0% found this document useful (0 votes)
3 views32 pages

Unit 4.1

Uploaded by

dailybhaktifeed
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
3 views32 pages

Unit 4.1

Uploaded by

dailybhaktifeed
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 32

Unit 4: Syllabus

UNDERSTANDING COMPUTER FORENSICS:


Introduction, Digital Forensics Science, The
Need for Computer Forensics, Cyber forensics
and Digital Evidence, Forensics Analysis of E-
Mail, Digital Forensics Life Cycle, Chain of
Custody Concept, Network Forensics,
Approaching a Computer Forensics
Investigation.
Forensics and Social Networking Sites: The
Security/Privacy Threats, Challenges in
Computer Forensics.
Privacy through media destruction
Computer Forensics Laboratory
Setting up a Computer Forensics Laboratory
Understanding the Requirements

There are four broad types of requirements namely,


1. Physical space
2. Hardware equipment
3. Software tools
4. Forensics procedures
Those involved in the cybercrime investigation.
Apart from the physical space requirement, another
key requirement for a computer forensics laboratory is
the hardware items. The laboratory requires a number
of computers,
Forensic Lab Setup at Hyderabad
Forensic Lab Setup at Nagpur
Forensic Lab Setup at Faridabad
Standard removable hard drives

SIM card reader iButtons

Flash memory Sim Card


Insider Attack Example

You might also like