Page no. 39

 

Revise previous class – (5 mins)

 

Asking Questions on previous class randomly (5 Mins)

 

PPT presentation (20 min)

Example (15 min)

 

Doubts clarification

        (5 min)

.

Discussion Forum on the topic in the  group

 

Review on the topic

 

Share material on the topic

 

 

 

 

 

UNIT – 2  :     Cyberoffensess: How criminals Plan Them            [Total Classes : 10]

 

Activity:

 

 

 

1

 

 

Factual

 

Reading Prerequisite  concepts- cryptography basics, basics of mathematics

Referring the content on the Internet

 

 

2

 

 

Conceptual

Video Lectures related to basics of cryptography

NPTEL Videos

Links from the Internet

Explained Examples from Internet

 

3

 

Procedural

Refer to text book content

Examples(simple to complex)

 

 

4

 

 

Applied

 

              Assignments

Quiz etc…

 

 

Activity / Schedule of UNIT-2 :

 

Pre-Class : Videos, E-books, Web links, Case Studies etc…

In-Class : Explanation on concept, discussion, Poll, doubts clarification, PPT, Demo etc..

Post-Class : Discussion Forum, Review on topic, Assessment, Quiz, Notes etc….

 

 

CLASS

SL NO

 

CONCEPT

 

OBJECTIVES

PRE-CLASS

 

IN-CLASS

 

POST-CLASS

1.

Introduction: Categories of Cybercrime

To understand categories of cybercrime

Refer Text Book -1 :

Page no. 45

 

Revise previous class – (5 mins)

 

Asking Questions on previous class randomly (5 Mins)

 

Practicing Some Problems (35 min)

 

 

Doubts clarification

        (5 min)

 

Discussion Forum on the topic in the  group

 

Review on the topic

 

Share material on the topic

 

 

 

2.

How Criminals Plan the Attacks

To get an overview of the steps involved in planning cybercrime

Refer Text Book -1 :

Page no. 49

Discussion on pre-requisites (5 min)

 PPT  presentation

         (35 min)

Discussion or

Poll activity

         (5 min)

Summery (5min)

Doubts clari-fication (5 min)

Discussion Forum on the topic in the  group

 

Review on the topic

 

Share material on the topic

 

 

 

3.

Social engineering

To get an overview on social engineering

Refer Text Book -1 :

Page no. 61

 

Revise previous class – (5 mins)

 

Asking Questions on previous class randomly (5 Mins)

 

PPT presentation (35 min)

 

Doubts clarification

        (5 min)

 

Discussion Forum on the topic in the  group

 

Review on the topic

 

Share material on the topic

 

 

 

4.

Cyberstalking

To understand what cyber stalking is

Refer Text Book -1 :

Page no. 65

 

Revise previous class – (5 mins)

 

Asking Questions on previous class randomly (5 Mins)

 

PPT presentation (35 min)

 

 

Doubts clarification

        (5 min)

 

Discussion Forum on the topic in the  group

 

Review on the topic

 

Share material on the topic

 

 

5.

Cybercafé and Cybercrimes

To learn about the role of cybercafés in cybercrime

Refer Text Book -1 :

Page no. 67

 

Revise previous class – (5 mins)

 

Asking Questions on previous class randomly (5 Mins)

 

Practicing Some Problems (35 min)

 

 

Doubts clarification

        (5 min)

 

Discussion Forum on the topic in the  group

 

Review on the topic

 

Share material on the topic

 

 

 

6.

Botnets: The fuel for cybercrime

To learn about botnets

Refer Text Book -1 :

Page no. 71

 

Revise previous class – (5 mins)

 

Asking Questions on previous class randomly (5 Mins)

 

Practicing Some Problems (35 min)

 

Doubts clarification

        (5 min)

 

Discussion Forum on the topic in the  group

 

Review on the topic

 

Share material on the topic

 

 

 

7.

Attack Vector

To learn about attack vector

Refer Text Book -1 :

Page no. 73

 

Revise previous class – (5 mins)

 

Asking Questions on previous class randomly (5 Mins)

 

PPT presentation (35 min)

 

Doubts clarification

        (5 min)

 

Discussion Forum on the topic in the  group

 

Review on the topic

 

Share material on the topic

 

 

 

8.

Cloud Computing

To get an overview on cloud computing

Refer Text Book -1 :

Page no. 75

 

Revise previous class – (5 mins)

 

Asking Questions on previous class randomly (5 Mins)

 

PPT presentation (35 min)

 

Doubts clarification

        (5 min)

 

Discussion Forum on the topic in the  group

 

Review on the topic

 

Share material on the topic

 

 

 

9.

Cybercrime and cloud computing

To understand the risk associated with cloud computing

Refer Text Book -1 :

Page no. 77

 

Revise previous class – (5 mins)

 

Asking Questions on previous class randomly (5 Mins)

 

PPT presentation (35 min)

 

 

Doubts clarification

        (5 min)

 

Discussion Forum on the topic in the  group

 

Review on the topic

 

Share material on the topic

 

 


 

UNIT – 3  :  Cybercrime: Mobile and Wireless Devices                             [Total Classes : 10]

 

 

Activity:

 

 

 

1

 

 

Factual

 

Reading Prerequisite  concepts- numbers

Videos related to asymmetric cryptography

Referring the content on the Internet

 

 

2

 

 

Conceptual

Video Lectures related to number theory

Links from the Internet

Explained Examples from Internet

 

3

 

Procedural

Refer to text book content

Understanding the concept by implementation

 

 

4

 

 

Applied

 

            Implementing Programs,

Assignments

Quiz etc…

 

 

Activity / Schedule of UNIT-3 :

 

Pre-Class : Videos, E-books, Web links, Case Studies etc…

In-Class : Explanation on concept, discussion, Poll, doubts clarification, PPT, Demo etc..

Post-Class : Discussion Forum, Review on topic, Assessment, Quiz, Notes etc….

 

 

 

 

CLASS

SL NO

 

CONCEPT

 

OBJECTIVES

PRE-CLASS

 

IN-CLASS

 

POST-CLASS

 

1.

Introduction, Proliferation of Mobile and Wireless Devices,

To understand the growth of mobile and wireless decvices

Refer Text Book -1 :

Page no. 82

 

Revise previous class – (5 mins)

 

Asking Questions on previous class randomly (5 Mins)

 

PPT presentation (35 min)

 

 

Doubts clarification

        (5 min)

 

Discussion Forum on the topic in the  group

 

Review on the topic

 

Share material on the topic

 

 

2.

Trends in Mobility

To understand mobility types and implications

Refer Text Book -1 :

Page no. 84

 

Revise previous class – (5 mins)

 

Asking Questions on previous class randomly (5 Mins)

 

PPT presentation (35 min)

 

 

Doubts clarification

        (5 min)

 

Discussion Forum on the topic in the  group

 

Review on the topic

 

Share material on the topic

 

 

3

Credit Card Frauds in Mobile and Wireless Computing Era

To understand types of credit card frauds in mobile and computing era

Refer Text Book -1 :

Page no. 87

 

Revise previous class – (5 mins)

 

Asking Questions on previous class randomly (5 Mins)

 

PPT presentation (35 min)

 

 

Doubts clarification

        (5 min)

 

Discussion Forum on the topic in the  group

 

Review on the topic

 

Share material on the topic

 

 

4

Security Challenges Posed by Mobile Devices, Registry Settings for Mobile Devices,

To understand the security challenges posed by mobile devices

Refer Text Book -1 :

Page no. 91

 

Revise previous class – (5 mins)

 

Asking Questions on previous class randomly (5 Mins)

 

PPT presentation (35 min)

 

 

Doubts clarification

        (5 min)

 

Discussion Forum on the topic in the  group

 

Review on the topic

 

Share material on the topic

 

 

5

Authentication Service Security,

To understand authentication service security

Refer Text Book -1 :

Page no. 93

 

Revise previous class – (5 mins)

 

Asking Questions on previous class randomly (5 Mins)

 

PPT presentation (35 min)

 

 

Doubts clarification

        (5 min)

 

Discussion Forum on the topic in the  group

 

Review on the topic

 

Share material on the topic

 

 

6

Attacks on Mobile/Cell Phones

To understand attacks on mobile phones

Refer Text Book -1 :

Page no. 99

 

Revise previous class – (5 mins)

 

Asking Questions on previous class randomly (5 Mins)

 

PPT presentation (35 min)

 

 

Doubts clarification

        (5 min)

 

Discussion Forum on the topic in the  group

 

Review on the topic

 

Share material on the topic

 

 

7

Mobile Devices: Security Implications for Organizations,

To understand security implications for organizations

Refer Text Book -1 :

Page no. 107

 

Revise previous class – (5 mins)

 

Asking Questions on previous class randomly (5 Mins)

 

PPT presentation (35 min)

 

 

Doubts clarification

        (5 min)

 

Discussion Forum on the topic in the  group

 

Review on the topic

 

Share material on the topic

 

 

8

Organizational Measures for Handling Mobile

To understand organizational measures for handling mobile

Refer Text Book -1 :

Page no. 112

 

Revise previous class – (5 mins)

 

Asking Questions on previous class randomly (5 Mins)

 

PPT presentation (35 min)

 

 

Doubts clarification

        (5 min)

 

Discussion Forum on the topic in the  group

 

Review on the topic

 

Share material on the topic

 

 

9

Organizational Security Policies and Measures in Mobile Computing Era,

To understand security policies and measures in mobile computing era

Refer Text Book -1 :

Page no. 114

 

Revise previous class – (5 mins)

 

Asking Questions on previous class randomly (5 Mins)

 

PPT presentation (35 min)

 

 

Doubts clarification

        (5 min)

 

Discussion Forum on the topic in the  group

 

Review on the topic

 

Share material on the topic

 

 

10

Laptops

To learn physical security countermeasures on laptops

Refer Text Book -1 :

Page no. 116

 

 

 

 

UNIT – 4  :  Tools and Methods used in cybercrime         [Total Classes :12]

 

 

Activity:

 

 

 

1

 

 

Factual

Reading Prerequisite  concepts- security services, symmetric keys

Videos related to security services

Referring the content on the Internet

 

 

2

 

 

Conceptual

Video Lectures related Security services and mechanisms  

NPTEL Videos

Links from the Internet

Explained Examples from Internet

 

3

 

Procedural

Refer to text book content

 

 

4

 

 

Applied

 

            Assignments

Quiz etc…

 

 

Activity / Schedule of UNIT-4 :

 

Pre-Class : Videos, E-books, Web links, Case Studies etc…

In-Class : Explanation on concept, discussion, Poll, doubts clarification, PPT, Demo etc..

Post-Class : Discussion Forum, Review on topic, Assessment, Quiz, Notes etc….

 

 

 

CLASS

SL NO

 

CONCEPT

 

OBJECTIVES

PRE-CLASS

 

IN-CLASS

 

POST-CLASS

 

1.

Introduction, tools and methods used in cybercrime

 

Refer Text Book -1 :

Page no. 125

 

Revise previous class – (5 mins)

 

Asking Questions on previous class randomly (5 Mins)

 

PPT presentation (35 min)

 

 

Doubts clarification

        (5 min)

 

Discussion Forum on the topic in the  group

 

Review on the topic

 

Share material on the topic

 

 

2.

Proxy Servers and Anonymizers

To understand about proxy servers and anonymizers

Refer Text Book -1 :

Page no. 129

 

Revise previous class – (5 mins)

 

Asking Questions on previous class randomly (5 Mins)

 

PPT presentation (35 min)

 

 

Doubts clarification

        (5 min)

 

Discussion Forum on the topic in the  group

 

Review on the topic

 

Share material on the topic

 

 

3.

Phishing 

 

Refer Text Book -1 :

Page no. 131

 

Revise previous class – (5 mins)

 

Asking Questions on previous class randomly (5 Mins)

 

PPT presentation (35 min)

 

 

Doubts clarification

        (5 min)

 

Discussion Forum on the topic in the  group

 

Review on the topic

 

Share material on the topic

 

 

4.

Password cracking,

To learn about password cracking

Refer Text Book -1 :

Page no. 132

 

Revise previous class – (5 mins)

 

Asking Questions on previous class randomly (5 Mins)

 

PPT presentation (35 min)

 

 

Doubts clarification

        (5 min)

 

Discussion Forum on the topic in the  group

 

Review on the topic

 

Share material on the topic

 

 

5.

Key loggers and Spywares

To learn what keyloggers and spywares do

Refer Text Book -1 :

Page no. 137

 

Revise previous class – (5 mins)

 

Asking Questions on previous class randomly (5 Mins)

 

PPT presentation (35 min)

 

 

Doubts clarification

        (5 min)

 

Discussion Forum on the topic in the  group

 

Review on the topic

 

Share material on the topic

 

 

6.

Virus and Worms

To get the overview of virus and worms

Refer Text Book -1 :

Page no. 143

 

Revise previous class – (5 mins)

 

Asking Questions on previous class randomly (5 Mins)

 

PPT presentation (35 min)

 

 

Doubts clarification

        (5 min)

 

Discussion Forum on the topic in the  group

 

Review on the topic

 

Share material on the topic

 

 

7.

Trojan Horses and Backdoors

To learn about Trojan horses and backdoors

Refer Text Book -1 :

Page no. 151

 

Revise previous class – (5 mins)

 

Asking Questions on previous class randomly (5 Mins)

 

PPT presentation (35 min)

 

 

Doubts clarification

        (5 min)

 

Discussion Forum on the topic in the  group

 

Review on the topic

 

Share material on the topic

 

 

8.

Steganography

To understand what steganograpy is

Refer Text Book -1 :

Page no. 158

 

Revise previous class – (5 mins)

 

Asking Questions on previous class randomly (5 Mins)

 

PPT presentation (35 min)

 

 

Doubts clarification

        (5 min)

 

Discussion Forum on the topic in the  group

 

Review on the topic

 

Share material on the topic

 

 

9.

DoS and DDoS

To learn about DoS and DDoS attacks

Refer Text Book -1 :

Page no. 158

 

Revise previous class – (5 mins)

 

Asking Questions on previous class randomly (5 Mins)

 

PPT presentation (35 min)

 

 

Doubts clarification

        (5 min)

 

Discussion Forum on the topic in the  group

 

Review on the topic

 

Share material on the topic

 

 

10.

Sql Injection

To learn about SQL injection

Refer Text Book -1 :

Page no. 164

 

Revise previous class – (5 mins)

 

Asking Questions on previous class randomly (5 Mins)

 

PPT presentation (35 min)

 

 

Doubts clarification

        (5 min)

 

Discussion Forum on the topic in the  group

 

Review on the topic

 

Share material on the topic

 

 

11.

Buffer Overflow

To understand buffer overflow

Refer Text Book -1 :

Page no. 168

 

Revise previous class – (5 mins)

 

Asking Questions on previous class randomly (5 Mins)

 

PPT presentation (35 min)

 

 

Doubts clarification

        (5 min)

 

Discussion Forum on the topic in the  group

 

Review on the topic

 

Share material on the topic

 

 

12.

Attacks on Wireless Networks

To get an overview of wireless network hacking

Refer Text Book -1 :

Page no. 176

 

Revise previous class – (5 mins)

 

Asking Questions on previous class randomly (5 Mins)

 

PPT presentation (35 min)

 

 

Doubts clarification

        (5 min)

 

Discussion Forum on the topic in the  group

 

Review on the topic

 

Share material on the topic

 

 

 

UNIT – 5  :     Cybercrimes and Cyber security:Why Do We Need Cyber laws [Total Classes : 08]

 

 

Activity:

 

 

 

1

 

 

Factual

 

Reading Prerequisite  concepts- Network layers, email architecture

Videos related to network layer, email service

Referring the content on the Internet

 

 

2

 

 

Conceptual

Video Lectures related to OSI model

NPTEL Videos

Links from the Internet

Explained Examples from Internet

 

3

 

Procedural

Refer to text book concepts

Understanding the architectures

 

 

4

 

Applied

              Assignments

Quiz etc…

 

 

Activity / Schedule of UNIT-5 :

 

Pre-Class : Videos, E-books, Web links, Case Studies etc…

In-Class : Explanation on concept, discussion, Poll, doubts clarification, PPT, Demo etc..

Post-Class : Discussion Forum, Review on topic, Assessment, Quiz, Notes etc….

 

 

 

CLASS

SL NO

 

CONCEPT

 

OBJECTIVES

PRE-CLASS

 

IN-CLASS

 

POST-CLASS

 

1.

The Indian Context, The Indian IT Act,

 

Refer Text Book -1 :

Page no. 253

 

Revise previous class – (5 mins)

 

Asking Questions on previous class randomly (5 Mins)

 

PPT presentation (35 min)

 

 

Doubts clarification

        (5 min)

 

Discussion Forum on the topic in the  group

 

Review on the topic

 

Share material on the topic

 

 

2.

Challenges to Indian Law and Cybercrime Scenario in India

 

Refer Text Book -1 :

Page no. 271

 

Revise previous class – (5 mins)

 

Asking Questions on previous class randomly (5 Mins)

 

PPT presentation (35 min)

 

 

Doubts clarification

        (5 min)

 

Discussion Forum on the topic in the  group

 

Review on the topic

 

Share material on the topic

 

 

3.

Consequences of Not Addressing the Weakness in Information Technology Act,

 

Refer Text Book -1 :

Page no. 272

 

Revise previous class – (5 mins)

 

Asking Questions on previous class randomly (5 Mins)

 

PPT presentation (35 min)

 

 

Doubts clarification

        (5 min)

 

Discussion Forum on the topic in the  group

 

Review on the topic

 

Share material on the topic

 

 

4.

Digital Signatures and the Indian IT Act

 

Refer Text Book -1 :

Page no. 273

 

Revise previous class – (5 mins)

 

Asking Questions on previous class randomly (5 Mins)

 

PPT presentation (35 min)

 

Doubts clarification

        (5 min)

 

Discussion Forum on the topic in the  group

 

Review on the topic

 

Share material on the topic

 

 

5.

Information Security Planning and Governance,

To define management’s role in the development, maintenance, and enforcement of information security policy, standards, practices, procedures, and guidelines

Refer Text Book -2 :

Page no. 174

 

Revise previous class – (5 mins)

 

Asking Questions on previous class randomly (5 Mins)

 

PPT presentation (35 min)

 

 

Doubts clarification

        (5 min)

 

Discussion Forum on the topic in the  group

 

Review on the topic

 

Share material on the topic

 

 

6.

Information Security Policy Standards, Practices

To define management’s role in the development, maintenance, and enforcement of information security policy, standards, practices, procedures, and guidelines

Refer Text Book -2 :

Page no.177

 

Revise previous class – (5 mins)

 

Asking Questions on previous class randomly (5 Mins)

 

PPT presentation (35 min)

 

 

Doubts clarification

        (5 min)

 

Discussion Forum on the topic in the  group

 

Review on the topic

 

Share material on the topic

 

 

7.

The information Security Blueprint,

To Describe what an information security blueprint is, identify its major components, and explain how it supports the information security program

Refer Text Book -2 :

Page no. 190

 

Revise previous class – (5 mins)

 

Asking Questions on previous class randomly (5 Mins)

 

PPT presentation (35 min)

 

 

Doubts clarification

        (5 min)

 

Discussion Forum on the topic in the  group

 

Review on the topic

 

Share material on the topic

 

 

8.

Security education Training and awareness program,

To Discuss how an organization institutionalizes its policies, standards, and practices using education, training, and awareness programs

Refer Text Book -2 :

Page no. 209

 

Revise previous class – (5 mins)

 

Asking Questions on previous class randomly (5 Mins)

 

PPT presentation (35 min)

 

Doubts clarification

        (5 min)

 

Discussion Forum on the topic in the  group

 

Review on the topic

 

Share material on the topic

 

 

9

Continuing Strategies

To Explain what contingency planning is and how it relates to incident response planning, disaster recovery planning, and business continuity plans

Refer Text Book -2 :

Page no. 211

 

 

 

 

UNIT – 6  :     Understanding Computer Forensics                                      [Total Classes : 12]

 

 

Activity:

 

 

 

1

 

 

Factual

 

Reading Prerequisite  concepts-

Referring the content on the Internet

 

 

2

 

 

Conceptual

Video Lectures related OSI model

Explained Examples from Internet

 

3

 

Procedural

Refer to text book concepts

Understanding the architectures

 

 

 

4

 

 

Applied

 

             

Assignments

Quiz etc…

 

 

Activity / Schedule of UNIT-6 :

 

Pre-Class : Text books, Case Studies etc…

In-Class : Explanation on concept, discussion,  doubts clarification, PPT, etc..

Post-Class : Discussion Forum, Review on topic, Assessment, Quiz, Notes etc….

 

 

 

CLASS

SL NO

 

CONCEPT

 

OBJECTIVES

PRE-CLASS

 

IN-CLASS

 

POST-CLASS

 

1.

Introduction, Historical Background  of Cyber forensics,

To understand the fundamental concepts in cyber forensics

Refer Text Book -1 :

Page no.317

Revise previous class – (5 mins)

 

Asking Questions on previous class randomly (5 Mins)

 

PPT presentation (35 min)

 

Doubts clarification

        (5 min)

 

Discussion Forum on the topic in the  group

 

Review on the topic

 

Share material on the topic

 

 

2.

Digital Forensics Science, The Need for Computer Forensics,

To understand the need for cyberforensics

Refer Text Book -1 :

Page no.320

Revise previous class – (5 mins)

 

Asking Questions on previous class randomly (5 Mins)

 

PPT presentation (35 min)

 

Doubts clarification

        (5 min)

 

Discussion Forum on the topic in the  group

 

Review on the topic

 

Share material on the topic

 

 

3.

Cyber forensics and Digital Evidence

To learn what digital evidences is

Refer Text Book -1 :

Page no.327

Revise previous class – (5 mins)

 

Asking Questions on previous class randomly (5 Mins)

 

PPT presentation (35 min)

 

Doubts clarification

        (5 min)

 

Discussion Forum on the topic in the  group

 

Review on the topic

 

Share material on the topic

 

 

4.

Forensics Analysis of E-Mail

To understand forensics analysis of E-mail

Refer Text Book -1 :

Page no.332

Revise previous class – (5 mins)

 

Asking Questions on previous class randomly (5 Mins)

 

PPT presentation (35 min)

 

Doubts clarification

        (5 min)

 

Discussion Forum on the topic in the  group

 

Review on the topic

 

Share material on the topic

 

 

5.

Digital Forensics Life Cycle, Chain of Custody Concept

To understand digital forensics life cycle

Refer Text Book -1 :

Page no.339

Revise previous class – (5 mins)

 

Asking Questions on previous class randomly (5 Mins)

 

PPT presentation (35 min)

 

Doubts clarification

        (5 min)

 

Discussion Forum on the topic in the  group

 

Review on the topic

 

Share material on the topic

 

 

6

Network Forensics, Approaching a Computer Forensics Investigation,

To understand Computer Forensics Investigation approach

Refer Text Book -1 :

Page no.357

Revise previous class – (5 mins)

 

Asking Questions on previous class randomly (5 Mins)

 

PPT presentation (35 min)

 

Doubts clarification

        (5 min)

 

Discussion Forum on the topic in the  group

 

Review on the topic

 

Share material on the topic

 

 

7

Computer Forensics and Steganography

To understand Computer Forensics and Steganography

Refer Text Book -1 :

Page no.368

Revise previous class – (5 mins)

 

Asking Questions on previous class randomly (5 Mins)

 

PPT presentation (35 min)

 

Doubts clarification

        (5 min)

 

Discussion Forum on the topic in the  group

 

Review on the topic

 

Share material on the topic

 

 

8

Relevance of the OSI 7 Layer Model to Computer Forensics

To understand the network processes and protocols in OSI nodel

Refer Text Book -1 :

Page no.373

Revise previous class – (5 mins)

 

Asking Questions on previous class randomly (5 Mins)

 

PPT presentation (35 min)

 

Doubts clarification

        (5 min)

 

Discussion Forum on the topic in the  group

 

Review on the topic

 

Share material on the topic

 

 

9

Forensics and Social Networking Sites: The

Security/Privacy Threats

To understand the data privacy issues involved

Refer Text Book -1 :

Page no.377

Revise previous class – (5 mins)

 

Asking Questions on previous class randomly (5 Mins)

 

PPT presentation (35 min)

 

Doubts clarification

        (5 min)

 

Discussion Forum on the topic in the  group

 

Review on the topic

 

Share material on the topic

 

 

10

Computer Forensics from Compliance Perspective,

To understand the legal requirements for cyberforensics and compliance perspective

Refer Text Book -1 :

Page no.383

Revise previous class – (5 mins)

 

Asking Questions on previous class randomly (5 Mins)

 

PPT presentation (35 min)

 

Doubts clarification

        (5 min)

 

Discussion Forum on the topic in the  group

 

Review on the topic

 

Share material on the topic

 

 

11

Challenges in Computer Forensics,

To understand the challenges faced in cyber-forensics

Refer Text Book -1 :

Page no.389

Revise previous class – (5 mins)

 

Asking Questions on previous class randomly (5 Mins)

 

PPT presentation (35 min)

 

Doubts clarification

        (5 min)

 

Discussion Forum on the topic in the  group

 

Review on the topic

 

Share material on the topic

 

 

12

Special Tools and Techniques,  Forensics Auditing, Ant forensics

To learn about cyber forensics tools available in the market

To learn about auditing

Refer Text Book -1 :

Page no.396

Revise previous class – (5 mins)

 

Asking Questions on previous class randomly (5 Mins)

 

PPT presentation (35 min)

 

Doubts clarification

        (5 min)

 

Discussion Forum on the topic in the  group

 

Review on the topic

 

Share material on the topic

 

 

 

Total classes:

Unit.No

Name Of The Unit

Hours Planned

Unit-1

 

10

Unit-2

 

12

Unit-3

 

14

Unit-4

 

17

Unit-5

 

8

Unit-6

Understanding Computer Forensics

12

 

Total Hours

71

 

Signature of HOD

 

 

(S. Kishor Babu)

 

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.

Full Stack Development

What is Full Stack Development? Full Stack Development refers to the process of designing, creating testing and deploying a complete web app...