-
Site Admin
Study Notes on Data Privacy – Cyber Forensics | Elective Paper- III SEM 3
Unit 1: Introduction to Privacy Data Protection & Privacy Terminologies Data Protection Principles and Approaches to Privacy Code for Protection of Personal Information Information Life Cycle Data Security Threats and Mitigation Data Storage Security Issues in Cloud Computing Data Protection & Privacy Terminologies Data Protection: Safeguarding data from unauthorized access and ensuring its confidentiality and…
-
Site Admin
Study Notes on Advanced Information Security – Cyber Forensics | Core Paper- XI SEM 3
Unit 1: Digital Rights Management Meaning of Digital Rights Management (DRM) Need for DRM and preventing illegal file sharing on the Internet DRM schemes – Microsoft DRM 2.0, and the Content Scrambling System Reasons why DRM schemes have been unsuccessful so far Requirements for a good DRM scheme – secure hardware, secure software, and an…
-
Site Admin
Study Notes on Advanced Cyber Forensics – Cyber Forensics | Core Paper- X SEM 3
Unit 1: Windows Forensics Volatile Data Collection Memory Dump System Time Logged On Users Open Files Network Information (Cached NetBIOS Name Table) Network Connections Process Information Process-to-Port Mapping Process Memory Network Status Clipboard Contents Service/Driver Information Command History Mapped Drives Shares Non-Volatile Data Collection Disk Imaging (External Storage such as USB and Native Hard Disk)…
-
Site Admin
Study Notes on Database Management Security – Cyber Forensics | Core Paper- IX SEM 3
Unit 1: Fundamentals of Databases What is a Database? DBMS – Purpose of DB and Users of DB Components of DB Concepts of RDBMS Basic SET Concepts (SET, Subset) Set of Ordered Tuples – Relations as a DB (Concepts of PK, FK, Surrogate Keys, Composite Keys, Candidate Keys) Relational DB Operators (Cartesian Product, Union, Intersect,…
-
Site Admin
Study Notes on BFSI Frauds & Countermeasures – Cyber Forensics | Elective Paper-II SEM 2
Unit 1: Introduction to BFSI Banking Concepts Broad Features of Deposit and Loan Products Types of banks: Retail, Corporate, Investment, Development, Private, etc. Ancillary services like Trade Finance, Remittances, etc. Anti Money Laundering and KYC concepts Banking Concepts: Definition: Banking involves financial intermediation, accepting deposits, and providing loans. Functions: Facilitating payments, managing deposits, lending capital,…
Search
Category
- 1 Notes (18)
- Administrative Law (5)
- Advocates & Judges (22)
- AIBE Exams (3)
- Alternate Dispute Resolution (5)
- Analysis (2)
- Announcements (38)
- Articles (13)
- Banking Law (5)
- Bare Acts (1)
- Call for Papers (23)
- Case Laws (606)
- Certificate Courses (9)
- Civil Procedure (5)
- Class Notes (128)
- Company Law (7)
- Constitutional Law (7)
- Contract Law (7)
- Contract Law II (5)
- Criminal Law (10)
- Criminal Procedure Code (6)
- CS Executive (35)
- Cyber & IT Law (9)
- Cyber Laws (34)
- Cyber Security Tools (3)
- Digital Marketing (2)
- Environmental Law (6)
- Family Law II (5)
- Featured (4)
- Human Rights (5)
- Insurance Law (5)
- Intellectual Property I (6)
- Interpretation of Statutes (5)
- Jobs (85)
- Journalism & Media (31)
- Jurisprudence (5)
- KSLU (12)
- Labour Laws (5)
- Law Exams (19)
- Law of Evidence (5)
- Law of Torts (6)
- Law School Conferences (22)
- Law School Darshan (2)
- Law Schools (110)
- Legal Guides (1)
- LLB Exams (13)
- LLB Guide (147)
- LLM Exams (2)
- Matrimonial & Family law (6)
- Moot Court (6)
- News (84)
- News (23)
- News & Articles (9)
- PGD CyberLaw (6)
- Press and Registration of Books Act (1)
- Professional Ethics (5)
- Public International Law (5)
- Question Papers (11)
- Registration of Newspapers (Central) Rules (1)
- RERA / Real Estate Law (1)
- Resources for Lawyers (1)
- Right to Information (RTI) (5)
- Taxation (4)
- Transfer of Property (6)
- Tuition & Courses (1)
Recent Post
- HardenAD: Fortifying Your Active Directory in Minutesby Site Admin
- BloodHound: Unveiling the Labyrinth of Attack Paths in AD and AADby Site Admin
- Ping Castle: Free Active Directory Security Assessment Toolby Site Admin
- Indian Space Policy 2023: A Comprehensive Reviewby Site Admin
- All You Need to Know About Common Vulnerabilities, Attack Vectors, and Mitigation Techniquesby Site Admin