Computer and Cyber Forensics – CJUS 363

CG • Section 8WK • 11/08/2019 to 04/16/2020 • Modified 11/09/2021

Course Description

The course will focus on the role of computer forensics and the methods used in the investigation of computer crimes. The course explains the need for proper investigation and illustrates the process of locating, handling, and processing computer evidence.

For information regarding prerequisites for this course, please refer to the Academic Course Catalog.

Rationale

This course is an introduction designed to familiarize the student with current approaches to computer, digital and cyber related forensics techniques and reinforce the appropriate procedures for evidence collection and processing. This course augments the core curriculum for criminal justice with a special emphasis in the challenging field of computer sciences. As electronic information increases in its importance and use in the court of law, future investigators need to understand the methods and processes available to them, or to their coworkers to collect, process, analyze and use information evidence supporting investigations and judicial proceedings.

Measurable Learning Outcomes

Upon successful completion of this course, the student will be able to:

Describe digital forensic sciences as a profession.

  1. Explain basic tools and techniques used in the field of computer forensics sciences.
  2. Evaluate an emerging issue in computer and cyber forensics.
  3. Participate in a cyber crime investigation.
  4. Articulate a biblical worldview of computer sciences, and the legal profession.

Course Assignment

Textbook readings and lecture presentations

Course Requirements Checklist

After reading the Syllabus and Student Expectations, the student will complete the related checklist found in the Course Overview.

Discussions (3)

Discussions are collaborative learning experiences. Therefore, the student will participate in 3 Discussions. Threads must be at least 400 words. The initial thread must contain two scholarly sources. In addition to the thread, the student must post replies of at least 200 words to 3 classmates’ threads and cite one source in APA format.

Deleted Files Forensics Assignment

The student will submit a 2–3-page paper outlining the options for retrieving the deleted files and explain their capabilities by outlining what hardware and software was needed.

Term Paper Assignments (3)

The student will submit a 10-12 page Term Paper topic specific to computer crime or computer forensics that represents his/her original work. This assignment will be submitted in 4 parts: Quiz: Term Paper Topic Submission, Term Paper: Outline Assignment, Term Paper: Bibliography Assignment, and Term Paper: Final Draft Assignment. The paper must be in current APA format and have a minimum of 5 scholarly sources.

Hashing Files Assignment

The student will compose a 1–2-page paper explaining what a hash value is and why it is important in computer forensics. The student must include detailed documentation of the activities that he/she conducted using the hashing website, documenting his/her hash values and discussing why the hash value changed.

Quizzes (6)

The student will take 4 quizzes, each containing 25 multiple choice or written questions to be completed in 30 minutes. Each quiz will be open-book/open-notes. The questions will be a combination of questions provided in the assigned chapters, developed from chapter content, and expressed in either outside reading or presentations associated with the Module: Week.

The student will also take a Quiz: Midterm and Quiz: Final. Both of which will contain 140 multiple-choice and essay questions and must be completed in 2 hours. The quizzes are open-book/open-notes and will cover the content presented through the readings and assignments.