Anatomy of a Cyber Attack

Tracing Hackers Through Digital Evidence: From Intrusion to Investigation

📅 Date
1 March
⏰ Time
8:00 – 9:00 PM
💻 Mode
Online
🎓 Certificate
Yes (If opted)

About the Lecture

This lecture dissects the lifecycle of a cyber attack — from reconnaissance and exploitation to evidence recovery and prosecution. Participants will gain a structured understanding of how attackers breach systems, how investigators trace digital footprints, and how courts evaluate electronic evidence under cyber law.

What You’ll Learn

  • Stages of a Cyber Attack: Reconnaissance, Exploitation, Persistence & Data Exfiltration
  • Common Hacking Techniques: Phishing, Malware, Ransomware & Social Engineering
  • Digital Evidence Collection & Preservation
  • IP Tracking, Log Analysis & Metadata Examination
  • Chain of Custody in Digital Forensics
  • Legal Framework Governing Cybercrime in India
  • Admissibility of Electronic Evidence under the Evidence Act

Learning Outcomes

  • Understand the technical structure of modern cyber attacks
  • Identify digital footprints left by attackers
  • Analyse digital evidence from a legal perspective
  • Differentiate between ethical hacking and cybercrime
  • Interpret cybercrime cases using forensic reasoning
  • Evaluate evidentiary reliability of digital proof in court

Who Should Enroll?

  • Law Students & Judicial Aspirants
  • Cyber Security & Computer Science Students
  • Police & Investigating Officers
  • Digital Forensics Enthusiasts
  • Advocates handling Cybercrime Matters
  • Anyone interested in Cyber Law & Investigation

Why This Lecture Matters

Cyber attacks are no longer isolated technical incidents — they are legal events with constitutional, evidentiary, and procedural implications. Understanding both the technological and legal dimensions of cybercrime is essential for professionals navigating today’s digital landscape.

About the Speaker

Mr. Sama Anudeep

Assistant Professor

Parul University