-
Site Admin
Study Notes on Introduction to Information Security – Cyber Forensics | Core Paper-III SEM 1
Unit 1: Overview of Information Security What is Information and why should we protect it? Information Security Threats – Frauds, Thefts, Malicious Hackers, Malicious Code, Denial-of-Services Attacks and Social Engineering Vulnerability – Types Risk – an introduction Business Requirements Information Security Definitions Security Policies Tier1 (Origination-Level) Tier2 (Function Level) Tier3 (Application/Device Level) Procedures Standards Guidelines…
-
Site Admin
Study Notes on Core Paper-II Networking and Communication Protocols – Cyber Forensics | Core Paper-II SEM 1
Unit 1: Networking models OSI Layered model TCP/IP Model MAC Address representation Organisationally Unique Identifier Internet Protocol Versions and Header lengths IP Identification IP Flags IP fragmentation and reassembly structure Transport Layer protocols Port numbers TCP Flags Segmentation TCP 3 way handshake and Options Encapsulation and De-encapsulation Payload OSI Layered Model: Overview: The Open Systems…
-
Site Admin
Study Notes on Introduction to Cyber Criminology – Cyber Forensics | Core Paper-I SEM 1
Unit 1: Principles and Concepts of Cyber Criminology Crime, Tort, Misdemeanour Cyber Space, Cyber Crime, Cyber Criminology Information Security, Penetration Testing Incident Response, GRC, etc. Conventional Crimes vs. Cyber Crimes Crime, Tort, Misdemeanor Crime – act punishable by law; felony or misdemeanour Cross & Jones defined Crime as a “legal wrong the remedy for which…
-
Site Admin
WhatsApp’s ‘Protect IP Address in Calls’ Feature: A Potential Boon for Cybercriminals and Challenge for Law Enforcement
In a bid to bolster user privacy and security, WhatsApp, a subsidiary of Meta, has introduced an innovative privacy feature known as “IP Address Protection in Calls.” As reported by The Hacker News, WhatsApp has officially launched this feature as part of its commitment to user privacy. This new feature serves to obscure users’ IP…
-
Site Admin
List of 50 top digital forensics tools
Autopsy An open-source digital forensics platform with a graphical interface for analyzing hard drives and smartphones. EnCase A widely used digital forensic software for examining computer systems and mobile devices. FTK (Forensic Toolkit) A forensic software application for analyzing and recovering digital evidence. X-Ways Forensics A powerful and efficient digital forensic software solution. Sleuth Kit…
Search
Category
- 1 Notes (18)
- Administrative Law (5)
- Advocates & Judges (22)
- AIBE Exams (3)
- Alternate Dispute Resolution (5)
- Analysis (2)
- Announcements (38)
- Articles (13)
- Banking Law (5)
- Bare Acts (1)
- Call for Papers (23)
- Case Laws (606)
- Certificate Courses (9)
- Civil Procedure (5)
- Class Notes (128)
- Company Law (7)
- Constitutional Law (7)
- Contract Law (7)
- Contract Law II (5)
- Criminal Law (10)
- Criminal Procedure Code (6)
- CS Executive (35)
- Cyber & IT Law (9)
- Cyber Laws (34)
- Cyber Security Tools (3)
- Digital Marketing (2)
- Environmental Law (6)
- Family Law II (5)
- Featured (4)
- Human Rights (5)
- Insurance Law (5)
- Intellectual Property I (6)
- Interpretation of Statutes (5)
- Jobs (85)
- Journalism & Media (31)
- Jurisprudence (5)
- KSLU (12)
- Labour Laws (5)
- Law Exams (19)
- Law of Evidence (5)
- Law of Torts (6)
- Law School Conferences (22)
- Law School Darshan (2)
- Law Schools (110)
- Legal Guides (1)
- LLB Exams (13)
- LLB Guide (147)
- LLM Exams (2)
- Matrimonial & Family law (6)
- Moot Court (6)
- News (84)
- News (23)
- News & Articles (9)
- PGD CyberLaw (6)
- Press and Registration of Books Act (1)
- Professional Ethics (5)
- Public International Law (5)
- Question Papers (11)
- Registration of Newspapers (Central) Rules (1)
- RERA / Real Estate Law (1)
- Resources for Lawyers (1)
- Right to Information (RTI) (5)
- Taxation (4)
- Transfer of Property (6)
- Tuition & Courses (1)
Recent Post
- HardenAD: Fortifying Your Active Directory in Minutesby Site Admin
- BloodHound: Unveiling the Labyrinth of Attack Paths in AD and AADby Site Admin
- Ping Castle: Free Active Directory Security Assessment Toolby Site Admin
- Indian Space Policy 2023: A Comprehensive Reviewby Site Admin
- All You Need to Know About Common Vulnerabilities, Attack Vectors, and Mitigation Techniquesby Site Admin