ADDITIONAL ASSESSMENT DETAILS
An assignment of 3000 words weighted at 100% (Learning Outcomes 1,2,3 and 4)
Assignment will typically require a critical review/analysis of a specific malicious code. The student will be required to perform either static or dynamic analysis of malicious code
INDICATIVE CONTENT
This module examines operational viruses and malicious code that are designed to attack and compromise computer systems, and the methods used to exploit a weakness in installed software that could lead to the system being fully controlled. This module will focus on the identification and the forensic analysis of malicious code. Legal, ethical and social implications of malware are considered.
LEARNING STRATEGIES
The material will be presented through a combination of directed self-study, recorded lectures, on-line materials in Blackboard, practical exercises that can be conducted using the server infrastructure and VPN to provide access to platforms for practical exercises, asynchronous handling of queries via email and discussion board, but also synchronous surgery sessions (with access to on-line virtual infrastructure) and skype as necessary.
RESOURCES
Remote access to laboratory resources (VPN access),
Access to purposely built VMs
TEXTS
FILE SYSTEM FORENSIC ANALYSIS, Carrier B, 2005, Pearson Education, ISBN: 0321268172
MALWARE ANALYST'S COOKBOOK AND DVD, Ligh M, Adair S, Hartstein B, Richar M, 2011, ISBN: 9780470613030
Malware Forensics: Investigating and Analyzing Malicious code, Malin, C, Aquilina, J, 2008, Syngress, ISBN: 159749268
LEARNING OUTCOMES
1. Demonstrate a critical and systematic understanding of malicious software and malicious code implementation and the social, legal and ethical implications of malware and attendant commercial risks from infection. (Knowledge and Understanding).
2. Critically evaluate the design, code and the implementation of a malicious component and the steps required to reverse engineer the process. (Application)
3. Critically evaluate various techniques at the forefront of the discipline used in the (Analysis, Problem Solving).
4. Develop critical awareness of the task of isolated an infected system and perform malicious code analysis and reverse engineering in line with advanced professional practice. (Knowledge and Understanding).