This module examines the technology and techniques used to investigate cybercrime. A methodology for investigation is presented. Approaches to planning and implementing a comprehensive computer forensic investigation are introduced with a particular focus on evidence collection and the reconstruction of events therefrom.
The aim of this Module is to provide the student with the ability to carry out and critically evaluate computer forensic investigations and appraise forensic software with a view to develop appropriate investigation strategies in the light of emerging digital technologies.
By the end of this module the student should be able to:
1. Critically appraise a request for computer forensic investigation with respect to the legal definitions of computer misuse.
2. Devise an appropriate professional level plan for a forensic investigation and carry out this plan within a context of a specific scenario.
3. Critically analyse and evaluate the results of a computer forensic investigation.
1 Computer Crime
Types of computer crime; legislation concerning computer crime.
2 File Systems as a source of forensic evidence
Structure of NTFS, FAT, FAT32, and Linux file systems.
3 Data Acquisition
Procedures for acquiring disk images; collection of evidence from crime scenes, integrity of evidence, write blockers
4 Computer Forensics Tools
Command line tools; Linux tools; Windows tools; Tool Development
5 Computer Forensic Analysis
Digital forensic toolkits; data hiding techniques; anti-forensics
6 Header 6
Identifying email and browser-derived evidence; examining email headers; using specialist email forensic tools; examining browser histories and cookies.
7 Working with MS-Windows Systems
File system; investigation of the Registry; recovering deleted files; working with forensic boot disks.
8 Database Forensics
Investigating embedded databases
9 Investigating Social Media
10 Cloud forensics
Statement on Teaching, Learning and Assessment
The module is delivered as a series of lectures covering the topics associated with computer forensic investigations. The practical activities provide experience in the use of forensic software and finding evidence about user activity on MS Windows based PCs. Lectures occupy 12 of 24 hours class contact. The remainder, 50%, is lab or tutorial work of an experimental or investigative nature. Class contact time comprises lectures, tutorials/seminars and supervised laboratory work, amounting to 16% of the module time. The remainder, 84%, is independent study or assessment. A purpose-built and regularly-updated module website is used to provide links to lecture notes, laboratory tasks, assessment briefs, operational matters, and external information. Student project or lab work and student-suggested links are incorporated as and when appropriate.
Teaching and Learning Work Loads
|Supervised Practical Activity||0|
|Unsupervised Practical Activity||39|
Credit Value – The total value of SCQF credits for the module. 20 credits are the equivalent of 10 ECTS credits. A full-time student should normally register for 60 SCQF credits per semester.
We make every effort to ensure that the information on our website is accurate but it is possible that some changes may occur prior to the academic year of entry. The modules listed in this catalogue are offered subject to availability during academic year 2017/18 , and may be subject to change for future years.