Find a School
Computer Crime
CSC392
Instructor:
Lieutenant Raymond E. Foster,
LAPD (ret.), MPA
Course
Description:
This course will
introduce the learner to computer forensics, the art and science of using
technology to obtain evidence for use in criminal and civil court. Learners
will obtain an introduction to basic computer and networking concepts, the
Internet, computer crime statutes, management of evidence and industry
best-practices for examining computers that might contain crime-related
information. The topics of the course are reinforced with hands-on exercises
Source Material:
(Two Text Books are
used for this course)
Foster, Raymond E.
Police Technology
Prentice Hall, 2004
Britz, Marjie
T. Computer Crime and Cyber Forensics, 2004
Order a Copy of Police Technology
Computer Forensics and Cyber Crime: An Introduction
All other readings
are available online through hyperlinks provided on the course website.
Papers and
Assignments:
All papers and assignments are to be
submitted online, through the website provided for the course. The
assignments are to be attached to an email. All papers are to be
double-spaced, 12 point Garamond font. Use of the APA style of writing is
strongly encouraged. Papers are graded on content and well as exposition.
Each paper must have a heading with the students name, course title,
assignment title and date. All papers are must be sent by midnight on the due
date.
It is highly recommended that the Learner read through all four modules
of instruction in order to get a "feel" for where the course is headed.
In order to use the assignment matrix
below, first determine if you are a Semester or Session I/II learner.
Go to the Course Resource page for information on using the Union online
library and tips on writing and research.
Click here if you are taking a five unit course.
American Heroes News
While not used in this
computer crime course, Computer World said of Digital Evidence and Computer Crime, “Reviews
for the previous edition: "Digital Evidence and Computer Crime provides an introduction to many concepts from computer
science about networks, and in particular the Internet. It details the application of forensic science principles to the location,
recovery, and examination of digital evidence...Each chapter in the book is fully supported by case examples to clarify particular
points made. It also contains many references to specialized literature and on-line resources as well as a helpful glossary
of terms...this book can be recommended mainly for people looking to expand their general knowledge and awareness of computer
crime and the process of computer crime investigation, particularly those just entering the field of digital forensics."
--Dr. L.W. Russell, Science & Justice "Many, perhaps most, of the police, lawyers or systems administrators and forensic
scientists involved in investigation or prosecution of computer-related crimes do not know the answer to these questions [of
digital evidence handling]. This book will tell them. It should, of course, be equally interesting to lawyers with the task
of defending alleged computer criminals." --Robert L Dunne, JD, The Center for Internet Studies, Yale University, USA
"...an excellent book that details the elements of digital crime. Author Eoghan Casey does a superb job of applying forensic
science to computers. The information presented here is critical to a diverse audience: law enforcement, attorneys, forensic
scientists, and systems administrators, for instance...In all, the book and CD are an excellent introduction to an increasingly
important area of law enforcement." -- Ben Rothke, Security Management I would very highly recommend this book to all
those professionals who want to venture into the new and exciting branch of computer forensics. This book is good value for
money, and should adorn the bookshelves of all computer experts, especially those who are in computer forensics. - Internet
Journal of Forensic Medicine Reviews for 2nd Edition: This behemoth of a book offers more than 680 pages of useful information
on digital forensics and computer crime. There's something for everyone - law enforcement agencies that collect and process
evidence, forensic analysts, lawyers and other information security professionals. ...Casey does a great job making difficult
concepts easy to understand. The tools and methodology described are up to date and relevant, and the case studies are detailed
perfectly. This book is a great reference for any security professional facing issues in this area.”
One reader of Digital Evidence and Computer Crime said, “Sometimes,
defense attorneys have it easy: one slip-up by the prosecution and evidence is thrown out. Knowing that, law enforcement goes
to great lengths to ensure that evidence is appropriately collected and protected. That works well in the physical world,
where law enforcement has many generations' worth of experience. But in the modern world of computers and digital networks,
where the simple act of rebooting a computer is enough to wipe out large amounts of evidence, law enforcement clearly needs
thorough guidance. Such
a resource is here: Digital Evidence and Computer Crime, an excellent book that details the elements of digital crime. Author
Eoghan Casey does a superb job of applying forensic science to computers. The information presented here is critical to a
diverse audience: law enforcement, attorneys, forensic scientists, and systems administrators, for instance. While cybercrime
law is in some ways similar to other aspects of criminal law, it nonetheless has its own language and categories. For instance,
jurisdiction is a key element in both the physical and digital realms, but it is a much trickier concept in the latter. Casey
develops this topic and many more. Those new to computers and networks need not worry: the book begins with an explanation
of how they function. With the basics out of the way, Casey details how computers can be used in crime and how the evidence
created from these activities can be used for later analysis....The accompanying CD-ROM contains simulated cases that integrate
many of the topics covered in the text. In all, the book and CD are an excellent introduction to an increasingly important
area of law enforcement.”
According
to the book description of Incident Response and Computer Forensics, “A strong system of defenses
will save your systems from falling victim to published and otherwise uninventive attacks, but even the most heavily defended
system can be cracked under the right conditions. Incident Response aims to teach you how to determine when an attack has
occurred or is underway--they're often hard to spot--and show you what to do about it. Authors Kevin Mandia and Chris
Prosise favor a tools- and procedures-centric approach to the subject, thereby distinguishing this book from others that catalog
particular attacks and methods for dealing with each one. The approach is more generic, and therefore better suited to dealing
with newly emerging attack techniques. Anti-attack procedures are presented with the goal of identifying, apprehending, and
successfully prosecuting attackers. The advice on carefully preserving volatile information, such as the list of processes
active at the time of an attack, is easy to follow. The book is quick to endorse tools, the functionalities of which are described
so as to inspire creative applications. Information on bad-guy behavior is top quality as well, giving readers knowledge of
how to interpret logs and other observed phenomena. Mandia and Prosise don't--and can't--offer a foolproof guide to
catching crackers in the act, but they do offer a great "best practices" guide to active surveillance. --David Wall
Topics covered: Monitoring
computer systems for evidence of malicious activity, and reacting to such activity when it's detected. With coverage of
Windows and Unix systems as well as non-platform-specific resources like Web services and routers, the book covers the fundamentals
of incident response, processes for gathering evidence of an attack, and tools for making forensic work easier.”
|