Subject Details
Dept     : CSE
Sem      : 5
Regul    : R2019
Faculty : Mrs. Lavanya M
phone  : NIL
E-mail  : lavanya.m.cse@snsct.org
488
Page views
64
Files
2
Videos
3
R.Links

Icon
Lecture Notes

UNIT 1:
word
download   open file
Network and Security concepts
word
download   open file
Information Assurance
word
download   open file
Cryptography
word
download   open file
Domain Name System (DNS) - Firewall
word
download   open file
Virtualization – Radio-Frequency Identification
word
download   open file
Attacker technique and motivation - proxy
word
download   open file
Tunnelling Technique
word
download   open file
Fraud techniques
word
download   open file
Threat Infrastructure.
UNIT 2:
word
download   open file
Introduction
word
download   open file
Historical background of Cyber forensics
word
download   open file
Digital Forensics Science
word
download   open file
The Need for Computer Forensics
word
download   open file
Cyber Forensics and Digital evidence
word
download   open file
Forensics Analysis of Email
word
download   open file
Digital Forensics Lifecycle
word
download   open file
Forensics Investigation
word
download   open file
Challenges in Computer Forensics
word
download   open file
Introduction
UNIT 3:
word
download   open file
Introduction, Proliferation of Mobile and Wireless Devices
word
download   open file
Trends in Mobility
word
download   open file
Credit card Frauds in Mobile and Wireless Computing Era
word
download   open file
Security Challenges Posed by Mobile Devices
word
download   open file
Registry Settings for Mobile Devices
word
download   open file
Authentication service Security
word
download   open file
Attacks on Mobile/Cell Phones
word
download   open file
Organizational security Policies and Measures in Mobile Computing Era
word
download   open file
Laptops
word
download   open file
Introduction, Proliferation of Mobile and Wireless Devices
word
download   open file
Introduction, Proliferation of Mobile and Wireless Devices
UNIT 4:
word
download   open file
Memory Forensics
word
download   open file
Honeypots
word
download   open file
Malicious Code Naming
word
download   open file
Automated Malicious Code
word
download   open file
Automated Malicious Code Analysis System
word
download   open file
Passive analysis
word
download   open file
Active analysis
word
download   open file
Intrusion
word
download   open file
Intrusion Detection System
UNIT 5:
word
download   open file
Introduction, cost of cybercrimes and IPR issues
word
download   open file
web threats for organizations
word
download   open file
security and privacy implications
word
download   open file
social media marketing
word
download   open file
security risks
word
download   open file
perils for organizations
word
download   open file
social computing
word
download   open file
The associated challenges for organizations
word
download   open file
Case Study: Ransomware Attack