SALEIE logo that when clicked will open a new window to access the SALEIE home page.

Strategic ALignment of Electrical and Information Engineering in European Higher Education Institutions

European Union flag.



User guide



Click on the image to the left to select the project website section to go to.

Click on the images to the left and above to select the project website section to go to (Technical Challenge Areas, Student and Staff Support Hub or Governance) OR select the Student and Staff Support Hub below.

Technical Global Challenges Areas Student and Staff Support HUB Higher Education Policy Hub


Higher Education Technical Challenges Hub: Module Specification

ICT14M2 Contemporary Issues in Crime, Safety and Security

pdf version of module specification

Download the module specification

pdf version of module specification








Module name:

Contemporary Issues in Crime, Safety and Security

Scope and form:

Elective; face to face

Duration (weeks; Hours/week):

15 weeks, 2h lectures/week and 2h lab/week; mid-term exam, seminar work, lab work

Type of assessment:

exams, assignments, seminar work

Qualified Prerequisites:

Basic knowledge of informatics

General module objectives:

The objective of this module is to give students knowledge from the field of digital forensics, data hiding, methods, and tools for forensics examination and data hiding

Topics and short description:

Data hiding: concept and goals of data hiding; modern approaches and techniques.
Introduction to digital forensics: digital forensics’ concepts; digital evidence.
Methodologies and approaches: memory devices; transfer devices and networks.
Forensic preservation and examination of volatile data: examination of memory and hard drives; static and dynamic analysis of malware; forensic analysis of network traffic.
Forensic tools: applications, live distributions and network traffic analyzers.

Learning outcomes:




Cyber-warfare background

Ability to understand and analyze cyber-warfare incident

Analyze and act in case of cyber-warfare incidents

Digital forensics techniques

Ability to use digital forensic techniques when investigating computers and information systems

Investigate digital forensics

Digital forensics process

Ability to user computer forensics process

Conduct a computer forensics process

Understanding tools and approaches of computer forensics

Ability to use computer forensic tools when investigating digital devices and deployment of data protection

Proficiency in digital forensics tools

Recommended literature:

G. Mohay et al.: Computer and Intrusion Forensics, Artech House, Boston, 2003
M.A. Caloyannides: Privacy Protection and Computer Forensics, Second Edition, Artech House, Boston, 2004
D. Schweitzer: Incident Response: Computer Forensics Toolkit, John Wiley & Sons, New York, 2003
W. Stallings: Cryptography and Network Security - Principles and Practice, 5th Edition, Prentice Hall, Boston, 2011
S. Katzenbeisser, F. A. P. Petitcolas: Information Hiding Techniques for Steganography and Digital Watermarking, Artech House Publishing, Boston, 2000