Computer Forensics Fundamentals – Types of Computer Forensics Technology –Types of Computer Forensics Systems – Vendor and Computer Forensics Services.
Data Recovery – Evidence Collection and Data Seizure Duplication and Preservation of Digital Evidence-Computer Image Verification and Authentication.
Discover of Electronic Evidence-Identification of Data –Reconstructing Past Events – Fighting against Macro Threats – Information Warfare Arsenal – Tactics of the Military – Tactics of Terrorist and Rogues – Tactics of Private Companies
Arsenal – Surveillance Tools – Hackers and Theft of Components –Contemporary Computer Crime-Identity Theft and Identity Fraud – Organized Crime &Terrorism –Avenues Prosecution and Government Efforts – Applying the First Amendment to Computer Related Crime-The Fourth Amendment and other Legal Issues
Developing Forensic Capabilities – Searching and Seizing Computer Related Evidence –Processing Evidence and Report Preparation – Future Issues
Reference Book:
MariE-Helen Maras, “Computer Forensics: Cybercriminals, Laws, and Evidence”, Jones & Bartlett Learning; 2nd Edition, 2014. 2. Chad Steel, “Windows Forensics”, Wiley, 1st Edition, 2006. 3. Majid Yar, “Cybercrime and Society”, SAGE Publications Ltd, Hardcover, 2nd Edition, 2013. 4. Robert M Slade, “Software Forensics: Collecting Evidence from the Scene of a Digital Crime”, Tata McGraw Hill, Paperback, 1st Edition, 2004. concept maP
Text Book:
. John R. Vacca, “Computer Forensics: Computer Crime Scene Investigation”, Cengage Learning, 2nd Edition, 2005. (CHAPTERS 1 – 18). (UNIT I – IV) 2. Marjie T Britz, “Computer Forensics and Cyber Crime: An Introduction”, Pearson Education, 2nd Edition, 2008. (CHAPTERS 3 – 13). (UNIT IV – V)