Overview

This unit familiarises student with the workings of the various technologies used to undertake and investigate electronic misconduct. It provides an understanding of forensic tool kits and develops the skills to implement their use. Students will be presented with examples of e-forensic artefacts with each of the technologies.

Requisites

Teaching periods
Location
Start and end dates
Last self-enrolment date
Census date
Last withdraw without fail date
Results released date

Learning outcomes

Students who successfully complete this unit will be able to:

  • Demonstrate knowledge of operating systems, networks, mobile technologies and internet technologies and related forensic artefacts of each technology
  • Demonstrate knowledge of the workings of a forensic tool kit
  • Apply knowledge of the usage of forensic tool kits
  • Identify incidents of electronic fraud
  • Identify, locate and develop strategies for the evaluation of data sources for e-forensic investigation
  • Describe common malware types and their effects

Teaching methods

Hawthorn

Type Hours per week Number of weeks Total (number of hours)
Face to Face Contact (Phasing out)
Lecture
1.00 12 weeks 12
On-campus
Class
2.00 12 weeks 24
Unspecified Learning Activities (Phasing out)
Independent Learning
9.50 12 weeks 114
TOTAL150

Swinburne Online

Type Hours per week Number of weeks Total (number of hours)
Online
Directed Online Learning and Independent Learning
12.50 12 weeks 150
TOTAL150

Assessment

Type Task Weighting ULO's
ExaminationIndividual 50% 1,2,3,4,5,6 
Laboratory ReportIndividual 50% 1,2,3,4,5,6 

Hurdle

As the minimum requirements of assessment to pass a unit and meet all ULOs to a minimum standard, an undergraduate student must have achieved:

(i) an overall mark for the unit of 50% or more, and(ii) at least 40% in the final examStudents who do not successfully achieve hurdle requirement (ii) will receive a maximum of 45% as the total mark for the unit.

Content

  • File formats, structure, source of production and file systems
  • Networks: Client-server architecture, LANS, WANS, network protocols
  • Mobile technologies: protocols, mobile software, user identification
  • Internet: protocols, internet software, user identification
  • Forensic tool kits
  • Data extraction and forensic copying.
  • Pattern matching
  • Verification and validation
  • Anti-forensic techniques
  • Malware

Study resources

Reading materials

A list of reading materials and/or required textbooks will be available in the Unit Outline on Canvas.