George Mason University – Graduate Council Graduate Course Approval Form All courses numbered 500 or above must be submitted to the Graduate Council for final approval after approval by the sponsoring College, School or Institute. Graduate Council requires submission of this form for a new course or any change to existing courses. For a new course, please attach a copy of the syllabus and catalog description (with catalog credit format, e.g. 3:2:1). The designated representative of the College, School or Institute should forward the form along with the syllabus and catalog description, if required, as an email attachment (in one file) to the secretary of the Graduate Council. A printed copy of the form with signatures and the attachments should be brought to the Graduate Council meeting. Please complete the Graduate Course Coordinator Form if the proposed changes will affect other units. Note: Colleges, Schools or Institutes are responsible for submitting new or modified catalog descriptions (35 words or less, using catalog format) to Creative Services by deadlines outlined in the yearly Catalog production calendar. Please indicate: New____X___ Modify_______ Delete_______ Department/Unit: _Electrical and Computer Engineering_____ Course Subject/Number: CFRS 790_________ Submitted by: ____Jeremy Allnutt_______ Ext: _3969__________ Email: _jallnutt@gmu.edu_____________ Course Title: _____Advanced Computer Forensics________________________________________________________ Effective Term (New/Modified Courses only): _Spring 2009___ Credit Hours: (Fixed) _3__ (Var.) ______ to ______ Final Term (deleted courses only):____________ Grade Type (check one): __X__ _____ _____ Regular graduate (A, B, C, etc.) Satisfactory/No Credit only Special graduate (A, B, C, etc. + IP) Repeat Status*(check one): __X NR-Not repeatable ____ RD-Repeatable within degree ____ RT-Repeatable within term *Note: Used only for special topics, independent study, or internships courses Total Number of Hours Allowed: _______ Schedule Type Code(s): 1.__X_ LEC=Lecture SEM=Seminar STU=Studio INT=Internship IND=Independent Study 2.____ LAB=Lab RCT=Recitation (second code used only for courses with Lab or Rct component) Prereq _X__ Coreq ___ (Check one):______________________________________________________________ ____ CFRS 660, CFRS 661, and CFRS 663 ______________________________________________________ Note: Modified courses - review prereq or coreq for necessary changes; Deleted courses - review other courses to correct prereqs that list the deleted course. Description of Modification (for modified courses):____________________________________________________________________ Special Instructions (major/college/class code restrictions, if needed):____Minimum of 18 credit hours completed in the MS in Computer Forensics Program prior to registering______________________________________ Department/Unit Approval Signature: _________________________________________ Date: ___________ College/School Committee Approval Signature: __________________________________ Date: ___________ Graduate Council Approval Date: ____________ Provost Office Signature: ________________________________ George Mason University Graduate Course Coordination Form Approval from other units: Please list those units outside of your own who may be affected by this new, modified, or deleted course. Each of these units must approve this change prior to its being submitted to the Graduate Council for approval. Unit: Head of Unit’s Signature: Date: Unit: Head of Unit’s Signature: Date: Unit: Head of Unit’s Signature: Date: Unit: Head of Unit’s Signature: Date: Unit: Head of Units Signature: Date: Graduate Council approval: ______________________________________________ Date: ____________ Graduate Council representative: __________________________________________ Date: ____________ Provost Office representative: ____________________________________________ Date: ____________ Course Proposal Submitted to the Graduate Council by The Volgenau School of Information Technology and Engineering 1. COURSE NUMBER AND TITLE: CFRS 790 Advanced Computer Forensics (3:3:0) Course Prerequisites: CFRS 660, CFRS 661, and CFRS 663; minimum of 18 credit hours completed in the MS in Computer Forensics program prior to registration. Catalog Description: Provides the capstone course for the Master of Science in Computer Forensics program. To be taken in the last year prior to the completion of degree requirement, CFRS 790 will integrate the concepts and practices developed within the Computer Forensics program. Students will be exposed to case studies and will be required to conduct computer forensic investigations of digital media, intercepted packet switched data, and multi-source log information in order to successfully complete each case study. 2. COURSE JUSTIFICATION: Course Objectives: At the conclusion of this course, the student will be able to conduct a full computer forensic exam utilizing all of the tools and techniques and apply all of the processes and procedures presented in the computer forensic program. This will be accomplished through the use of case studies offered in a full computer forensic laboratory environment. Each case study will require research and forensic analysis resulting in a written report. For each case study, students will be selected to give oral presentations. Every student will be required to give at least two oral presentations. Course Necessity: Since the explosion of the Internet with the World Wide Web, our increasingly internetworkdependent society has been under attack by those who would subvert the Internet for political, economic, and/or personal gain. The field of network forensics represents how intercepted digital evidence is used to document, identify, and successfully prosecute those who would exploit computer networks. Viruses, trojans, worms, root kits, buffer overflows, and other malicious code permeate society, and network forensics provides the tools and techniques to determine and document what happened. This course will coalesce and bring together what is needed for today’s computer forensic examiner. Course Relationship to Existing Programs: No other program at George Mason University offers a course similar to CFRS 790. Course Relationship to Existing Courses: CFRS 790 builds on the work laid out in CFRS 660 (Network Forensics), CFRS 661 (Digital Media Forensics), and CFRS 663 (663 Intrusion Detection and Forensics). These three courses were previously taught as TCOM 660, TCOM 661, and TCOM 662, respectively. 3. APPROVAL HISTORY: ECE Department Date: IT&E Graduate Committee Date: IT&E Dean Date: 4. SCHEDULING AND PROPOSED INSTRUCTORS: Semester of Initial Offering: Fall 2010 Proposed Instructors: Proposed Instructors: Dr. Anne Marchant, Dr. Jeremy Allnutt, Mr. Robert Osgood, Dr. Aleksander Lazarevich, Dr. Thomas Shackelford, and other suitably qualified faculty. 5. TENTATIVE SYLLABUS: See below (a) Syllabus Week 1 Course overview: Introduction to the course and review of computer forensic tools and techniques. Case Study 1 is presented for discussion and evaluation. Week 2 Case Study 1 discussion. Application of tools and techniques to Case Study 1 examined. Week 3 Case Study 1 due. Case Study 1 presentations given. Case Study 2 is presented for discussion and evaluation. Week 4 Case Study 2 discussion. Application of tools and techniques to Case Study 2 examined. Week 5 Case Study 2 due. Case Study 2 presentations given. Case Study 3 is presented for discussion and evaluation Week 6 Case Study 3 discussion. Application of tools and techniques to Case Study 3 examined. Week 7 Case Study 3 due. Case Study 3 presentations given. Case Study 4 is presented for discussion and evaluation Week 8 Case Study 4 discussion. Application of tools and techniques to Case Study 4 examined Week 9 Case Study 4 due. Case Study 4 presentations given. Case Study 5 is presented for discussion and evaluation Week 10 Case Study 5 discussion. Application of tools and techniques to Case Study 5 examined Week 11 Case Study 5 due. Case Study 5 presentations given. Case Study 6 is presented for discussion and evaluation Week 12 Case Study 6 discussion. Application of tools and techniques to Case Study 6 examined Week 13 Case Study 6 due. Case Study 6 presentations given. Case Study 7 is presented for discussion and evaluation Week 14 Case Study 7 discussion. Application of tools and techniques to Case Study 7 examined Week 15 Case Study 7 due. Case Study 7 presentations given. (b) Required Reading and Reference Material There will be no required text per se; however students will be responsible for research that will come from the following sources, as a minimum: Real Digital Forensics; Jones, Bejtlich, and Rose; Addison Wesley; ISBN 0321240693 Wireshark & Ethereal; 1st Edition, Orebaugh, Ramirez, Beale; Syngress; ISBN 1597490733 Mastering Windows Network Forensics and Investigation; Anson, Bunting; Sybex; 9780470097625 Incident Response & Computer Forensics; Mandia, Prosise, Pepe, Osborne; ISBN 007222696X Guide to Computer Forensics & Invesgtigations Second Edition; Nelson, Phillips, Enfinger, Stuart; Thomson Course Technology; ISBN 0-619-21706-5 File System Forensics Analysis; Brian Carrier; Addison Wesley; ISBN 0-321-26817-2 (c) Student Evaluation Criteria Case Studies (Written Assignments): 80% Oral Presentations: 20% Note: An example of a case study would be similar to that shown below. Case Study: Opto-Medtronics Inc. (Opto-Med) is a publicly traded company specializing in optics used in the medical industry. Unknown to most people, Opto-Med, has a division located in Vienna, Virginia that is dedicated to the U. S. Defense Department. Specifically, the Spatial Support Division develops, builds, and maintains the optics that is equipped on Predator and Global Hawk surveillance drones. These optical systems are the most sophisticated in the world and classified Top Secret. All development and manufacturing work is performed in a secure facility (SCIF) at Vienna, Virginia. During a routine security sweep of the SCIF, security personnel found a small digital camera under some papers in a work area. Personal cameras of any kind are forbidden in the SCIF. The security personnel reviewed the contents of the camera which revealed numerous photos of the DoD optics manufacturing processes. The security personnel in their zeal to report this incident to the Chief Security Officer (CSO) somehow damaged the camera. You are a computer forensics examiner working for Mason-Forensics (Ma-For), a small computer company based in Fairfax, Virginia that recently entered into a contract with Opto-Med to provide computer forensic services. You and your fellows examiners are former civilian government and military and all possess the appropriate clearances. The CSO contacts you and requests that you respond immediately to the Vienna, Virginia office. The CSO provides the damaged camera to you and requests that you: -Recover the data that is located on the SD card inside the camera -Identify the owner of the camera if possible. Deliverables: 1) Prepare and engagement letter to be signed by the CSO that: - Specifically identifies what is required of you - Specifically identify what is required of Opto-Med 2) Prepare a chain of custody for items provided to you by Opto-Med 3) Prepare a list of investigative steps that you will take in this matter to include: -What non-technical investigative steps do you will take -What technical investigative steps you will take