|
Dec 04, 2024
|
|
|
|
CVF 2075 - Computer Investigative Law for Forensic Analysts Credits: 3 Hours/Week: Lecture None Lab None Course Description: This course presents the essential legal foundation for computer professionals managing or working in incident handling teams. Topics include: the legal constraints of information sharing, rules for voluntary disclosure, and response to government requests for information as well as the use of honey-pots, hack-back, and trace-back procedures as investigative strategies within the legal limitations of the information technology industry. Emphasis is placed on preserving and maintaining chain of custody protocols for computer evidence. MnTC Goals None
Prerequisite(s): None Corequisite(s): None Recommendation: None
Major Content
- Collecting evidence for trial chain of custody protocols
- Computer law - legal permissions and restrictions
- Defending computer networks
- Hacker law wiretapping and wireless networking
- International issues
- Internet service providers
- Investigative procedures using computers
- Law enforcement
- Minnesota law relating to information technology
Learning Outcomes At the end of this course students will be able to:
- work legally with upstream and downstream providers
- use honeypots, hack-back, and trace-back procedures as investigative strategies within the legal limitations of the information technology industry.
- preserve evidence integrity by maintaining chain of custody of protocols for computer evidence
- interpret and apply hacker law relating to wiretapping and wireless networking
- operate within the legal constraints of information sharing, voluntary disclosure, and response to government requests for information
Competency 1 (1-6) None Competency 2 (7-10) None Courses and Registration
Add to Portfolio (opens a new window)
|
|