-
Site Admin
Study Notes on Data Privacy – Cyber Forensics | Elective Paper- III SEM 3
Unit 1: Introduction to Privacy Data Protection & Privacy Terminologies Data Protection Principles and Approaches to Privacy Code for Protection of Personal Information Information Life Cycle Data Security Threats and Mitigation Data Storage Security Issues in Cloud Computing Data Protection & Privacy Terminologies Data Protection: Safeguarding data from unauthorized access and ensuring its confidentiality and…
-
Site Admin
Study Notes on Advanced Information Security – Cyber Forensics | Core Paper- XI SEM 3
Unit 1: Digital Rights Management Meaning of Digital Rights Management (DRM) Need for DRM and preventing illegal file sharing on the Internet DRM schemes – Microsoft DRM 2.0, and the Content Scrambling System Reasons why DRM schemes have been unsuccessful so far Requirements for a good DRM scheme – secure hardware, secure software, and an…
-
Site Admin
Study Notes on Advanced Cyber Forensics – Cyber Forensics | Core Paper- X SEM 3
Unit 1: Windows Forensics Volatile Data Collection Memory Dump System Time Logged On Users Open Files Network Information (Cached NetBIOS Name Table) Network Connections Process Information Process-to-Port Mapping Process Memory Network Status Clipboard Contents Service/Driver Information Command History Mapped Drives Shares Non-Volatile Data Collection Disk Imaging (External Storage such as USB and Native Hard Disk)…
-
Site Admin
Study Notes on Database Management Security – Cyber Forensics | Core Paper- IX SEM 3
Unit 1: Fundamentals of Databases What is a Database? DBMS – Purpose of DB and Users of DB Components of DB Concepts of RDBMS Basic SET Concepts (SET, Subset) Set of Ordered Tuples – Relations as a DB (Concepts of PK, FK, Surrogate Keys, Composite Keys, Candidate Keys) Relational DB Operators (Cartesian Product, Union, Intersect,…
-
Site Admin
Study Notes on BFSI Frauds & Countermeasures – Cyber Forensics | Elective Paper-II SEM 2
Unit 1: Introduction to BFSI Banking Concepts Broad Features of Deposit and Loan Products Types of banks: Retail, Corporate, Investment, Development, Private, etc. Ancillary services like Trade Finance, Remittances, etc. Anti Money Laundering and KYC concepts Banking Concepts: Definition: Banking involves financial intermediation, accepting deposits, and providing loans. Functions: Facilitating payments, managing deposits, lending capital,…
-
Site Admin
Study Notes on IT and Telecom Frauds & Countermeasures – Cyber Forensics | Core Paper-VII SEM 2
Unit 1: Frauds in IT IT Frauds (Theft of Proprietary Information, Insider abuse of internet access, system penetration, unauthorized access to information, laptop/mobile theft, financial fraud, misuse of public web application, viruses, abuse of wireless network) Countermeasures IT Frauds: Theft of Proprietary Information: Unauthorized acquisition of confidential business data. Insider Abuse of Internet Access: Misuse…
-
Site Admin
Study Notes on Basics of Cyber Forensics – Cyber Forensics | Core Paper-VI SEM 2
Unit 1: Digital Investigation Digital Evidence and Computer Crime History and Terminology of Computer Crime Investigation Technology and Law The Investigative Process Investigative Reconstruction Modus Operandi, Motive, and Technology Digital Evidence in the Courtroom Digital Evidence and Computer Crime: Digital Evidence: Information stored or transmitted in a digital form. Computer Crime: Criminal activities involving computers…
-
Site Admin
Study Notes on Network Security and Cryptography – Cyber Forensics | Core Paper-V SEM 2
Unit 1: Network Security The CIA Triad DAD – Internet Key Exchange (IKE) Internet Protocol Security (IPSec) AH and ESP Header Security Associations Transport Layer Security (TLS) Secure Electronic Transaction (SET) Extensible Authentication Protocol (EAP) Protected Extensible Authentication Protocol (PEAP) Lightweight Extensible Authentication Protocol (LEAP) Secure Multipurpose Internet Mail Extensions (S/MIME) Pretty Good Privacy (PGP)…
-
Site Admin
Study Notes on Forms of Cyber Crimes – Cyber Forensics | Elective Paper-I SEM 1
Unit 1: Cyber Crime – Introduction History and Development Definition, Nature and Extent of Cyber Crimes in India and other countries Classification of Cyber Crimes Trends in Cyber Crimes across the world History and Development: Overview: Understanding the evolution of cybercrime is crucial for effective cyber forensics. Example: The first computer virus, “Creeper,” appeared in…
-
Site Admin
Study Notes on IT Infrastructure and Cloud Computing – Cyber Forensics | Core Paper-IV SEM 1
Unit 1: Computer Hardware Basics Basics of Motherboard including CMOS and BIOS Working of processors and types of processors System memory Introduction to RAM System storage devices Types of hard disks – FAT, NTFS, RAID etc. Optical drives Removable storage devices Tape drives and backup systems Common computer ports – Serial – Parallel – USB…
Search
Category
- 1 Notes (18)
- Administrative Law (5)
- Advocates & Judges (22)
- AIBE Exams (3)
- Alternate Dispute Resolution (5)
- Analysis (2)
- Announcements (38)
- Articles (13)
- Banking Law (5)
- Bare Acts (1)
- Call for Papers (23)
- Case Laws (606)
- Certificate Courses (9)
- Civil Procedure (5)
- Class Notes (128)
- Company Law (7)
- Constitutional Law (7)
- Contract Law (7)
- Contract Law II (5)
- Criminal Law (10)
- Criminal Procedure Code (6)
- CS Executive (35)
- Cyber & IT Law (9)
- Cyber Laws (34)
- Cyber Security Tools (3)
- Digital Marketing (2)
- Environmental Law (6)
- Family Law II (5)
- Featured (4)
- Human Rights (5)
- Insurance Law (5)
- Intellectual Property I (6)
- Interpretation of Statutes (5)
- Jobs (85)
- Journalism & Media (31)
- Jurisprudence (5)
- KSLU (12)
- Labour Laws (5)
- Law Exams (19)
- Law of Evidence (5)
- Law of Torts (6)
- Law School Conferences (22)
- Law School Darshan (2)
- Law Schools (110)
- Legal Guides (1)
- LLB Exams (13)
- LLB Guide (147)
- LLM Exams (2)
- Matrimonial & Family law (6)
- Moot Court (6)
- News (23)
- News (84)
- News & Articles (9)
- PGD CyberLaw (6)
- Press and Registration of Books Act (1)
- Professional Ethics (5)
- Public International Law (5)
- Question Papers (11)
- Registration of Newspapers (Central) Rules (1)
- RERA / Real Estate Law (1)
- Resources for Lawyers (1)
- Right to Information (RTI) (5)
- Taxation (4)
- Transfer of Property (6)
- Tuition & Courses (1)
Recent Post
- HardenAD: Fortifying Your Active Directory in Minutesby Site Admin
- BloodHound: Unveiling the Labyrinth of Attack Paths in AD and AADby Site Admin
- Ping Castle: Free Active Directory Security Assessment Toolby Site Admin
- Indian Space Policy 2023: A Comprehensive Reviewby Site Admin
- All You Need to Know About Common Vulnerabilities, Attack Vectors, and Mitigation Techniquesby Site Admin