Introduction, Types of Attacks, Digital Privacy, Online Tracking, Privacy Laws, Types of Computer Security risks ( Malware, Hacking, Pharming, Phishing, Ransomware, Adware and Spyware, Trojan, Virus, Worms, WIFI Eavesdropping, Scareware, Distributed Denial-Of-Service Attack, Rootkits, Juice Jacking), Antivirus and Other Security solution, Password, Secure online browsing, Email Security, Social Engineering, Secure WIFI settings, Track yourself online, Cloud storage security, IOT security, Physical Security Threads. Unit : II Online Anonymity Anonymous Networks, Tor Network, I2P Network, Freenet, Darknet, Anonymous OS – Tails, Secure File Sharing, VPN, Proxy Server, Connection Leak Testing, Secure Search Engine, Web Browser Privacy Configuration, Anonymous Payment
Anonymous Networks, Tor Network, I2P Network, Freenet, Darknet, Anonymous OS – Tails, Secure File Sharing, VPN, Proxy Server, Connection Leak Testing, Secure Search Engine, Web Browser Privacy Configuration, Anonymous Payment
The Difference Between Encryption and Cryptography, Cryptographic Functions, Cryptographic Types, Digital Signature, The Difference Between Digital Signatures and Electronic Signatures, Cryptographic Systems Trust Models, Attacking Cryptographic Systems, Countermeasures Against Cryptography Attacks, Securing Data in Transit, Cloud Storage Encryption, Encrypt DNS Traffic and Email communication, Secure IM and video calls
Unauthorized Access, Computer Intrusions, White collar Crimes, Viruses and Malicious Code, Internet Hacking and Cracking, Virus Attacks, Pornography, Software Piracy, Intellectual Property, Mail Bombs, Exploitation, Stalking and Obscenity in Internet, Digital laws and legislation, Law Enforcement Roles and Responses, Investigation Tools, e-Discovery, Digital Evidence Collection, Evidence Preservation, E-Mail Investigation, E-Mail Tracking, IP Tracking, E-Mail Recovery, Search and Seizure of Computers, Recovering Deleted Evidences, Password Crackin
Introduction to Digital Forensics, Forensic Software and Hardware, Analysis and Advanced Tools, Forensic Technology and Practices, Forensic Ballistics and Photography, Face, Iris and Fingerprint Recognition, Audio Video Analysis, Windows System Forensics, Linux System Forensics, WIFI Security (War-driving), Network Forensics, Mobile Forensics, Cloud Forensics.
Reference Book:
1) Digital Forensics, DSCI - Nasscom, 2012. 2) Cyber Crime Investigation, DSCI - Nasscom, 2013.
Text Book:
1) Digital Privacy and Security Using Windows: A Practical Guide By Nihad Hassan, Rami Hijazi, Apress