1Chapter 1. Digital Forensics
56Chapter 6. Laws and Prevention of Cybercrime
21.1 Introduction
576.1 Introduction
31.2 History of Digital forensics
586.3 Prevention of Cyber Crime
41.3 Objectives of Digital forensics
596.4 Need of Cyber Law
51.4 Process of Digital forensics
606.5 Laws against Cyber Crime in the USA
61.5 Challenges faced by Digital Forensics
616.6 Cybercrime in the USA
71.6 Advantages of Digital forensics
626.7 Laws against Cyber Crime in other countries
81.7 Disadvantages of Digital Forensics
636.8 Summary
91.8 Summary
646.9 Questions
101.9 Questions
65Chapter 7. Information Security
11Chapter 2. Types of Digital Forensics
667.1 Introduction
122.1 Introduction
677.2 What is Information Security?
132.2 Disk Forensics
687.3 Principles of Information Security
142.3 Network Forensics
697.4 Difference between information security
152.4 Wireless Forensics
70and cyber security
162.5 Database Forensics
717.5 Need of Information Security
172.6 Malware Forensics
727.6 Threats to Information Security
182.7 Email Forensics
737.7 Summary
192.8 Memory Forensics
747.8 Questions
202.9 Mobile Phone forensics
75Chapter 8. Protocols governing Cyberspace
212.10 Summary
768.1 Introduction
222.11 Questions
778.2 HTTP
23Chapter 3. Tools for Digital Forensics
788.3 HTTPS
243.1 Introduction
798.4 TCP/IP
253.2 Wireshark
808.5 FTP and SFTP
263.3 Sleuth Kit (+Autopsy)
818.6 Telnet
273.4 FTK imager
828.7 SMTP
283.5 Volatility framework
838.8 Gopher
293.6 Registry Recon
848.9 DHCP
303.7 CAINE
858.10 Summary
313.8 Cellebrite UFED
868.11 Questions
323.9 EnCase
87Chapter 9. Cryptography
333.10 SIFT Workstation
889.1 Introduction
343.11 XPLiCO
899.2 Features of Cryptography
353.12 Xtraxtor
909.3 Types of Cryptography
363.13 Summary
919.4 Ciphers
373.14 Questions
929.5 Hashes
38Chapter 4. Chain of Custody: Digital Forensics
939.6 Modern Cryptography
394.1 Introduction
949.7 Public Key Cryptography
404.2 Importance of maintaining Chain of Custody
959.8 Digital Signatures
414.3 Process of Chain of Custody
969.9 Blockchain
424.4 Chain of Custody Form
979.10 Summary
434.5 Assuring Chain of Custody
989.11 Questions
444.6 Summary
99Chapter 10. Basics of Computer Networking
454.7 Questions
10010.1 Introduction
46Chapter 5. Cyber Crime
10110.2 Types of Computer Networks
475.1 Introduction
10210.3 Uses of Computer Networks
485.2 Definitions
10310.3 Network Devices and Terms
495.3 History and Evolution of Cyber Crime
10410.4 Advantages of Computer Networks
505.4 Characteristics of Cyber Crime
10510.5 Disadvantages of Computer Networks
515.5 Doctrine of Mens Rea and Actus Rea
10610.6 Summary
52in Cyber Crime
10710.7 Questions
535.6 Classification of Cyber Crime
108Glossary
545.7 Summary
109Acronyms
555.8 Questions