Module Learning Strategies
The material will be presented through a combination of lectures, tutorials, practical exercises and directed self-study as appropriate for
each topic. Related to teaching you will receive 2 lectures and 2 tutorial sessions per week.
(1:n)2 (1:20)2
Module Resources
Net Analysis and Encase software
High power PC, additional hardware such as hard drives and cradle
Access to the internet
Library
Module Special Admissions Requirements
None
Module Texts
Computer Forensics and Investigations, Phillips, A, Enfinger, F, and Nelson, B (2004), Course Technology, ISBN: 1592003826
Forensic Computing: A Practitioner's Guide, Sammes, A. J. , Jenkinson, B. (2000), Springer-Verlag, ISBN: 1852332999
Secret Software: Making the Most of Computer Resources for Data Protection, Information Recovery, Forensic Examination, Crime Investigation and More, Zaenglein, N (2000), Paladin Press, ISBN: 1581600887
Module Additional Assessment Details
Examination, 2 hours, 50% (Learning outcomes 1, 4 and 5)
Assignment 50% (Learning outcomes 1, 2 and 3)
Module Indicative Content
This module covers the main aspects and concepts of forensic computing considering the topic in relation to individual and networked computer systems. In particular it will address:
An overview and introduction to forensic tools
Computer systems architecture and infrastructure
Internet, intranet, extranet, individual machines, organiser devices, mobile phones, and other mobile computing systems
Media and storage - file storage systems, media such as hard disks, network storage, Zip and floppy formats etc.
Data usage patterns
Files - deleted files, hidden files, monitoring processes, encryption issues, virus's and hacking
Watermarks, steganography, criminal activity tracking, logging, and packet sniffing
Data recovery and audit trails
Firewalls and protection