Introduction to Computer Forensics (CPSC 3119)

TSYS School of Computing

Instructor : Dr. Lydia Ray
Office: CCT 429                                                         Office phone: (706) 565-3615
Department phone: (706) 568-2410                            Department FAX: (706) 565-3529
Office Hours: MON-THURS 9.00 -11.30 AM
e-mail address: ray_lydia@columbusstate.edu
homepage:http://csc.columbusstate.edu/ray

Course Title: CPSC 3119 – Introduction to Computer Forensics.

 

Official Course Description: An introduction to various Computer Forensics tools and analysis methodologies in a variety of standalone and networked computer environments with Windows Operating System. 

 

Prerequisites: Basic knowledge of computer (CPSC 1105 or CPSC 1301 and CPSC 1301L).

 

Required Textbook:

forensics.jpg

Guide to Computer Forensics and Investigations, 4th  edition. Author: Bill Nelson, Amelia Phillips, Frank Enfinger, and Chris Steuart. Publisher: Course Technology, Thomson Learning.

ISBN: 978-1-4354-9883-9

 

 

Course Outcomes:

1.      Students will have an understanding the broad meaning of computer forensics.

·         Strategies and actions used to produce this outcome:

§  Study of description of Computer Forensics

·         ABET criteria covered: I

·         Program objectives covered: 2, 3

·         Assessment methods: Assignments and examination

2.      Students will learn about basic computer organization and procedures of information storage and retrieval, most commonly used operating systems such as Windows and Unix, and various file systems such as FATS, NTFS etc.

·         Strategies and actions used to produce this outcome:

§  Study of concepts of computer organization and operating systems.

§  Study of file systems, information storage and retrieval procedures.

·         ABET criteria covered: A, B and C

·         Program objectives covered: 1

·         Assessment methods: Hands-on assignments and project.

3.      Students will learn the investigative tools and techniques used in computer forensics.

·         Strategies and actions used to produce this outcome:

§  Analysis of disks by using various tools and techniques.

·         ABET criteria covered: I and J

·         Program objectives covered: 3

·         Assessment methods: Hands-on assignments and project

4.      Students will study the structure and use of various disk buffers and caches, as implemented by common operating systems and discuss their impact on security.

·         Strategies and actions used to produce this outcome:

§  Study of Windows and Unix Operating Systems

·         ABET criteria covered: B, I and J

·         Program objectives covered: 2, and 3

·         Assessment methods: Hands-on assignments and project

5.      Students will know how to acquire data and preserve digital evidence, according to the standards required for presentation in a U.S. Court of Law.

·         Strategies and actions used to produce this outcome:

§  Study of these procedures

·         ABET criteria covered: E, I and J

·         Program objectives covered: 2, and 3

·         Assessment methods: Hands-on assignments and project

6.      Students will have an understanding of how to recover digital evidence from various types of disks,  electronic mail and mobile phone.

·         Strategies and actions used to produce this outcome:

§  Study of these procedures

·         ABET criteria covered: A, B, E, I and J

·         Program objectives covered: 2, and 3

·         Assessment methods: Hands-on assignments and project

7.      Students will learn investigative reporting and how to write case summaries.

·         Strategies and actions used to produce this outcome:

§  Study of these procedures

·         ABET criteria covered: E, F an G

·         Program objectives covered: 1, 2, 3 and 4

·         Assessment methods: Hands-on assignments and project

 

  Tentative Distribution of Points:

 

Assignments:   There will be assignments on each chapter.  Assignments will be mainly hands-on.

Class discussion:  Once a chapter is finished, there will be discussions in class based on a case. Discussion topics will be posted at the beginning of each chapter. Students will get time to study and prepare for the discussion. Student participation on each discussion will be graded out of 5.

 

Peer Evaluation of Assignments:

·         Assignments will be evaluated by peers. The instructor will determine whose assignment will be evaluated by whom.

·         The instructor will provide a questionnaire to be filled up by each student evaluator. This questionnaire will be submitted to the instructor along with assignments.  

 

Final grades in this class will be determined as follows:

 

 

A:

90 and above

 

B:

80-89

 

C:

70-79

 

D:

60-69

 

F:

<59

 

Notes:

 

 

Policy on academic integrity:  Students are encouraged to study together; however, each student must individually prepare his/her own submission. Cheating or plagiarism is not permitted and will be sanctioned according to the CSU policy on academic standards. You should carefully read the section on Academic Misconduct in the Student Handbook. Your continued enrollment in this course implies that you have read it, and that you subscribe to the principles stated therein.

 

Policy prohibiting sexual harassment:          As your instructor, one of my responsibilities is to treat all students fairly and equally and to abide by the policies and procedures governing faculty/student relationships, including those concerning sexual harassment as stated in the Faculty Handbook.

 

Students with a documented disability as described by the Rehabilitation Act of 1973 (P.L. 933-112 Section 504) and Americans with Disabilities Act (ADA) that affect their ability to participate fully in class or to meet all course requirements are encouraged to bring this to the attention of the instructor so that appropriate accommodations can be arranged. Further information is available from the Office of Disability Services in the Center for Academic Support and Student Retention, Tucker Hall (706) 568-2330. Course requirements will not be waived but reasonable accommodations may be provided as appropriate.

 

ABET Criteria:

A.     An ability to apply knowledge of computing and mathematics appropriate to the discipline;

B.     An ability to analyze a problem, and identify and define the computing requirements appropriate to its solution;

C.     An ability to design, implement and evaluate a computer-based system, process, component, or program to meet desired needs;

D.     An ability to function effectively on teams to accomplish a common goal;

E.      An understanding of professional, ethical, legal, security, and social issues and responsibilities;

F.      An ability to communicate effectively with a range of audiences;

G.     An ability to analyze the local and global impact of computing on individuals, organizations and society;

H.     Recognition of the need for, and an ability to engage in, continuing professional development;

I.        An ability to use current techniques, skills, and tools necessary for computing practice.

J.       An ability to apply mathematical foundations, algorithmic principles, and computer science theory in the modeling and design of computer-based systems in a way that demonstrates comprehension of the tradeoffs involved in design choices;

K.    An ability to apply design and development principles in the construction of software systems of varying complexity.

 

CS Program Objectives:

 

Our graduates will have achieved:

1)      a broad general education assuring an adequate foundation in science and mathematics relevant to computing.

2)      a solid understanding of concepts fundamental to the discipline of computer science.

3)      good analytic, design, and implementation skills required to formulate and solve computing problems.

4)      the ability to function and communicate effectively as ethically and social responsible computer science professionals.