Professional Documents
Culture Documents
• Course Description
Computer Forensics and Cyber Crime, 3rd ed. Copyright © 2013 by Pearson Education, Inc.
Marjie T. Britz All Rights Reserved
CyberCrime - Syllabus
• The following are assessment methods used for this course:
Assignment Value
Exam 1 25%
Exam 2 25%
Final Exam 25%
Case study – Group Project 20%
Group Project- Bonus (Qatar case) 5%
TOTAL 100%
Computer Forensics and Cyber Crime, 3rd ed. Copyright © 2013 by Pearson Education, Inc.
Marjie T. Britz All Rights Reserved
CyberCrime - Syllabus
Week Date Topic (s) Assignments /Quizzes
/Exams
1 Lecture 1
Introduction and Overview of
Computer Forensics and Cybercrime
(Part 1)
Lecture 2 Introduction and Overview of
Computer Forensics and Cybercrime
(part 2)
Lecture 3 Computer terminology and history
2 Lecture 4 Traditional computer crime: early
hackers and theft of components
Lecture 5 Contemporary computer crime (part 1)
Lecture 6 Contemporary computer crime (part 2) Exam 1
3 Lecture 7 Identity theft and identity fraud
Lecture 8 Terrorism and organized crime (part 1)
Lecture 9 Terrorism and organized crime (part 2)
4 Lecture 10 Avenue for prosecution and government
efforts
Lecture 11 Applying the first amendment to
computer-related crime
Lecture 12 The forth amendment and other legal
issues
5 Lecture 13 Computer forensics: terminology and
requirement (Part 1)
Lecture 14 Computer forensics: terminology and
requirement (Part 2)
Lecture 15 Searching and seizing computer-related Exam 2
evidence (Part 1)
6 Lecture 16 Searching and seizing computer-related
evidence (Part 2)
Lecture 17 Processing of evidence and report
preparation
Lecture 18 Case study-- group
Traditional Problems and project
Recommendations
7 Lecture 19 Future Trends and Emerging Concerns
Computer Forensics and Cyber Crime, 3rd ed. Copyright © 2013 by Pearson Education, Inc.
Marjie T. Britz All Rights Reserved
Computer Forensics and Cyber
Crime
CHAPTER 1
Introduction and
Overview of
Computer
Forensics and
Cybercrime
Computer Forensics and Cyber Crime, 3rd ed. Copyright © 2013 by Pearson Education, Inc.
Marjie T. Britz All Rights Reserved
Introduction
Computer Forensics and Cyber Crime, 3rd ed. Copyright © 2013 by Pearson Education, Inc.
Marjie T. Britz All Rights Reserved
Introduction
Computer Forensics and Cyber Crime, 3rd ed. Copyright © 2013 by Pearson Education, Inc.
Marjie T. Britz All Rights Reserved
Learning Objectives
Computer Forensics and Cyber Crime, 3rd ed. Copyright © 2013 by Pearson Education, Inc.
Marjie T. Britz All Rights Reserved
Learning Objectives
Computer Forensics and Cyber Crime, 3rd ed. Copyright © 2013 by Pearson Education, Inc.
Marjie T. Britz All Rights Reserved
Cyberspace and Criminal Behavior
Computer Forensics and Cyber Crime, 3rd ed. Copyright © 2013 by Pearson Education, Inc.
Marjie T. Britz All Rights Reserved
Cyberspace and Criminal Behavior
Computer Forensics and Cyber Crime, 3rd ed. Copyright © 2013 by Pearson Education, Inc.
Marjie T. Britz All Rights Reserved
Types of Crime
Computer Forensics and Cyber Crime, 3rd ed. Copyright © 2013 by Pearson Education, Inc.
Marjie T. Britz All Rights Reserved
Types of Crime
Computer Forensics and Cyber Crime, 3rd ed. Copyright © 2013 by Pearson Education, Inc.
Marjie T. Britz All Rights Reserved
Types of Crime
Computer Forensics and Cyber Crime, 3rd ed. Copyright © 2013 by Pearson Education, Inc.
Marjie T. Britz All Rights Reserved
Problems Associated with
Computer Crime
Problems associated with computer crime
include:
Computer Forensics and Cyber Crime, 3rd ed. Copyright © 2013 by Pearson Education, Inc.
Marjie T. Britz All Rights Reserved
Problems Associated with
Computer Crime
• Prosecutors may prefer to limit resources
on violent crime instead.
• Type:
Computer Forensics and Cyber Crime, 3rd ed. Copyright © 2013 by Pearson Education, Inc.
Marjie T. Britz All Rights Reserved
The Extent of the Problem
Computer Forensics and Cyber Crime, 3rd ed. Copyright © 2013 by Pearson Education, Inc.
Marjie T. Britz All Rights Reserved
The Extent of the Problem
• Target:
Private
Government
Computer Forensics and Cyber Crime, 3rd ed. Copyright © 2013 by Pearson Education, Inc.
Marjie T. Britz All Rights Reserved
The Extent of the Problem
Computer Forensics and Cyber Crime, 3rd ed. Copyright © 2013 by Pearson Education, Inc.
Marjie T. Britz All Rights Reserved
Example of a New Cybercrime:
The Emergence of e-Cash
• Increased electronic commerce requires
new ways to pay for goods and
services.
Computer Forensics and Cyber Crime, 3rd ed. Copyright © 2013 by Pearson Education, Inc.
Marjie T. Britz All Rights Reserved
Example of a New Cybercrime:
The Emergence of e-Cash
Prepaid cards: like debit cards, not
geographically limited
Computer Forensics and Cyber Crime, 3rd ed. Copyright © 2013 by Pearson Education, Inc.
Marjie T. Britz All Rights Reserved
Example of a New Cybercrime:
The Emergence of e-Cash
Computer Forensics and Cyber Crime, 3rd ed. Copyright © 2013 by Pearson Education, Inc.
Marjie T. Britz All Rights Reserved
Conclusions
Computer Forensics and Cyber Crime, 3rd ed. Copyright © 2013 by Pearson Education, Inc.
Marjie T. Britz All Rights Reserved
Conclusions
Computer Forensics and Cyber Crime, 3rd ed. Copyright © 2013 by Pearson Education, Inc.
Marjie T. Britz All Rights Reserved