ENGHAN CASEY (2011), DIGITAL EVIDENCE AND COMPUTER CRIME,Discuss digital evidence and privacy issues. For example, there are a growing number of sensors on the Internet such as cameras showing live highway traffic on the Web, these data could be potentially used for digital evidence if necessary. Will that have violation on some citizen’s privacy?
Seminar 1: Introduction to Computer Forensics Laureate Online Education Computer Forensics © All rights reserved 2005-2012. The Computer Forensics module, in all its parts: syllabus, guidelines, lectures, discussion questions, technical notes, images, projects and any additional material is copyrighted by Laureate Online Education B.V. Computer Forensics Seminar for Week 1: Digital Evidence, Computer Crime, Technology and Law WELCOME to this module on Computer Forensics. Over the next few weeks, we will be exploring, thinking about, and discussing ideas concerning the principles and practice of computer forensics. In particular, we will be covering topics including digital evidence and computer crime; technology and law; the investigative process; investigative reconstruction; digital evidence in the courtroom; techniques for discovering digital evidence; responding to electronic incidents; tracking communications through networks; understanding electronic media; Windows™ and UNIX™ system forensics; digital evidence on the Internet; investigating computer intrusions; sex offenders on the Internet; criminal profiling; and investigations of cyber-stalking. As digital criminals have become more sophisticated, security-related incidents have become substantially more diverse in nature, and their impact on society is increasingly more destructive. Vulnerabilities within the information infrastructure have potentially profound consequences for the government, corporations, and millions of individuals. Detection of and response to digital incidents are vital components of modern information security programs at both macro and micro levels. Operating in today’s dynamic computing environments, the forensic investigator must be able to detect and counter cyber-crime effectively. This module will provide students with opportunities to study, understand, and use the latest developments and best practices in computer forensics. Topics...
Already registered? Login
Not Account? Sign up
Enter your email address to reset your password
Back to Login? Click here