Skip Navigation
 

ISSC456 - Digital Forensics: Investigating Wireless Networks and Devices

Course Details

Course Code: ISSC456 Course ID: 4412 Credit Hours: 3 Level: Undergraduate

The growth of wireless networking technologies has given rise to many security issues. Wireless technology has become popular because of its convenience and low cost. This course pertains to the study of Computer Forensics Students will be introduced to advanced techniques in computer investigation and analysis with interest in generating potential legal evidence. An overview of cybercrime and security will be addressed by explaining the basic security procedures and will include discussions of the various security threats that today’s users face. This course will prepare students to gather all necessary information and evidence to support prosecution in a court of law. This course will examine wireless networks and devices and will discuss how to investigate wireless attacks, as well as PDA, iPod, iPhone, iPad, and Blackberry forensics. Current literature will be examined on such topics.





Course Schedule

Registration Dates Course Dates Session Weeks
11/26/18 - 05/03/19 05/06/19 - 06/30/19 Spring 2019 Session I 8 Week session
01/28/19 - 06/28/19 07/01/19 - 08/25/19 Summer 2019 Session B 8 Week session
03/25/19 - 08/30/19 09/02/19 - 10/27/19 Summer 2019 Session D 8 Week session

Current Syllabi

The successful student will fulfill the following learning objectives:

  1. Discuss wireless attacks such as passive and active attacks
  2. Gain an understanding of network forensics in a wireless environment
  3. Become familiar with PDA, iPod, iPhone, iPad, and Blackberry forensics
  4. Identify wireless devices such as routers, access points, modems and repeaters
  5. Evaluate security procedures and secure access while working on the Internet
  6. Discuss the importance of search warrants and chain of custody in a forensic investigation
  7. Discuss wireless connections and fields of strengths
  8. Analyze the wireless hardware and software tools used in mobile forensics

The grading will be based on four weekly assignments, eight weekly Forum postings, five weekly labs, an individual project paper with topic, outline, and presentation, and two case studies.

  1. There will be four assignments (5% each) counting a total of 20% of the final grade. The assignments will follow each of the major milestones of the course. These assignments will be problems or questions from the text. They are a combination of Lesson Reviews and Lesson Activities and/or Labs. They are selected to provide the student with information to understand the concepts discussed. Assignments should be prepared in Microsoft Word using the following file naming convention: ISSC456_Week#Assignment_First Initial_Last.doc(x) (where the # is the week number) and submit the file in this assignments’ area and uploaded into the student folder by the due date. Any necessary Visio diagrams should be incorporated within the Word document as part of the document. Bulk uploading of assignments is not accepted. This means that you cannot upload more than one assignment at a time unless prior permission is granted.
  2. There will be eight weekly Forum postings you will need to respond to. Answers should be 3-4 paragraphs with a topic sentence that restates the question and supporting sentences using the terms, concepts, and theories from the required readings. Each answer should be a minimum of 300 words (about 7 good sentences). You may attack, support or supplement other students’ answers using the terms, concepts and theories from the required readings. All responses should be a courteous paragraph that contains a topic sentence with good supporting sentences and should be a minimum of 150 words. You may respond multiple times with a continuous discussion with points and counter points. The key requirement is to express your idea and then support your position using the terms, concepts and theories from the required readings to demonstrate to me that you understand the material. The Forum postings will count as 20% (2.5% for each discussion posting) of the final grade.
  3. There will be a project paper (10%) with topic selection (1%), outline (3%), and presentation (6%), and two case studies (20%) throughout the session, counting as 40% total of the final grade. Please practice using the same file naming convention established in this class for each of these files.
  4. There will be 5 labs (4% each) a total 20% of the final grade. The labs will be online hands-on labs using the necessary tools required in digital forensics.

All assignments, Forum question responses, and the labs are due by 11:55 Eastern Time Sunday of the week assigned.

Project Paper (Topic, Outline, PowerPoint Presentation, and Paper) Topics:
Week 2: Topic selection due

Week 4: Outline due

Week 6: PowerPoint Presentation due

Week 7: Paper due

Details of Project Paper (10%): You must include at least ten references.
Prepare a 10 page paper in Microsoft Word (counts as 10% of the final grade) in APA format (see writing expectations in the Policies section) (350 words per page). The paper should be approximately 3500 words excluding the title page content and the references page content.

You may use resources from the APUS Online Library, any library, government library, or any peer-reviewed reference (Wikipedia and any other publicly-reviewed source is not an acceptable). The paper must be at least 10 pages double-spaced, 1" margin all around, black 12 point font (Times New Roman or Arial) with correct citations of all utilized references/sources, (pictures, graphics, etc. are extra - allowed but do not count toward the minimum page count). The title page and references are also required but don't count in the minimum page count. A minimum of 10 scholarly references are required.

The paper will be subjected to checking against plagiarism. The paper must follow acceptable originality criteria (no more than 15% max total, and 2% per individual source match are allowed).

Save the File as separate APA formatted document

Here are the originality report requirements:

  1. The originality report must be less than 15% match
  2. No single source shall be above 2%
  3. You must submit the originality report with your paper to your AMU classroom

If you don't follow these three requirement instructions you will get a 0 for your project paper assignment. I will give you the chance to rework your papers until an acceptable level of match is achieved.

At the end of the class, if you have not submitted your paper to turnitin.com, I will submit it anyways even after you'd get a 0, to see the level of plagiarism found, if any. If turnitin.com matches more than 40% you will be subject to academic reporting.

NameGrade %
Assignments 20.00 %
Wk1 Assignment 5.00 %
Wk3 Assignment 5.00 %
Wk4 Assignment 5.00 %
Wk8 Assignment 5.00 %
Case Study 15.00 %
Wk3 Case Study 7.50 %
Wk5 Case Study 2.50 %
Forum 20.00 %
Forum 1 2.50 %
Forum 2 2.50 %
Forum 3 2.50 %
Forum 4 2.50 %
Forum 5 2.50 %
Forum 6 2.50 %
Forum 7 2.50 %
Forum 8 2.50 %
Labs 15.00 %
Wk2 Lab 1 3.00 %
Wk3 Lab 2 3.00 %
Wk4 Lab 3 3.00 %
Wk5 Lab 4 3.00 %
Wk6 Lab 5 3.00 %
Project Paper Topic 1.00 %
Wk2 Project Paper Topic 1.00 %
Project Paper Outline 3.00 %
Wk4 Project Paper Outline 3.00 %
Project Powerpoint 6.00 %
Wk6 Project PowerPoint Presentation 6.00 %
Project Paper 10.00 %
Wk7 Project Paper 10.00 %
Quizzes 10.00 %
Week 1 and 2 Quiz 2.50 %
Week 3 and 4 Quiz 2.50 %
Week 5 and 6 Quiz 2.50 %
Week 7 and 8 Quiz 2.50 %

Web-based Readings – if these links are no longer available, conduct a web search on the topics

Gonzales, J., & Hung, J. (2010). Mobile Device Forensics: A Brave New World? Retrieved from http://www.strozfriedberg.com/files/Publication/224ca0f8-5101-4e1b-938a-4d4b128ad5ed/Presentation/PublicationAttachment/ef4a28ad-ff7d-4014-aea8-80505789b86c/Mobile%20Device%20Forensics_%20A%20Brave%20New%20World.pdf

Levinson, A., Stackpole, B., & Johnson, D. (2011, January). Third Party Application Forensics on Apple Mobile Devices. Retrieved from http://www.computer.org/csdl/proceedings/hicss/2011/4282/00/10-04-06.pdf

NIST (2012). Mobile forensic guidelines and reference material. Retrieved from http://csrc.nist.gov/publications/nistpubs/800-101/SP800-101.pdf; http://csrc.nist.gov/publications/nistir/ir7617/nistir-7617.pdf

Siles, R. (2010). Wireless Forensics: Tapping the Air. Retrieved from http://www.symantec.com/connect/articles/wireless-forensics-tapping-air-part-one, http://www.symantec.com/connect/articles/wireless-forensics-tapping-air-part-two

Turnbull, B., Slay, J. (2007). Wireless Forensic Analysis Tools for Use in the Electronic Evidence Collection Process. Retrieved from http://www.computer.org/csdl/proceedings/hicss/2007/2755/00/27550267a.pdf

Software Requirements

  1. Microsoft Office (MS Word, MS Excel, MS PowerPoint)
  2. Adobe Acrobat Reader (Click here for free download)

Selected Bibliography

Computer Forensics: Investigating Wireless Networks and Devices (2010). Published by: Cengage Learning. ISBN: 1435483537

Wireless Safety: Wireless5 Safety Certification. (2010). Published by: Cengage Learning. ISBN: 1435483766

Gonzales, J., & Hung, J. (2010). Mobile Device Forensics: A Brave New World? Retrieved from http://www.strozfriedberg.com/files/Publication/224ca0f8-5101-4e1b-938a-4d4b128ad5ed/Presentation/PublicationAttachment/ef4a28ad-ff7d-4014-aea8-80505789b86c/Mobile%20Device%20Forensics_%20A%20Brave%20New%20World.pdf

Levinson, A., Stackpole, B., & Johnson, D. (2011, January). Third Party Application Forensics on Apple Mobile Devices. Retrieved from http://www.computer.org/csdl/proceedings/hicss/2011/4282/00/10-04-06.pdf

NIST (2012). Mobile forensic guidelines and reference material. Retrieved from http://csrc.nist.gov/publications/nistpubs/800-101/SP800-101.pdf; http://csrc.nist.gov/publications/nistir/ir7617/nistir-7617.pdf

Siles, R. (2010). Wireless Forensics: Tapping the Air. Retrieved from http://www.symantec.com/connect/articles/wireless-forensics-tapping-air-part-one, http://www.symantec.com/connect/articles/wireless-forensics-tapping-air-part-two

Turnbull, B., Slay, J. (2007). Wireless Forensic Analysis Tools for Use in the Electronic Evidence Collection Process. Retrieved from http://www.computer.org/csdl/proceedings/hicss/2007/2755/00/27550267a.pdf

Book Title:Various resources from the APUS Library & the Open Web are used. Links provided inside the classroom in the Lessons section.
Author: No Author Specified

Previous Syllabi

Not current for future courses.