Module Indicative Content
This is an individual case study / investigation carried out in an area of forensic computing relevant to the student's interests. The aim of the study is to complete a full methodological investigation into a real or simulated example of computer systems misuse. The types of project will vary related to the students own forensic computing interests, for example it could be based on copyright, fraud, or spoofing. Part of the students study will build up an awareness of procedures and presentation in a courtroom setting and commercial and scientific risks. The research and report must demonstrate considerations of social, ethical and legal issues relevant to the project.
Module Learning Strategies
Identify a topic area and develop this into the project in negotiation with a university supervisor.
Develop a plan including project milestones, deliverables and development schedule for the project.
Identify required resources.
Following this the project needs to be carried out and this should be based on the techniques and knowledge gleaned from taught modules, together with advice from the appointed project supervisor (in a weekly meeting). Finally the project report should be produced to describe achievements, approaches used and conclusions.
All students will receive two hours of taught introductory lectures at the start of the project. Students unfamiliar with Encase will have a further 8 hours of compulsory coverage of Encase. These sessions will be available as optional revision sessions for other students. Remaining contact hours will then be via weekly supervision meetings.
Module Resources
Software and hardware appropriate to the chosen project together with standard computing facilities.
Access to the Internet.
Library.
Module Special Admissions Requirements
None.
Module Additional Assessment Details
A project report of 3,000 words weighted at 100%. (Learning Outcomes 1-4).
Module Texts
Data Protection Act 2018 and GDPR 2018 ISO/IEC/IEEE 29148:2011
Good Practice Guide for Computer based evidence, Association of Chief Police Officers (ACPO) of England, Wales and Northern Ireland
ISO 8000-8:2015 Data quality -- Part 8: Information and data quality: Concepts and measuring
Johansen, G. (2017). Digital Forensics and Incident Response. Packt Publishing. ISBN13: 978-1787288683
Ligh, M. (2014). The art of memory forensics. Indianapolis, Ind.: Wiley. ISBN: 184996596
Nelson, B., Phillips, A. and Steuart, C. (2013). Guide to computer forensics and investigations. Boston: Course Technology. ISBN: 1435498836
Nikkel, B., (2016). Practical Forensic Imaging: Securing Digital Evidence with Linux Tools. No Starch Press. ISBN-13:
978-1-59327-793-2
Sammes, A. and Jenkinson, B. (2010). Forensic computing: A Practitioners Guide. 2nd edn. London: Springer. ISBN: 184996596
Web Descriptor
Carry out an individual case study/investigation on an area of forensic computing. The aim of the study is to complete a full methodological investigation into a real or simulated example of computer systems misuse. The types of project will vary related to the students own forensic computing interests, for example it could be based on copyright, fraud, or spoofing. Part of the students study will build up an awareness of procedures and presentation in a courtroom setting and commercial and scientific risks. The research and report must demonstrate considerations of social, ethical and legal issues relevant to the project.