Discuss the ethical, moral and professional issues relating to computer security, ethical hacking and incident response.



Similar documents
Unit Information Form (UIF)

Unit Information Form (UIF)

Unit Information Form (UIF)

Unit Information Form (UIF)

Unit Information Form (UIF)

Unit Information Form (UIF)

Unit Information Form (UIF)

Unit Name. Management Accounting. Unit Code. AAF006-2 Level 5. Credit Value 30. Location of Delivery. University Square (Luton) and Bedford

How To Teach Marketing

Unit Information Form (UIF) UIF0708

Course Information Form (CIF)

Course information form (CIF) PMB

Programme Specification. Computer Networks and Security with Foundation. Creative Technologies Academic Group. Division and/or Faculty/Institute:

The University s course specification template has been developed to fulfil three main functions; it shall act:

City University of Hong Kong. Information on a Course offered by Department of Computer Science with effect from Semester A in 2014 / 2015

For UCAS tariff points please refer to our website (

Digital forensics Unit number: 30 Level: 5 Credit value: 15 Guided learning hours: 60 Unit reference number: D/601/1939.

The University s course specification template has been developed to fulfil three main functions; it shall act:

Programme Specification and Curriculum Map for BA Criminology (Criminal Justice)

Section 1 - General Course Information

Programme Specification and Curriculum Map for MSc Electronic Security and Digital Forensics

F21CN: Computer Network Security: Overview

ITM 642: Digital Forensics Sanjay Goel School of Business University at Albany, State University of New York

DIGITAL FORENSICS SPECIALIZATION IN BACHELOR OF SCIENCE IN COMPUTING SCIENCE PROGRAM

NORTHBROOK COLLEGE SUSSEX AND UNIVERSITY OF BRIGHTON PROGRAMME SPECIFICATION HERB /ADC/ASC/FINAL 1 PART 1: PROGRAMME SUMMARY INFORMATION

CSN08101 Digital Forensics. Module Leader: Dr Gordon Russell Lecturers: Robert Ludwiniak

The CIF provides core information to students, staff teams and others on a particular course of study. Web Design and Software Development

2012/2013 Programme Specification Data. Public Relations

Tuskegee University Department of Computer Science Course No: CSCI 390 (Computer Forensics) Fall MWF 1:00-2:300, BRIM 301

UNDERGRADUATE PROGRAMME SPECIFICATION

RARITAN VALLEY COMMUNITY COLLEGE COURSE OUTLINE. CISY-274 Privacy, Ethics & Computer Forensics

Course Bachelor of Information Technology majoring in Network Security or Data Infrastructure Engineering

BSc (Hons) Computer Animation

Programme Specification and Curriculum Map for MSc Business Information Systems Management

Programme Specification and Curriculum Map for

Information Security Systems

BSc Management with Information Technology For students entering Part 1 in 2012/3. Henley Business School at Univ of Reading

BA (Hons) Early Childhood Studies

CIF2015/16 FOR USE IN RELATION TO NMC COURSES (WHERE REQUIRED) UNTIL THE NEXT REVIEW POINT. Nursing with Registered Nurse Mental Health

LONDON METROPOLITAN UNIVERSITY Course Specification template

Section 1 - General Course Information

Section 1 - General Course Information

UNDERGRADUATE PROGRAMME SPECIFICATION

Full time 2 years Part time 3 years

All LJMU programmes are delivered and assessed in English

BA (Hons) Air Transport with Commercial Pilot Training (Top-up)

BSc Management with Information Technology For students entering Part 1 in 2015/6. Henley Business School at Univ of Reading

BSc Business Information Technology For students entering Part 1 in 2008/9

Computer Hacking Forensic Investigator v8

BSc (Hons) Computer Networks

PROGRAMME SPECIFICATION

Principal Lecturer in Cyber Security. 9 47,328-54,841 per annum. School of Computing & Technology. 1.0 FTE (part-time or Job share will be considered)

BA Hons Sports Business, Sponsorship and Advertising. Design, Media & ManagementDesign, Media & Management

MA Design for Digital Media

Birmingham City University Faculty of Technology, Engineering and the Environment. Undergraduate Programme. Programme Specification

MSc in Computer and Information Security

Programme Specification

Nettitude Ltd. (FHEQ) level 7] MSc Postgraduate Diploma Postgraduate Certificate. British Computer Society (BCS) Master s Degree in Computing

Programme Specification: MSc Computing (Information Security)

Australian School of Business School of Information Systems, Technology and Management INFS4806 / INFS5906 INFORMATION SYSTEMS FORENSICS

Programme Specification: BA (Hons) Strategic Sports Management

CS 340 Cyber Security Weisberg Division of Computer Science College of Information Technology & Engineering Marshall University

Nursing Programs and Skills - Tutorials

MBA in Construction and Real Estate. Date of specification: September

PROGRAMME SPECIFICATION UNDERGRADUATE PROGRAMMES

Creative Lighting Control

UNIVERSITY OF ULSTER COURSE SPECIFICATION COURSE TITLE: Postgraduate Diploma/MSc in Political Lobbying and Public Affairs 1.

BSc Business Information Systems. BSc (Hons) Business Information Systems

Information, Network & Cyber Security

Nottingham Trent University Course Specification

Network Security Course Specifications

MSc Forensic Accounting

LONDON SCHOOL OF COMMERCE. Programme Specifications for the. Cardiff Metropolitan University. MSc in International Hospitality Management

QAA Subject Benchmarking Group: Business and Management (2007)

Final Award. (exit route if applicable for Postgraduate Taught Programmes) N/A JACS Code

Programme length: Date of specification: December CEM Board for the Undergraduate Courses Accreditation:

Arts, Humanities and Social Science Faculty

Programme Specification 2015/16

Bellevue University Cybersecurity Programs & Courses

Section 1 - General Course Information

Section 1 - General Course Information

Birmingham City University Faculty of Technology, Engineering and the Environment. Undergraduate Programme. Programme Specification

Faculty of Organizational Sciences

Transcription:

Unit Information Form (UIF) UIF1011 The UIF provides essential information to students, staff teams and others on a particular unit. Please refer to the University s Guidance notes on Unit Information Forms before completing the details below SECTION 1 - Changes made to Section 1 of the UIF will require Faculty level approval. If substantial changes to Units/Courses are required, consult with Sub Dean (Quality Enhancement) for advice Unit Name Unit Code Security Testing and Forensic Investigation CIS019-2 Level FHEQ 5 Credit Value 30 Location of Delivery Park Square Summary/Overview This unit provides students with a wide range of essential theoretical, conceptual and pragmatic hands-on skills underpinning modern computer systems in the closely related areas of ethical hacking and forensic investigation and it requires good numeracy skills and knowledge of computer hardware architecture. Thus, topics areas such as attack techniques, concealing access and tracks, computer investigations, incident response and forensic analysis form the essential building blocks of the unit. The primary aim of the unit is: To advance the students knowledge about the judicial process within the UK, the law of evidence and laws relevant to Computer or IT security. Aims Upon successful completion of the unit the students should be able to :- Understand the procedures behind UK Judicial System and understand the role of the Crown prosecution service and the differences between Magistrate and Crown Courts. Demonstrate an understanding the concept of process to be used to safeguard evidence and in particular digital evidence gathered through computer forensic techniques. Demonstrate knowledge of the legal issues surrounding the use of computers and IT and be able to understand major pieces of UK and European legislation concerning issues with computer security.

Core Learning Outcomes Learning Outcomes On completion of this unit you should be able to: Assessment Criteria To achieve the learning outcome you must demonstrate the ability to: 1 2 Discuss the ethical, moral and professional issues relating to computer security, ethical hacking and incident response. To understand the concept of phases in a penetration test and the various open source frameworks. Demonstrate the understanding of concept of different codes of conduct issued by organisations with others and how to apply to ethical hacking. Show an understanding of the phases of a penetration test and discuss the individual phases and including methodologies and expected outcomes; Discuss and compare the different methodologies. 3 4 5 To know the tools and their usage to conduct a penetration test. Understand the concept of computer forensic investigation in an incident response, including an understanding of the procedures and techniques involved in scene of crime investigation. Understand the concept of conducting evidence gathering and forensic analysis and knowledge of tools to conduct computer forensic investigation. 6 Fundamentally understand the concept of different witnesses. Understand the concepts of tools availability and the phase they are used; Discuss the different tools and their advantages and disadvantages. Describe what a computer forensic investigation is; Outline the proper response to various incident scenarios; Describe procedures for evidence gathering and protection during a Crime Scene Investigation. Identify different types of forensic analysis techniques and describe the problems associated with them; Understand the concept of a range of opens source and commercial tools and discuss the availability for computer forensic analysis. Understand the role of different witnesses and their duties.

SECTION 2 - Any changes made to Section 2 of the UIF will normally require Faculty level approval Period of Delivery Pre-requisites/Restrictions Student Activity Year long n/a Activity Notional Learning Hours Lectures 40 Seminars/tutorials 20 Lab/Field work 20 Workshops Rehearsals 4 Assessment 10 e-learning 10 Self-directed study 196 Group work Other (specify) Total 300 This unit will be delivered using formal lectures, lab-based practical exercises and tutorial sessions to help students to understand fundamentals of ethical hacking and forensic investigation and to develop their problem-solving skills. The following specific elements are included: Lectures introduce the basic concepts of ethical hacking and forensic investigation, together with a variety of techniques needed to implement penetration testing and forensic investigation. Approach to Learning Lab-based practical sessions and tutorials provide students opportunities of consolidating the concepts and techniques introduced in the lectures and in the use of these concepts and technique to develop solutions to problems which are designed based on real-world environment. Guided and self-directed review of research papers on modern ethical hacking and forensic investigation techniques using electronic and paper based resources is expected and encouraged. Students self-directed study using a variety of information sources is expected. Communication To help with the development of this you will Skills Development Develop oral communication skills via the oral informal group work activities and in practical lab-based sessions, Written skills are developed via critical and evaluative report writing in support of their Assignment (assessment point 2). Information Literacy To help with the development of this you will:-

Be encouraged to access and critically review information sources via access to the web, via the Learning Resource Centre and through on-line access to scholarly Journals and articles. Where appropriate students are encouraged to critically review papers written by members of the unit team. Research and Evaluation To help with the development of this you will:- Be encouraged to evaluate academic literature whilst completing the first two assessment points and be encouraged to search for state of the art information sources to support your study. Where appropriate students are encouraged to critically review papers written by members of the unit team. Creativity and Critical Thinking To help with the development of this you will:- Be encouraged to creative problem-solving, not only in relation to specific assessment, but also towards wider issues that relate to real-world concerns in relation to real-world testing requirements and incident response. Each of the assessment points provides ample opportunities for students to demonstrate creativity and critical awareness. 1. The first assessment point is a short in class test conducted in class on UK and European legislation and legal issues and basic Forensic tests to provide formative feedback as to student s progress. Assessment Strategy 2. The second assessment point is designed to test students understanding of computer forensics and problem-solving skills development in terms of solving problems design in real-world environment. This assignment is practical-based. Students are expected to complete this assignment within a small group. A supportive written commentary and discussion are encouraged. 3. This assessment point comprises a three hour unseen written examination covering all aspects of this unit. No Learning Outcomes Submission week Assessment Description of Assessment Weight Assessed (assignments) or Method* Method % 1 2 3 4 5 6 length (exam) 1 CB In-unit test 20 X X Week 10 2 CS,GR Case Study 40 X X X Week 20 3 EX Exam 40 X X X X X X 2 hours *The following codes for assessment methods apply:- AR Artifact PC Practical CB Computer-based PF Performance CS Case Study PL Placement DI Dissertation or Project PO Portfolio

EX Exam PR Presentation GR Group Report RE Individual Report IT In-unit Test OR Oral LR Literature Review OT Other SECTION 3 - Once initial approval of the unit has been given, the Unit Co-ordinator may make changes to this section, following appropriate consultation Outline Teaching Schedule Overview and introduction (2 weeks) Background knowledge (2 weeks) Ethics of Penetration Testing (1 week) Penetration Testing (2 weeks) Tools (2 weeks) Understanding Computer Investigations (3 weeks): First Response to Incidents (1 week): Digital Evidence Preservation (2 weeks) Understanding Operating systems & File Storage (2 weeks) Data Acquisition (3 weeks) Forensic Analysis (5 weeks) Revision (2 Weeks) Recommended Resources Essential Hands-on Ethical Hacking and Network Defence, Michael t. Simpson, Thompson,ISBN 0-619-21708-1 Guide to Computer Forensics and Investigation, Second Edition, Bill Nelson et al, Thomson, ISBN 0-619-21706-5 File System Forensic Analysis, Brian Carrier, Addison Wesley, ISBN 0-321-26817-2 Cole E (2008): Network Security Fundamentals, Wiley, ISBN 13:9781597494229 Background Penetration Testers Open Source Toolkit, Johnny Long et al, Syngress, ISBN 1-59749-021-0 Wi-Foo The secrets of wireless hacking, Andrew Vladimirov, Addison-Wesley, ISBN 0-321- 202171 Cole Eric (2009): Network Security Bible, John Wiley & Sons; 2nd ed. ISBN-10: 0470502495 Harlan Carvey (2009): Windows Forensic Analysis DVD Toolkit, Edition 2, Elsevier Science, ISBN:1597494224,

Catherine Bond, et al. (2007): The Expert Witness: A Practical Guide, Third Edition, Shaw & Sons, ISBN 072191442X William Stallings (2003): Cryptography and Network Security: Principles and Practice, Prentice Hall, ISBN 0131115022 Ross Anderson (2008): Security Engineering, 2nd Ed. Wiley Dieter Gollmann (2005): Computer Security, 2nd Ed. John Wiley and Sons Ltd. ISBN: 0470862939. Security Computer Forensics Principles and practices, Linda Volonino et al, Pearson, ISBN 0-13-154727-5 Computer Forensics Jump Start, Michael Solomon, Sybex, ISBN 0-7821-4375-X Real Digital Forensics, Keith Jones el al, Addison Wesley, ISBN 0-321-24069-3 Journals Computers and Security International Journals of Information Management and Computer Security SECTION 4 Administrative Information Faculty Field Department/School/Division Unit Co-ordinator CATS Undergraduate Computer Science and Technology Department of Computer Science and Technology Xiaohua Feng Version Number 2012.1 Body approving this version FTQSC (Periodic Review 2012) Date of University approval of this version (dd/mm/yyyy) Shared Units Indicate below all courses which include this Unit in their diet BSc (Hons) Computer Security and Forensics Form completed by: Name: Marc Conrad Date: 27/02/2012 Authorisation on behalf of the Faculty Teaching Quality and Standards Committee (FTQSC) Chair: Date:... Unit Updates Date (dd/mm/yyyy) Nature of Update FTQSC Minute Ref: