Cyber Forensics
Overview
This unit introduces students to the procedures that are used in relation to cyber forensics and digital investigations to detect cyber criminal activities, protect organisation from attack and prosecute perpetrators. Students will explore computer and operating system architectures, their associated data and file structures. The unit covers key procedures and processes involved in digital and cyber forensics. Students will conduct forensic processes, utilise and research a range of tools. A crucial aspect of this unit is that students will be able to communicate the results of investigations to non-specialist audiences.
Requisites
Learning outcomes
Students who successfully complete this unit will be able to:
- Explain computer architectures and concepts associated with data structures, the collection of evidence and validation
- Critically review the different forensic tools and techniques to gather and analyse digital evidence
- Report cyber forensic investigations and findings to key business stakeholders and decision makers
- Use legal frameworks to explain and present forensically gathered evidence
Teaching methods
Hawthorn
Type | Hours per week | Number of weeks | Total (number of hours) |
---|---|---|---|
Face to Face Contact (Phasing out) Class | 3.00 | 12 weeks | 36 |
Unspecified Learning Activities (Phasing out) Independent Learning | 9.50 | 12 weeks | 114 |
TOTAL | 150 |
Swinburne Online
Type | Hours per week | Number of weeks | Total (number of hours) |
---|---|---|---|
Online Directed Online Learning and Independent Learning | 12.50 | 12 weeks | 150 |
TOTAL | 150 |
Assessment
Type | Task | Weighting | ULO's |
---|---|---|---|
Assignment | Individual | 50 - 60% | 1,2,3,4 |
Project | Individual | 40 - 50% | 1,2,3,4 |
Content
- Overview of forensic Issues in cybercrime
- The handling and management of digital evidence by business
- Overview of computer forensic software tools
- Entrapment, encryption and the expectation of privacy for the individual, the organisation and third parties
- Analysis of forensic data, credibility of tools and data
- Using the tools to develop strategies to detect cyber criminal attack, protect organisation from attack and prosecute perpetrators
- Evidence based decision making
- Analytical process descriptive, predictive and prescriptive
- Identifying and analysing digital evidence such as computers, mobile phones and online sources
- Understand the process of chain of evidence and custody, sources of digital evidence, evidence artefacts and reporting structure of evidentiary analysis
Â
Â
Study resources
Reading materials
A list of reading materials and/or required textbooks will be available in the Unit Outline on Canvas.