Forensic Analysis of Information and Communication System
Abbreviation: FOANAIKS Load: 30(L) + 0(E) + 15(LE) + 15(S) + 0(FLE) + 0(PEE)
Lecturers in charge: dr. sc. Dragan Peraković
Lecturers: dr. sc. Ivan Cvitić ( Seminar, Laboratory exercises )
dr. sc. Siniša Husnjak ( Laboratory exercises, Seminar )
Course description: Digital society, electronic crime, cybercrime, digital forensics, forensics of information and communication systems, the terms "evidence" and "digital evidence". Digital forensics as a science. Detection of electronic digital evidence in the "static" and "dynamic" state of the observed system. Methodology of conducting forensic analysis. Forensic analysis of communications in wired and wireless communication systems. Elements of identification and forensic analysis of user devices. Hardware and software tools for digital forensic analysis. Commercially available digital forensic analysis tools and open source tools. Digital evidence of network and user equipment. Data extraction, storage and labeling of collected evidence. Non-invasive, invasive and destructive data extraction methods. Making a forensic copy. Securing the system against accidental writing, deletion, or modification. Methodology of time-space analysis on digital evidence. Evidence chain of custody. Maintaining documentation during forensic analysis and creating reports. Legislation for conducting digital forensics. Forensic analysis of vehicles, drones, IoT and unconventional devices.
Lecture languages: hr
Compulsory literature:
1. Peraković, D.: Autorizirana predavanja (dostupno putem sustava Merlin
2. National Institute of Standards and Technology: Guidelines on Mobile Device Forensics, U.S Department of Commerce, 2014.
3. Husnjak, S., Cvitić, I.: Autorizirani materijali za laboratorijske vježbe (dostupno putem sustava Merlin)
Recommended literature:
4. Casey, E.: Handbook of Digital Forensics and Investigation, Elsevier, Burlington, USA, 2010.
5. Watson, D. L., Jones, A.: Digital Forensics Processing and Procedures: Meeting the Requirements of ISO 17020, ISO 17025, ISO 27001 and Best Practice Requirements, Syngress Publishing, USA, 2013.
6. Robinson, M. K., Digital Forensics Workbook: Hands-on Activities in Digital Forensics, CreateSpace Independent Publishing Platform, North Charleston, USA, 2015.
7. Bommisetty, S., Tamma, R., Mahalik, H.: Practical Mobile Forensics, Packt Publishing, Birmingham, UK, 2016.
8. Sammons, J.: Digital Forensics: Threatscape and Best Practices, Syngress Publishing, USA, 2015.
9. Tahiri, S.: Mastering Mobile Forensics, Packt Publishing, Birmingham, UK, 2016.
10. Philipp, A., Cowen, D., Davis, C.: Hacking Exposed - Computer Forensics, McGraw Hill, New York, USA, 2010.
11. Reiber, L.: Mobile Forensic Investigations: A Guide to Evidence Collection, Analysis, and Presentation, McGraw-Hill Education, New York, USA, 2016.
Legend
L - Lectures
E - Exercises
LE - Laboratory exercises
S - Seminar
FLE - Practical foreign language exercises
PEE - Physical education excercises
* - Not graded