In the name of Allah,
the most Beneficent and the most Merciful
Dr. Zunera Jalil
Email: zunera.jalil@mail.au.edu.pk
17th September, 2020
Course Information
Course Code: CY 620/ CY 825
Course Title: Computer Forensics/
Advanced Topics in Digital Forensics
Credit Hours: 03
Class Schedule: Thursday ( 4:40 – 7:30 pm)
Office Hours: To be announced
Google Class Room Joining Code: fgnjllg
Instructor Information
Dr. Zunera Jalil,
PhD (Computer Science), FAST-NUCES, 2010.
Co-PI (Computer Forensics), National Cybercrimes and Forensics Lab, National Center for Cyber Security.
Trainings: CHFI, Autopsy, AccessData FTK
Email: zunera.jalil@mail.au.edu.pk
Ext: 680
Research Interests:
Cyber attacks detection using deep learning, AI for audio, video and log data processing, criminal profiling,
digital forensics for cyber physical systems, and Digital Forensics as a Service (DfaaS)
Google Scholar Profile:
https://scholar.google.com.pk/citations?user=BlsdhzYAAAAJ&hl=en
Your Introduction
Name
Last Degree & Year
CGPA
Why Cyber Security?
Any work/training/skills in
digital forensics?
Text/Reference Books
Other Sources
• Guide to Computer Forensics and Investigations, by
Bill Nelson, Amelia Phillips and Christopher Steuart
• Computer Forensics: Computer Crime Scene Investigation, by
John R. Vacca
• Computer Forensics: Cybercriminals, Laws and Evidence, by
Marie-Helen Maras
• CHFI course ware
• Research Articles from reputed computer forensics journals
Learning Methodology in this course
• Lectures
• Reading Assignments
• Practical Assignments
• Research – Analysis/Problem solving
• Presentations
• Written Exams
Assessment Plan (Tentative)
Assessment Type Number Weightage
Quiz 04 10%
Assignments 04 10%
Research Project 01 (6 phases) 20%
Midterm Exam (8th Week) 01 20%
Final Exam (18th Week) 01 40%
Grading 10
Marks in %age Grades GPA
80 – 100 A 4.00
75 – 79.99 A- 3.67
70 – 74.99 B+ 3.33
65 – 69.99 B 3.00
60 - 64.99 B- 2.67
55 – 59.99 C+ 2.33
50 – 54.00 C 2.00
Below 50 F 0.00
Research Project 11
• Divided in 6 phases.
• Each phase will have its deadline and unique
requirements.
• Will be announced in third week of semester
• Group Work (Maximum 2 students in one group)
Remember
• In this course you will study concepts, acquire skills and learn about
principles of digital forensics.
• Open source forensics tools will be used and developed.
• Learn PYTHON if you are not familiar with it yet.
• Copied assignments or project reports will be awarded ZERO marks.
• Minimum 75% attendance is mandatory to appear in final exam.
• Keep your returned quizzes, assignments and mid-term exam safe with
you, no claim of any marks correction will be entertained without
them.
14
Cyber Attacks Landscape
Data presented below is based from the Check Point Threat Cloud
Cyber Threat Map between January and June 2020
GLOBAL
Asia & Pacific Region (APAC)
47%
34% 30%
20% 18%
8%
Europe, Middle East & Africa (EMEA)
38%
26% 23% 15% 15% 7%
38% North & South America
28% 27%
18% 18% 33% 24% 22% 14% 13%
7% 5%
Cybercrimes Trends in 2020
• Business' infrastructures moving online
• Technological development at an ever
increasing pace
• Emerging new cyber threats
• Businesses and government agencies
vulnerable to cyber attacks and data breaches
• Political interference and state-sanctioned
cyber crimes
Source
Cybercrimes Trends in 2020… 17
• Increase in Ransomware Attacks
• Artificial Intelligence in Cybercrimes and Protection
• More Security Threats after development of 5G and Adoption of
IoT Devices
• Rise in Vehicle Hacking
• Cyber Security Skills Gap
• Mobile Devices prone to attacks
Source
Top Malicious Files Types – Email Vs Web
EMAIL WEB
68% 32%
.doc file extension 38% 36% .exe file extension
.exe file extension 25% 12% .pdf file extension
.rtf file extension 11% 9% .swf file extension
.xlsx file extension 6% 6% .doc file extension
Digital Forensics 19
Preservation, identification, extraction,
documentation, and interpretation of
computer media for evidentiary
and/or root cause analysis using
well-defined methodologies and
procedures.
Need for Digital Forensics 20
• The growth of the Internet and the worldwide proliferation of
computers have increased the need for digital investigations.
• Computers can be used to commit crimes, and crimes can be
recorded on computers, including company policy violations,
embezzlement, e-mail harassment, leaks of proprietary information,
and even terrorism.
• Law enforcement, network administrators, attorneys, and private
investigators now rely on the skills of professional digital forensics
experts to investigate criminal and civil cases.
Methodology 21
▪ Acquire the evidence without altering or
damaging the original.
▪ Authenticate that the recovered evidence is the
same as the original seized.
▪ Analyze the data without modifying it.
▪ Document and Report your findings
Course Contents in Brief 22
• Digital Forensics in Today’s World
• Data Acquisition and Forensics Investigation Process
• Study of File Systems and Storage- Data Recovery and carving
• OS Forensics –WINDOWS, LINUX, UNIX, MacOS, Android OS
• Information Hiding and anti-forensic methods
• Network Forensics
• Email Forensics
• Memory Acquisition and analysis
• Database Forensics
• Multimedia Forensics
• Smart Devices Forensics
• Case management, Documentation and Reporting
23
Home Task
Explore
Links to explore 26
• https://www.journals.elsevier.com/forensic-science-international-
digital-investigation
• https://link.springer.com/chapter/10.1007/978-981-15-1480-7_20
• https://www.nist.gov/news-events/news/2020/06/nist-digital-
forensics-experts-show-us-what-you-got
• https://www.computer.org/publications/tech-
news/research/digital-forensics-security-challenges-cybercrime
ANY QUESTIONS