Module Learning Strategies
32 hours of lectures (16 x 2hr) and 16 hours of workshops (16 x 1hr).
Practical tasks and workshops will be used to re-enforce and apply theory to encourage an analytical and problem based approach. Observance of legal, social and ethical issues will need to be demonstrated throughout.
Module Additional Assessment Details
A single 6000 word report, based upon a review of some aspect of the Legal and/or International aspects of Forensic Computing and Incident Investigation. This will be used to assess learning outcomes 1 to 5.
Module Indicative Content
International and transnational legal context and structures.
Digital evidence controls.
Processing crime and incident scenes..
Expert testimony.
Forensic investigation and evidence handling
Traps & deceptive measures
Chain of custody
Digital Rights Management
Cybercriminal Profiling & Victimology
International context of Cybercrime
Offender tracking
Regulating cyberspace ¿ ethical, legal and cultural issues
Role of an Expert Witness
Note taking & Report writing
The UK Legal System
Jurisdictional Issues within Forensic Computing
Cyber warriors
A defensive strategy
National Security
Offensive Information Warfare
Defensive Information Warfare
Subversive Multivector Threats
Module Texts
Introduction to Information Technology Law, 6th Edition, Bainbridge, D., 2004, Pearson Longman, ISBN 978140584666-0
Information Warfare and Security, Denning, D.E., Addison-Wesley, 2005. ISBN 978-0-201-43303-6
Cybercrime and Espionage, An Analysis of Subversive Multivector Threats., Gragido, W., Pirc, J., Elsevier, 2011, ISBN 978-1-59749-613-1
Incident Response and Computer Forensics, Prosise, C., & Mandia, K., 2003, Osborne McGraw Hill, ISBN: 007222696-X
Investigating Computer Related Crime, Stephenson, P., CRC Press, 2000, ISBN: 084932218-9
International Journal of Forensic Computer Science www.ijofcs.org