Forensic Analysis of Information and Communication System |
Abbreviation: FOANAIKS
|
Load: 30(L)
+ 0(E)
+ 15(LE)
+ 15(S)
+ 0(FLE)
+ 0(PEE)
|
Lecturers in charge: |
dr. sc. Dragan Peraković |
Lecturers: |
dr. sc. Ivan Cvitić
(
Seminar, Laboratory exercises
)
dr. sc. Siniša Husnjak
(
Laboratory exercises, Seminar
)
|
Course description: Digital society, electronic crime, cybercrime, digital forensics, forensics of information and communication systems, the
terms "evidence" and "digital evidence". Digital forensics as a science. Detection of electronic digital evidence in the "static"
and "dynamic" state of the observed system. Methodology of conducting forensic analysis. Forensic analysis of communications
in wired and wireless communication systems. Elements of identification and forensic analysis of user devices. Hardware and
software tools for digital forensic analysis. Commercially available digital forensic analysis tools and open source tools.
Digital evidence of network and user equipment. Data extraction, storage and labeling of collected evidence. Non-invasive,
invasive and destructive data extraction methods. Making a forensic copy. Securing the system against accidental writing,
deletion, or modification. Methodology of time-space analysis on digital evidence. Evidence chain of custody. Maintaining
documentation during forensic analysis and creating reports. Legislation for conducting digital forensics. Forensic analysis
of vehicles, drones, IoT and unconventional devices.
|
Compulsory literature: |
1. |
Peraković, D.: Autorizirana predavanja (dostupno putem sustava Merlin |
2. |
National Institute of Standards and Technology: Guidelines on Mobile Device Forensics, U.S Department of Commerce, 2014. |
3. |
Husnjak, S., Cvitić, I.: Autorizirani materijali za laboratorijske vježbe (dostupno putem sustava Merlin) |
Recommended literature: |
4. |
Casey, E.: Handbook of Digital Forensics and Investigation, Elsevier, Burlington, USA, 2010. |
5. |
Watson, D. L., Jones, A.: Digital Forensics Processing and Procedures: Meeting the Requirements of ISO 17020, ISO 17025, ISO
27001 and Best Practice Requirements, Syngress Publishing, USA, 2013.
|
6. |
Robinson, M. K., Digital Forensics Workbook: Hands-on Activities in Digital Forensics, CreateSpace Independent Publishing
Platform, North Charleston, USA, 2015.
|
7. |
Bommisetty, S., Tamma, R., Mahalik, H.: Practical Mobile Forensics, Packt Publishing, Birmingham, UK, 2016. |
8. |
Sammons, J.: Digital Forensics: Threatscape and Best Practices, Syngress Publishing, USA, 2015. |
9. |
Tahiri, S.: Mastering Mobile Forensics, Packt Publishing, Birmingham, UK, 2016. |
10. |
Philipp, A., Cowen, D., Davis, C.: Hacking Exposed - Computer Forensics, McGraw Hill, New York, USA, 2010. |
11. |
Reiber, L.: Mobile Forensic Investigations: A Guide to Evidence Collection, Analysis, and Presentation, McGraw-Hill Education,
New York, USA, 2016.
|
|