CISF102 Cyber Crime

Department of Science, Technology, Engineering & Mathematics: STEM Department Archive

I. Course Number and Title
CISF102 Cyber Crime Course No Longer Offered
II. Number of Credits
3 credits
III. Number of Instructional Minutes
IV. Prerequisites
V. Other Pertinent Information
VI. Catalog Course Description
This course explores computer-related crime in cyberspace now and in the past. Ethical and criminal infractions in personal and work-related situations are studied. Methods of investigation by computer forensic professionals are considered and techniques for security and safety researched.
VII. Required Course Content and Direction
  1. Course Learning Goals

    Students will:

    1. describe various cyber crimes;
    2. summarize current laws as they pertain to cyber crimes;
    3. identify various ethical and unethical activities involving computers; and
    4. formulate guidelines for safe computing.
  2. Planned Sequence of Topics and/or Learning Activities

    Course Outline:

    1. Introduction
      1. Cyberspace and Criminal Behavior
      2. Clarification of Terms
      3. Traditional Problems Associated with Computer Crime
      4. Extent of the Problem
    2. Computer Crime Terminology and History
      1. Computer Language
      2. Network Language
      3. Realms of the Cyberworld
      4. A Brief History of the Internet
      5. Recognizing and Defining Computer Crime
      6. Contemporary Crimes
    3. Computer Ethics
      1. Background and History
      2. Privacy and Personal Information
    4. Computers as Targets
      1. Personal and Work Computers as Targets
      2. Standards and Strategies for Work and Home Security
      3. Contaminants and Destruction of Data
    5. Avenues for Prosecution and Government Efforts
      1. Traditional Statutes
      2. Evolution of Computer-Specific Statutes
      3. Applying the First and Fourth Amendments to Computer-Related Crime
      4. Emerging Statutes
      5. Child Pornography Statutes
      6. Technology-Specific Legislation
      7. The Expectation of Privacy and Electronic Surveillance
      8. International Efforts
    6. Computer Forensic Terminology and Computer Investigations
      1. Forensic Computer Science-An Emerging Discipline
      2. Traditional Problems in Computer Investigations
      3. Computer Forensic Science and Disk Structure
      4. Traditional Problems Associated with Finding Digital Evidence
      5. Minimum Requirements
      6. Miscellaneous Documentation and Literature
    7. Computer Investigations Activities
      1. Warrant Preparation and Application
      2. Plan Preparation and Personnel Gathering
      3. Preparing a Toolkit
      4. Approaching and Securing the Crime Scene
      5. Determining the Need for Additional Assistance
      6. Scene Processing
    8. Conclusions and Future Issues
      1. Traditional Problems and Recommendations
      2. Future Trends and Emerging Concerns
  3. Assessment Methods for Course Learning Goals

    The student will apply computer forensic concepts and principles to solve problems presented through informal assessment, such as oral communication among students and between teacher and students. Formal assessment will consist of open-ended questions reflecting theoretical and applied situations, as well as laboratory exercises.
  4. Reference, Resource, or Learning Materials to be used by Student:

    Departmentally-selected textbook. Details provided by the instructor of each section. See course syllabus.

Review/Approval Date - 5/07; New Core 8/2015