Subject Details
Dept     : CSE
Sem      : 5
Regul    : R2019
Faculty : Mrs. Lavanya M
phone  : NIL
E-mail  : lavanya.m.cse@snsct.org
482
Page views
64
Files
2
Videos
3
R.Links

Icon
Announcements

  • Lecture Notes

    Dear Students the Lecture Notes has been uploaded for the following topics:
    Introduction,
    Introduction, Proliferation of Mobile and Wireless Devices

  • Assignment

    Assignment topic is Organization threat and due date is 10-11-2023.

  • Assignment

    Assignment topic is Cyber Forensics and due date is 26-10-2023.

  • Assignment

    Assignment topic is Cyber Forensics and due date is 27-10-2023.

  • Assignment

    Assignment topic is Cyber Forensics and due date is .

  • Question Bank

    Dear Students the Question Bank has been uploaded for the following topics:
    Question Paper,
    Question Paper - Answer Key,
    Question Paper

  • Question Bank

    Dear Students the Question Bank has been uploaded for the following topics:
    2 Marks,
    2 Marks,
    Question Paper,
    Question Paper Answer Key

  • Puzzles

    Dear Students the Puzzles has been uploaded for the following topics:
    MCQ

  • Youtube Video

    Dear Students the Youtube Video has been uploaded for the following topics:
    Cryptography
    Introduction to Memory Forensics

  • Resource Link

    Dear Students the Resource Link has been uploaded for the following topics:
    Introduction to Memory Forensics
    Cryptography
    cyber security

  • Lecture Notes

    Dear Students the Lecture Notes has been uploaded for the following topics:
    Network and Security concepts,
    Information Assurance,
    Cryptography,
    Domain Name System (DNS) - Firewall,
    Virtualization – Radio-Frequency Identification,
    Attacker technique and motivation - proxy,
    Tunnelling Technique,
    Fraud techniques,
    Threat Infrastructure.,
    Introduction,
    Historical background of Cyber forensics,
    Digital Forensics Science,
    The Need for Computer Forensics,
    Cyber Forensics and Digital evidence,
    Forensics Analysis of Email,
    Digital Forensics Lifecycle,
    Forensics Investigation,
    Challenges in Computer Forensics,
    Introduction, Proliferation of Mobile and Wireless Devices,
    Trends in Mobility,
    Credit card Frauds in Mobile and Wireless Computing Era,
    Security Challenges Posed by Mobile Devices,
    Registry Settings for Mobile Devices,
    Authentication service Security,
    Attacks on Mobile/Cell Phones,
    Organizational security Policies and Measures in Mobile Computing Era,
    Laptops

  • Puzzles

    Dear Students the Puzzles has been uploaded for the following topics:
    MCQ,
    MCQ

  • Lecture Notes

    Dear Students the Lecture Notes has been uploaded for the following topics:
    Memory Forensics,
    Honeypots,
    Malicious Code Naming,
    Automated Malicious Code,
    Automated Malicious Code Analysis System,
    Passive analysis,
    Active analysis,
    Intrusion,
    Intrusion Detection System,
    Introduction, cost of cybercrimes and IPR issues,
    web threats for organizations,
    security and privacy implications,
    social media marketing,
    security risks,
    perils for organizations,
    social computing,
    The associated challenges for organizations,
    Case Study: Ransomware Attack