UNIVERSITY OF MASSACHUSETTS LOWELL

DEPARTMENT OF COMPUTER SCIENCE

 

91.580.203 Topics in Computer Science: Computer and Network Forensics

Fall 2008

 

Instructor:

Dr. Xinwen Fu

Office: 

203 Olson Hall

Phone: 

(978) 934-3623

E-Mail: 

xinwenfu@cs.uml.edu         

Homepage: 

http://www.cs.uml.edu/~xinwenfu

Office Hours: 

Wed. 3:30PM ~ 6:30PM

 

Course Name:

91.580.203 Topics in Computer Science: Computer and Network Forensics

Credits:

3.00

Duration:

9/3/2008 ~ 12/22/2008

Time:

Thu. 5:30 PM - 8:15 PM

Location:

Olson 219

 

 

COURSE DESCRIPTION

Identifying, preserving and extracting electronic evidence. Students learn how to examine and recover data from operating systems, core forensic procedures for any operating or file system, understanding technical issues in acquiring computer evidence and how to conduct forensically sound examinations to preserve evidence for admission and use in legal proceedings.

 

COURSE PREREQUISITES:

The class is open to students with minimal computer science knowledge. The following knowledge will help your study.

1.      Linux (Fedora Core) and Windows - basic use and software installation.

2.      Knowledge of networks

3.      Creative thoughts

 

DESCRIPTION OF INSTRUCTIONAL METHODS

Class Preparation

      Lecturing is based on the textbook with learning materials provided.

      Security techniques may be practiced in the lab.

      You will be expected to be prepared for class, and you must complete the assignments by the due dates.

 

COURSE REQUIREMENTS

Textbooks

      Chris Prosise, Kevin Mandia, Matt Pepe, Incident Response and Computer Forensics, Second Edition (Paperback), ISBN: 007222696X

o        Textbooks may be purchased at the bookstore or electronically through: http://www.amazon.com or some other bookseller

o        Note: Textbook may not be required. The class follows the book very loosely.

 

Supplementary Materials

      Amelia Phillips, Bill Nelson, Frank Enfinger, Chris Steuart, Guide to Computer Forensics and Investigations, Second Edition (Paperback), ISBN: 0619217065

      Warren G. Kruse II, Jay G. Heiser, Computer Forensics : Incident Response Essentials (Paperback), ISBN: 0201707195

 

 

Class Attendance Policy

Students should attend the class in the classroom.

 

Cheating and Plagiarism Policy

All forms of academic dishonesty will result in an F for the course and notification of the Academic Dishonesty Committee.  Academic dishonesty includes (but is not limited to) plagiarism, copying answers or work done by another student (either on an exam or assignment), allowing another student to copy from you, and using unauthorized materials during an exam.

 

Make-up Exams

      Make-up exams will only be given in case of serious need and only when the instructor is notified prior to the exam time. If this is not done, the grade is automatically zero for that exam/quiz.

      Written verification for the student¨s inability to take an exam will be required.

      The make-up exams will be different from those given to the class.

 

COURSE GOALS

         Learn About The Field Of Computer Forensics

We will learn about the emerging field of Computer Forensics - the science of obtaining and analyzing evidence from computers. This evidence may be found on storage devices, such as hard drives, which are confiscated under warrant from personal or professional computers; or it may be found by traces of activity on computer networks. We will learn the tools and process of Computer Forensics.

         Learn Computer and Networking Concepts.

We will learn how computers and the Internet work so that they change rapidly, you can understand the changes. Specific topics include how computer hardware and software work, what data formats are, how network hardware works and how the Internet works.

         Investigate Legal and Ethical Issues Involving Computer Forensics

We will explore what kind of crimes computer forensics specialist investigate, and learn about what information gathering is legal/illegal and ethical/unethical. As technology emerges and changes so quickly, many of the aspects of these laws and guidelines are still being developed, which will make for an interesting academic exploration of the issues.

 

 EVALUATION PROCEDURES

 Components of Course Grade:

Assignments (5~10)

50%

Midterm

20%

Final Project

30%

 

Grade Scale

 

 

A

90 ~ 100

B

70 ~ 89.9

C

60 ~ 69.9

D

50 ~ 59.9

F

below 50

 

Homework Assignments

      All assignments are to be turned in on or before the due date and time. If you try and cannot turn in an assignment electronically because the campus network is down, you will not be penalized.

      An assignment turned in up to 24-hours late will be reduced by 10% of the assignment¨s worth, more than 24 hours late will be reduced 100%.

      The due date and time for each assignment will be specified on assignment postings.

      All assignments are expected to be individually and independently completed. Should two or more students turn in substantially the same solution or program, in the judgment of the instructor, the assignment will be given a grade of zero. A second such incident will result in an F grade for the course.

 

Exams

      Exams are based on textbooks, web sites, and assignments.

      All exams are take-home, but timed.

      The tentative exam format will be true/false, multiple choice, fill-in-the-blanks, programs, and/or short essays.

 

Projects

      Each member of this class is required to join a team of 3 persons. A team must have a team leader coordinating the communication with members and the instructor.

      Each team must be formed within 2 weeks from the semester start and the team leader will report the list of members to the instructor once the team is formed.

      Team work is encouraged since all members of a team will receive the same score based on the entire team¨s performance for team projects.

      Some of the projects will be performed within a close laboratory.

 

TENTATIVE CLASS SCHEDULE

The schedule may be adjusted based on the actual progress in the semester. We thank Dr. Yong Guan for sharing many of his materials.

 

Order

Topics

Chapter

Readings

Assignment

Data

0

Introduction

Slides

Survey

 

1

Computer Forensics and Investigations as a Profession

Slides

 

 

2

Understanding Computer Investigation

Physical Security

Slides

Slides

Assignment 1

 

3

Working with Windows and DOS Systems

Slides

 

Floppy Disk Image 1

Floppy Disk Image 2

4

System Boot Process

File Systems

Slides

Slides

Reading (Disk Imaging Tool Specification)

 

Midterm Exam

Due at 11:55PM, 10/10/2008, will be released after class on 10/9/2008

 

Mid Exam

 

5

FTK Forensic Toolkit

Slides

Assignment 2

book.pdf

6

Memory Imaging

Slides

Assignment 3

FTKBootCamp.pdf

proj1.zip

7

Intrusion Detection

Tripwire

Slides

Slides

Project 1

Sample report

 

8

Email Investigation

Slides

 

 

9

Linux logging

Slides

 

 

10

Reading and Project

Anonymity Slides

Replay attack Slides

GPS Slides

Reading Tor

 

Final Exam