Anatomy of a Cyber Attack
Tracing Hackers Through Digital Evidence: From Intrusion to Investigation
📅 Date
1 March
⏰ Time
8:00 – 9:00 PM
💻 Mode
Online
🎓 Certificate
Yes (If opted)
About the Lecture
This lecture dissects the lifecycle of a cyber attack — from reconnaissance and exploitation to evidence
recovery and prosecution.
Participants will gain a structured understanding of how attackers breach systems, how investigators trace
digital footprints,
and how courts evaluate electronic evidence under cyber law.
What You’ll Learn
- Stages of a Cyber Attack: Reconnaissance, Exploitation, Persistence & Data Exfiltration
- Common Hacking Techniques: Phishing, Malware, Ransomware & Social Engineering
- Digital Evidence Collection & Preservation
- IP Tracking, Log Analysis & Metadata Examination
- Chain of Custody in Digital Forensics
- Legal Framework Governing Cybercrime in India
- Admissibility of Electronic Evidence under the Evidence Act
Learning Outcomes
- Understand the technical structure of modern cyber attacks
- Identify digital footprints left by attackers
- Analyse digital evidence from a legal perspective
- Differentiate between ethical hacking and cybercrime
- Interpret cybercrime cases using forensic reasoning
- Evaluate evidentiary reliability of digital proof in court
Who Should Enroll?
- Law Students & Judicial Aspirants
- Cyber Security & Computer Science Students
- Police & Investigating Officers
- Digital Forensics Enthusiasts
- Advocates handling Cybercrime Matters
- Anyone interested in Cyber Law & Investigation
Why This Lecture Matters
Cyber attacks are no longer isolated technical incidents — they are legal events with constitutional,
evidentiary, and procedural implications. Understanding both the technological and legal dimensions
of cybercrime is essential for professionals navigating today’s digital landscape.
About the Speaker
Mr. Sama Anudeep
Assistant Professor
Parul University