Module Descriptors
DIGITAL FORENSICS
COMP60080
Key Facts
Digital, Technology, Innovation and Business
Level 6
20 credits
Contact
Leader: Ange Aly
Hours of Study
Scheduled Learning and Teaching Activities: 4
Independent Study Hours: 196
Total Learning Hours: 200
Pattern of Delivery
  • Occurrence A, Stoke Campus, UG Semester 2
  • Occurrence B, Stoke Campus, UG Semester 3 to UG Semester 1
  • Occurrence C, Stoke Campus, UG Semester 1
Sites
  • Stoke Campus
Assessment
  • PORTFOLIO REPORT - 3000 WORDS weighted at 50%
  • FORENSIC PRACTICAL ELEMENT weighted at 50%
Module Details
INIDCATIVE CONTENT
This module will cover the following topics:



Introduction to digital forensics

Understanding digital evidence

Introduction to computer hardware

How computers work

File systems forensics

Mobile device forensics

Memory based forensics

Planning approaches to data extraction

Legal and ethical issues associated to data extraction
ADDITIONAL ASSESSMENT DETAILS
Portfolio report – A report that documents the use of digital forensic concepts and discusses file systems and structures in relation to case study scenarios (Learning Outcomes 1 and 2).

Forensic practical element – A demonstrator of extracted data to a forensic data recovery problem case study (Learning Outcomes 3 and 4).
LEARNING STRATEGIES
Practical tasks and tutorials will be used to re-enforce and apply theory to encourage an analytical and problem based approach to forensic investigation. The material will be presented through a combination of directed self-study, on-line materials on Blackboard, practical exercises that can be conducted using the server infrastructure and VPN to provide access to platforms for practical exercises.
LEARNING OUTCOMES

1. Critically discuss fundamental digital forensic concepts and components in relation to a typical digital system

Knowledge and Understanding



2. Demonstrate critical awareness of different file systems and structures

Knowledge and Understanding, Reflection



3. Identify, extract and document forensically significant data and the means used to recover it using a variety of industry focused tools

Learning, Application, Problem Solving



4. Critically analyse and evaluate recovered digital data to determine a history of events leading up to the evidence being created

Analysis, Enquiry
TEXTS
Madsen, T. (2022), Security Architecture – How & Why (River Publishers Series in Security and Digital Forensics), River Publishers; 1st edition

Holt, T, J et. al. (2022), Cybercrime and Digital Forensics: An Introduction, Routledge; 3rd edition

Johansen, G, (2022), Digital Forensics and Incident Response: Incident response tools and techniques for effective cyber threat response, 3rd Edition, Packt Publishing; 3rd edition

Oettinger, G. (2022), Learn Computer Forensics: Your one-stop guide to searching, analyzing, acquiring, and securing digital evidence, 2nd Edition, Packt Publishing; 2nd edition

Mullins, M. (2022), Cyber Security Awareness: Employee Handbook, Kindle Edition

Anderson, R. (2021), Security Engineering: A Guide to Building Dependable Distributed Systems, 3rd Edition, Wiley, 3rd Edition

Tamma, R. et. al. (2020), Practical Mobile Forensics, Packt Publishing; 4th edition

Skulkin, O. et. al. (2018), Learning Android Forensics, Packt Publishing; 2nd edition

Hale, M. et. al. (2014), The Art of Memory Forensics, Wiley; 1st edition
RESOURCES
Access to the Virtual Learning Environment (VLE)

Access to virtual lab environment.

Access to digital library.

Access to a desktop or laptop that supports virtualisation.

A reliable Internet connection.
WEB DESCRIPTOR
Digital forensics is all about extracting, recovering and capturing forensically sound data from a digital device that can store and process data. This module introduces students to a fascinating world of digital forensics where students will learn how they can forensically analyse digital evidence, from areas such as a computer’s memory, non-volatile storage devices and mobile devices using an assortment of tools and techniques.