SALEIE logo that when clicked will open a new window to access the SALEIE home page.

Strategic ALignment of Electrical and Information Engineering in European Higher Education Institutions

European Union flag.

Accessibility

 

User guide

 

SALEIE Home

Click on the image to the left to select the project website section to go to.

Click on the images to the left and above to select the project website section to go to (Technical Challenge Areas, Student and Staff Support Hub or Governance) OR select the Student and Staff Support Hub below.

Technical Global Challenges Areas Student and Staff Support HUB Higher Education Policy Hub

 

Higher Education Technical Challenges Hub: Module Specification

ICT14M2 Contemporary Issues in Crime, Safety and Security

pdf version of module specification

Download the module specification

pdf version of module specification


Module:

Programme:

ICT

ECTS:

6

Type:

Masters

Module name:

Contemporary Issues in Crime, Safety and Security


Scope and form:

Elective; face to face


Duration (weeks; Hours/week):

15 weeks, 2h lectures/week and 2h lab/week; mid-term exam, seminar work, lab work

Type of assessment:

exams, assignments, seminar work

Qualified Prerequisites:

Basic knowledge of informatics


General module objectives:

The objective of this module is to give students knowledge from the field of digital forensics, data hiding, methods, and tools for forensics examination and data hiding


Topics and short description:

Data hiding: concept and goals of data hiding; modern approaches and techniques.
Introduction to digital forensics: digital forensics’ concepts; digital evidence.
Methodologies and approaches: memory devices; transfer devices and networks.
Forensic preservation and examination of volatile data: examination of memory and hard drives; static and dynamic analysis of malware; forensic analysis of network traffic.
Forensic tools: applications, live distributions and network traffic analyzers.


Learning outcomes:

Knowledge

Skills

Competences

Cyber-warfare background

Ability to understand and analyze cyber-warfare incident

Analyze and act in case of cyber-warfare incidents

Digital forensics techniques

Ability to use digital forensic techniques when investigating computers and information systems

Investigate digital forensics

Digital forensics process

Ability to user computer forensics process

Conduct a computer forensics process

Understanding tools and approaches of computer forensics

Ability to use computer forensic tools when investigating digital devices and deployment of data protection

Proficiency in digital forensics tools


Recommended literature:

G. Mohay et al.: Computer and Intrusion Forensics, Artech House, Boston, 2003
M.A. Caloyannides: Privacy Protection and Computer Forensics, Second Edition, Artech House, Boston, 2004
D. Schweitzer: Incident Response: Computer Forensics Toolkit, John Wiley & Sons, New York, 2003
W. Stallings: Cryptography and Network Security - Principles and Practice, 5th Edition, Prentice Hall, Boston, 2011
S. Katzenbeisser, F. A. P. Petitcolas: Information Hiding Techniques for Steganography and Digital Watermarking, Artech House Publishing, Boston, 2000