e-Forensic Fundamentals
Overview
This unit familiarises student with the workings of the various technologies used to undertake and investigate electronic misconduct. It provides an understanding of forensic tool kits and develops the skills to implement their use. Students will be presented with examples of e-forensic artefacts with each of the technologies.
Requisites
Learning outcomes
Students who successfully complete this unit will be able to:
- Demonstrate knowledge of operating systems, networks, mobile technologies and internet technologies and related forensic artefacts of each technology
- Demonstrate knowledge of the workings of a forensic tool kit
- Apply knowledge of the usage of forensic tool kits
- Identify incidents of electronic fraud
- Identify, locate and develop strategies for the evaluation of data sources for e-forensic investigation
- Describe common malware types and their effects
Teaching methods
Hawthorn
Type | Hours per week | Number of weeks | Total (number of hours) |
---|---|---|---|
Face to Face Contact (Phasing out) Lecture | 1.00 | 12 weeks | 12 |
On-campus Class | 2.00 | 12 weeks | 24 |
Unspecified Learning Activities (Phasing out) Independent Learning | 9.50 | 12 weeks | 114 |
TOTAL | 150 |
Swinburne Online
Type | Hours per week | Number of weeks | Total (number of hours) |
---|---|---|---|
Online Directed Online Learning and Independent Learning | 12.50 | 12 weeks | 150 |
TOTAL | 150 |
Assessment
Type | Task | Weighting | ULO's |
---|---|---|---|
Examination | Individual | 50% | 1,2,3,4,5,6 |
Laboratory Report | Individual | 50% | 1,2,3,4,5,6 |
Hurdle
As the minimum requirements of assessment to pass a unit and meet all ULOs to a minimum standard, an undergraduate student must have achieved:
(i) an overall mark for the unit of 50% or more, and(ii) at least 40% in the final examStudents who do not successfully achieve hurdle requirement (ii) will receive a maximum of 45% as the total mark for the unit.
Content
- File formats, structure, source of production and file systems
- Networks: Client-server architecture, LANS, WANS, network protocols
- Mobile technologies: protocols, mobile software, user identification
- Internet: protocols, internet software, user identification
- Forensic tool kits
- Data extraction and forensic copying.
- Pattern matching
- Verification and validation
- Anti-forensic techniques
- Malware
Study resources
Reading materials
A list of reading materials and/or required textbooks will be available in the Unit Outline on Canvas.