IDENTIFYING DATA 2019_20
Subject (*) COMPUTER FORENSICS Code 17685102
Study programme
Computer Security Engineering and Artificial Intelligence (2016)
Cycle 2nd
Descriptors Credits Type Year Period
4.5 Compulsory First 1Q
Language
Anglès
Department Computer Engineering and Mathematics
Coordinator
DUCH GAVALDÀ, JORDI
E-mail jordi.duch@urv.cat
hatem.abdellatif@urv.cat
Lecturers
DUCH GAVALDÀ, JORDI
ABDELLATIF FATAHALLAH IBRAHIM MAHMOUD, HATEM
Web
General description and relevant information This course presents a new perspective of information security based on the analysis of computer systems and malicious code . Computer forensics aims to collect evidence to help us understand ( and document if necessary) an attack on a computer system.

Competences
Type A Code Competences Specific
 A1 Integrate the fundamental technology, applications, services and systems of Computer Security and Artificial Intelligence,in a broader, multidisciplinary context.
 A4 Design, develop, manage and evaluate mechanisms to certify and guarantee security in handling information and access to it in a local or distributed processing system.
 G1 Project, calculate and design products, processes and installations in the areas of Computer Security and Artificial Intelligence
 G2 Perform mathematical modelling, calculation and simulation in company technology and engineering centres, particularly in tasks of research, development and innovation in the areas of Computer Security and Artificial Intelligence
Type B Code Competences Transversal
 CT2 Forming opinions on the basis of the efficient management and use of information
 CT3 Solve complex problems critically, creatively and innovatively in multidisciplinary contexts.
 CT4 Work in multidisciplinary teams and in complex contexts.
 CT7 Apply ethical principles and social responsibility as a citizen and a professional.
Type C Code Competences Nuclear

Learning outcomes
Type A Code Learning outcomes
 A1 Analyse the problems and their causes from a global focus in the medium and long term.
 A4 Analyse the security of computer systems and the origin and impact of attacks and intrusions to these systems.
 G1 Integrate theoretical knowledge into the realities to which it may apply.
 G2 Apply the techniques learned in a specific context.
Type B Code Learning outcomes
 CT2 Manage information and knowledge by making efficient use of the information technologies.
 CT3 Recognise the situation as a problem in a multidisciplinary, research or professional environment, and take an active part in finding a solution.
 CT4 Participate in the group in a good working environment and help to solve problems.
 CT7 Apply ethical and socially responsible principles as a citizen and a professional.
Type C Code Learning outcomes

Contents
Topic Sub-topic
1. Attacks and Intrusions
2. Management of security incidents
3. Forensic analysis: steps and methodology
4. IT forensic assessment

Planning
Methodologies  ::  Tests
  Competences (*) Class hours
Hours outside the classroom
(**) Total hours
Introductory activities
1 1.5 2.5
Lecture
A1
A4
G1
CT2
27 45.5 72.5
IT-based practicals in computer rooms
A1
A4
G1
G2
CT4
10 15 25
Presentations / oral communications
CT2
CT7
1 1.5 2.5
Personal attention
2 0 2
 
Extended-answer tests
CT3
2 2 4
Short-answer objective tests
CT2
CT7
2 2 4
 
(*) On e-learning, hours of virtual attendance of the teacher.
(**) The information in the planning table is for guidance only and does not take into account the heterogeneity of the students.

Methodologies
Methodologies
  Description
Introductory activities Presentació de les eines i conceptes bàsics a utilitzar en l'assignatura
Lecture Presentació dels continguts
IT-based practicals in computer rooms Realització d'exercicis que treballen els continguts que es van presentant al llarg del curs
Presentations / oral communications Presentació de les pràctiques realitzades
Personal attention L'alumne es pot posar en contacte amb el professor en horaris de consulta o via correu electrònic

Personalized attention
Description
L'alumne es pot posar en contacte amb el professor en les hores de consulta o bé a partir de correu electrònic

Assessment
Methodologies Competences Description Weight        
IT-based practicals in computer rooms
A1
A4
G1
G2
CT4
Exercicis que es van desenvolupant al llarg del curs a les sessions de laboratori 40
Presentations / oral communications
CT2
CT7
Presentació de les pràctiques del curs 10
Short-answer objective tests
CT2
CT7
Prova escrita sobre els conceptes treballats al llarg del l'assignatura 30
Extended-answer tests
CT3
Prova escrita sobre la practica desenvolupada 20
Others  
 
Other comments and second exam session

La segona convocatòria suposa acabar i superar les parts pendents en la primera.

Durant els exàmens no es podrà fer ús de cap dispositiu de comunicació i transmissió de dades. El no compliment d'aquest punt suposa automàticament la no superació de l'examen.


Sources of information

Basic Warren G. Kruse II, Jay G. Heiser, Computer Forensics: Incident Response Essentials, Addison Wesley, 2001
Bill Nelson, Amelia Phillips, Christopher Steuart, Guide to Computer Forensics and Investigations, Cengage Learning, 4t Edition, 2009

Complementary

Recommendations


(*)The teaching guide is the document in which the URV publishes the information about all its courses. It is a public document and cannot be modified. Only in exceptional cases can it be revised by the competent agent or duly revised so that it is in line with current legislation.