Thank you so much
To provide learners with an understanding of the principles of digital forensics and the impact on commerce, society and the individual.
With the evolution of information technology and the increasing adoption of telecommunication based systems, opportunities for criminal and illegal practice have expanded exponentially. For an ICT professional, managing the security of any complex corporate system comes with many challenges. When a breach of the system occurs a criminal act takes place against an organisation or an individual. As with a real-world crime scene, a computer system can be used as a tool to implicate criminal activity. The need to preserve the crime scene and ensure the analysis is completed in a manner conducive to the fair and unbiased pursuit of justice is of the greatest importance. In legal proceedings, the evidence presented is often called into doubt by the presence of unsafe practice in the acquisition of forensic evidence from a computer system. In taking this unit, the learner is introduced to IT forensics and the critical need for accurate, detailed and recorded investigation of the fact. The practice of IT forensics has to be supported by individuals trained in national or international law enforcement practice. In preserving the scene learners must ensure system logs, operating system data and other relevant information is acquired and stored as an image of the time of forensic acquisition. Learners must be in a position to assist any potential legal process and ensure the evidence acquired supports a successful and fair legal outcome. Learners will need to understand and review cases where the process of forensic analysis determines the absence of direct criminal intent and serves as a process to improve security and administrative processes as well as technological implementation.
Casey E – Handbook of Digital Forensics and Investigation (Academic Press, 2009) ISBN-10: 0123742676
Carvey H – Windows Forensic Analysis DVD Toolkit (Syngress, 2009) ISBN-10: 1597494224
Malin C et al – Malware Forensics: Investigating and Analyzing Malicious Code (Syngress, 2009) ISBN-10: 159749268X