-
Site Admin
Study Notes on IT and Telecom Frauds & Countermeasures – Cyber Forensics | Core Paper-VII SEM 2
Unit 1: Frauds in IT IT Frauds (Theft of Proprietary Information, Insider abuse of internet access, system penetration, unauthorized access to information, laptop/mobile theft, financial fraud, misuse of public web application, viruses, abuse of wireless network) Countermeasures IT Frauds: Theft of Proprietary Information: Unauthorized acquisition of confidential business data. Insider Abuse of Internet Access: Misuse…
-
Site Admin
Study Notes on Basics of Cyber Forensics – Cyber Forensics | Core Paper-VI SEM 2
Unit 1: Digital Investigation Digital Evidence and Computer Crime History and Terminology of Computer Crime Investigation Technology and Law The Investigative Process Investigative Reconstruction Modus Operandi, Motive, and Technology Digital Evidence in the Courtroom Digital Evidence and Computer Crime: Digital Evidence: Information stored or transmitted in a digital form. Computer Crime: Criminal activities involving computers…
-
Site Admin
Study Notes on Network Security and Cryptography – Cyber Forensics | Core Paper-V SEM 2
Unit 1: Network Security The CIA Triad DAD – Internet Key Exchange (IKE) Internet Protocol Security (IPSec) AH and ESP Header Security Associations Transport Layer Security (TLS) Secure Electronic Transaction (SET) Extensible Authentication Protocol (EAP) Protected Extensible Authentication Protocol (PEAP) Lightweight Extensible Authentication Protocol (LEAP) Secure Multipurpose Internet Mail Extensions (S/MIME) Pretty Good Privacy (PGP)…
-
Site Admin
Study Notes on Forms of Cyber Crimes – Cyber Forensics | Elective Paper-I SEM 1
Unit 1: Cyber Crime – Introduction History and Development Definition, Nature and Extent of Cyber Crimes in India and other countries Classification of Cyber Crimes Trends in Cyber Crimes across the world History and Development: Overview: Understanding the evolution of cybercrime is crucial for effective cyber forensics. Example: The first computer virus, “Creeper,” appeared in…
-
Site Admin
Study Notes on IT Infrastructure and Cloud Computing – Cyber Forensics | Core Paper-IV SEM 1
Unit 1: Computer Hardware Basics Basics of Motherboard including CMOS and BIOS Working of processors and types of processors System memory Introduction to RAM System storage devices Types of hard disks – FAT, NTFS, RAID etc. Optical drives Removable storage devices Tape drives and backup systems Common computer ports – Serial – Parallel – USB…
Search
Category
- 1 Notes (18)
- Administrative Law (5)
- Advocates & Judges (22)
- AIBE Exams (3)
- Alternate Dispute Resolution (5)
- Analysis (2)
- Announcements (38)
- Articles (13)
- Banking Law (5)
- Bare Acts (1)
- Call for Papers (23)
- Case Laws (606)
- Certificate Courses (9)
- Civil Procedure (5)
- Class Notes (128)
- Company Law (7)
- Constitutional Law (7)
- Contract Law (7)
- Contract Law II (5)
- Criminal Law (10)
- Criminal Procedure Code (6)
- CS Executive (35)
- Cyber & IT Law (9)
- Cyber Laws (34)
- Cyber Security Tools (3)
- Digital Marketing (2)
- Environmental Law (6)
- Family Law II (5)
- Featured (4)
- Human Rights (5)
- Insurance Law (5)
- Intellectual Property I (6)
- Interpretation of Statutes (5)
- Jobs (85)
- Journalism & Media (31)
- Jurisprudence (5)
- KSLU (12)
- Labour Laws (5)
- Law Exams (19)
- Law of Evidence (5)
- Law of Torts (6)
- Law School Conferences (22)
- Law School Darshan (2)
- Law Schools (110)
- Legal Guides (1)
- LLB Exams (13)
- LLB Guide (147)
- LLM Exams (2)
- Matrimonial & Family law (6)
- Moot Court (6)
- News (23)
- News (84)
- News & Articles (9)
- PGD CyberLaw (6)
- Press and Registration of Books Act (1)
- Professional Ethics (5)
- Public International Law (5)
- Question Papers (11)
- Registration of Newspapers (Central) Rules (1)
- RERA / Real Estate Law (1)
- Resources for Lawyers (1)
- Right to Information (RTI) (5)
- Taxation (4)
- Transfer of Property (6)
- Tuition & Courses (1)
Recent Post
- HardenAD: Fortifying Your Active Directory in Minutesby Site Admin
- BloodHound: Unveiling the Labyrinth of Attack Paths in AD and AADby Site Admin
- Ping Castle: Free Active Directory Security Assessment Toolby Site Admin
- Indian Space Policy 2023: A Comprehensive Reviewby Site Admin
- All You Need to Know About Common Vulnerabilities, Attack Vectors, and Mitigation Techniquesby Site Admin