Skip to main content

IT-Forensik

every

(engl. IT-Forensics )

Modulnummer: FIN-INF-110384
Link zum LSF: LSF
Verantwortung: Prof. Dr. Jana Dittmann
Dozent:in: Prof. Dr. Jana Dittmann
Lehrveranstaltungen:
  • Vorlesung IT-Forensik
  • Übung IT-Forensik
Verwendbarkeit: - B.Sc. INF: Informatik - Wahlpflicht
- B.Sc. INF: Studienprofil: Forensik Design
- B.Sc. CV: Informatik - Wahlpflicht
- B.Sc. INGINF: Informatik - Wahlpflicht
- B.Sc. WIF: Gestalten und Anwenden - Wahlpflicht
- B.Sc. INF (bilingual): Informatik - Wahlpflicht

Kürzel

IFOR

CP

5

Semester

every

Fachsem.

None

Dauer

1 Semester

Sprache

deutsch

Niveau

Bachelor

Angestrebte Lernergebnisse:
The students ...

  • are able to understand the requirements and possible solutions for an application example based on a selected technical issue relating to IT forensics
  • understand and implement the process model of an IT forensic investigation
  • can apply forensic methods and tools to an example
  • can evaluate and assess the results of a forensic investigation
  • can present the results in a presentation and take part in a discussion
  • can recognize and reflect on challenges in teamwork
  • can understand IT forensics as a strategic and operational task in an ICT system and design and apply selected mechanisms

Inhalt:

  • Introduction and basics on selected technical issues relating to cyber security and IT forensic investigations:
  • Data-centric procedure model with information, data and phases for IT forensic investigations,
  • Application to selected examples
  • Security objectives and design requirements in IT forensics
  • Selected examples of evidence search, collection and evaluation according to best practices
  • Basics for the preparation, documentation and presentation of investigation results
  • Repetition: basics of teamwork, lecture is project-oriented

Arbeitsaufwand:
150h = 56h attendance + 94h independent work

Prüfungsvorleistungen: Studien-/Prüfungsleistungen: Lehrform / SWS:

Report

  • The report comprises an independent and in-depth written examination of a question from the context of the course, including and targeted critical evaluation of relevant literature, as well as the presentation of one's own work, also in comparison in a team, and the communication and evaluation of one's own results in an oral presentation and in the subsequent discussion in the team.
  • The work must be submitted in writing.

  • Lecture (2 SWS)
  • Exercise (2 SWS)

Voraussetzungen nach Prüfungsordnung: Empfohlene Voraussetzungen:

none

  • Grundlagen Algorithmen und Datenstrukturen,
  • Grundlagen der theoretischen Informatik,
  • Grundlagen der technischen Informatik,
  • Sichere Systeme

Medienformen: Literatur:



Hinweise:
https://omen.cs.uni-magdeburg.de/itiamsl/deutsch/lehre/index.html