CISF102 Cyber Crime

Department of Science, Technology, Engineering & Mathematics: Computer/Information Science

I. Course Number and Title
CISF102 Cyber Crime
II. Number of Credits
3 credits
III. Minimum Number of Instructional Minutes Per Semester
2250 minutes
IV. Prerequisites
None
Corequisites
None
V. Other Pertinent Information
VI. Catalog Course Description
This course explores computer related crime in cyber space now and in the past. Ethical and criminal infractions in personal and work related situations are studied. Methods of investigation by computer forensic professionals are considered and techniques for security and safety researched.
VII. Required Course Content and Direction
  1. Learning Goals:

    Course Specific - The students will be able to:

    1. describe various cyber crimes;
    2. summarize current laws as they pertain to cyber crimes;
    3. identify various ethical and unethical activities involving computers; and
    4. formulate guidelines for safe computing.
  2. Planned Sequence of Topics and/or Learning Activities:

    1. Introduction
      1. Cyberspace and Criminal Behavior
      2. Clarification of Terms
      3. Traditional Problems Associated with Computer Crime
      4. Extent of the Problem

    2. Computer Crime Terminology and History
      1. Computer Language
      2. Network Language
      3. Realms of the Cyberworld
      4. A Brief History of the Internet
      5. Recognizing and Defining Computer Crime
      6. Contemporary Crimes

    3. Computer Ethics
      1. Background and History
      2. Privacy and Personal Information

    4. Computers as Targets
      1. Personal and Work computers as Targets
      2. Standards and strategies for work and home security
      3. Contaminants and Destruction of Data

    5. Avenues for Prosecution and Government Efforts
      1. Traditional Statutes
      2. Evolution of Computer-Specific Statutes
      3. Applying the First and Fourth Amendments to Computer-Related Crime
      4. Emerging Statutes
      5. Child Pornography Statutes
      6. Technology-Specific Legislation
      7. The Expectation of Privacy and Electronic Surveillance
      8. International Efforts

    6. Computer Forensic Terminology and Computer Investigations
      1. Forensic Computer Science-An Emerging Discipline
      2. Traditional Problems in Computer Investigations
      3. Computer Forensic Science and Disk Structure
      4. Traditional Problems Associated with Finding Digital Evidence
      5. Minimum Requirements
      6. Miscellaneous Documentation and Literature

    7. Computer Investigations Activities
      1. Warrant Preparation and Application
      2. Plan Preparation and Personnel Gathering
      3. Preparing a Toolkit
      4. Approaching and Securing the Crime Scene
      5. Determining the Need for Additional Assistance
      6. Scene Processing

    8. Conclusions and Future Issues
      1. Traditional Problems and Recommendations
      2. Future Trends and Emerging Concerns
  3. Assessment Methods for Core Learning Goals:

    This course is not in the Core.

    All Discipline-Specific Course Objectives will be assessed as follows:

    The student will apply computer forensic concepts and principles to solve problems presented through informal assessment, such as oral communication among students and between teacher and students. Formal assessment will consist of open-ended questions reflecting theoretical and applied situations, as well as laboratory exercises.

  4. Reference, Resource, or Learning Materials to be used by Students:

    Departmentally selected textbook. Details provided by the instructor of each section. See course format.
VIII. Teaching Methods Employed
Use of lecture and hands-on demonstrations will be augmented at individual teacher's discretion.

Review/Approval Date - 5/07