Module Special Admissions Requirements
None
Module Indicative Content
This module covers the main aspects and concepts of forensic computing considering the topic in relation to individual and networked computer systems. In particular it will address:
An overview and introduction to forensic tools
Computer systems architecture and infrastructure
Internet, intranet, extranet, individual machines, organiser devices, mobile phones, and other mobile computing systems
Media and storage - file storage systems, media such as hard disks, network storage, Zip and floppy formats etc.
Files - deleted files, hidden files, monitoring processes, encryption issues, virus's and hacking
Watermarks, steganography, criminal activity tracking, logging, and packet sniffing
Data recovery and audit trails
Firewalls and protection
Intrusion and Intrusion Detection
Module Additional Assessment Details
An ASSIGNMENT weighted at 100%.
Assignment 100% (Learning outcomes 1, 2, 3 and 4). The assignment will be scenario based. The student will be required to evaluate the use of Forensic Computing tools and techniques within a given legal framework/case/scenario and produce a 3000 word report identifying their recommendations and observations.
Module Texts
Solomon M.G., Barrett D., Broom N., Computer Forensics Jump Start, 2005, Wiley, ISBN 0-7821-4375-X
Nelson B, A. Phillips, et. al, Guide to Computer Forensics and Investigations, 2004, Thompson, ISBN: 0619131209
Sammes T, B. Jenkinson, Forensic Computing: A Practitioners Guide, 2000, Springer-Verlag, ISBN: 1852332999
Good Practice Guide for Computer Based Evidence, Version 4 (2008). Association of Chief Police Officers of England, Wales and Northern Ireland.
Module Learning Strategies
Students will initially attend an introductory lecture in order to commence their study on the module. The session will introduce the teaching approach to the module, the topics to be covered, and cover in depth the case study assignment. The remaining contact hours will be used for introducing and using forensic analysis tools such as Encase and Net Analysis. Time is also given over to use such tools practically in laboratory sessions. Students will be given opportunity to get formative feedback on their work in these sessions, as well as via email contact with tutors.
Teaching mechanisms on the module include problem based scenarios, self study case studies, seminars, lectures, and practical sessions. In the main practical sessions will be self study, but key and initial introductory aspects will be supported by laboratory sessions.
Learning material will be housed on the Blackboard VLE for student access.
Module Resources
Net Analysis and Encase software
High power PC, additional hardware such as hard drives and cradle
Access to the internet for Blackboard VLE
Library
Staffordshire University has subscriptions to electronic book services such as Safari Tech Books, Ebrary and Netlibrary. There are titles in each of the collections that will support students studying forensics. Staffordshire University has subscriptions to IEEExplore, ACM Digital Library, Elsevier Science Direct and Infotrac Computer Database all offering full text electronic access to journals and conference proceedings.