en-gb
2014-03-05T09:29:00.000Z
2014-03-05T09:31:11.000Z
2014-09-18T14:33:00.000Z
2014-10-08T13:30:19.000Z
2015-04-23T10:31:54.000Z
2015-04-28T14:43:00.000Z
2015-04-28T15:01:45.000Z
2015-07-29T18:01:45.000Z
2015-08-12T12:31:29.000Z
2015-09-09T15:31:50.000Z
2015-09-29T08:36:00.000Z
2015-09-29T09:01:16.000Z
2016-01-07T12:14:16.000Z
2016-01-08T14:54:00.000Z
2016-01-08T15:01:58.000Z
2016-01-11T13:02:51.000Z
2016-02-26T13:02:34.000Z
2016-03-24T09:54:00.000Z
2016-03-24T10:03:05.000Z
Copyright © 2013 The Open University
Copyright © 2015 The Open University
Copyright © 2016 The Open University
Licensed under a Creative Commons Attribution - NonCommercial-ShareAlike 2.0 Licence - see http://creativecommons.org/licenses/by-nc-sa/2.0/uk/ - Original copyright The Open University
Introduction to computer forensics and investigations
<p>Computer forensics is an exciting area, often glamorised (and its capabilities exaggerated) in films and television shows like <i>CSI</i>, <i>NCIS</i> and <i>Spooks</i>. You may have heard the area described using slightly different words, each of which may bring to mind different activities.</p><div class=" oucontent-activity oucontent-s-heavybox1 oucontent-s-box "><div class="oucontent-outer-box"><h3 class="oucontent-h3 oucontent-heading oucontent-nonumber"><span lang="EN-GB" xml:lang="EN-GB">Activity 1</span></h3><div class="oucontent-inner-box"><div class="oucontent-saq-question"><p>Write down all the topics that you can think of that might be encompassed by the term ‘computer forensics and investigations’.</p></div>
<div class="oucontent-saq-discussion"><h4 class="oucontent-h4">Discussion</h4><p>Here are some of the names we thought of; your list should include at least some of these:</p><ul class="oucontent-bulleted"><li>computer forensics</li><li>forensic computing</li><li>forensic science</li><li>digital forensics</li><li>network forensics</li><li>ICT forensics</li><li>forensic investigations</li><li>digital investigations</li><li>business continuity</li><li>incident response</li><li>computer policing</li><li>high-tech crime investigation</li><li>computer security</li><li>incident management.</li></ul></div></div></div></div><p>Whether you have come from an area where you have acquired knowledge of ‘the nuts and bolts’ of how computers operate (but have had very little experience of investigations or legal aspects), or come from a management, legal, or investigatory background (but have little practical knowledge of the insides of computers and software) then this free course, <i>Introduction to computer forensics and investigations</i>, is for you. Part of the interest and excitement of the area of digital investigations is that it is multi-disciplinary and there are always new things to learn. This course will be quite a challenge but we hope you will find it stimulating and exciting, as well as of considerable practical value.This OpenLearn course includes adapted extracts from an Open University course which is no longer available to new students. If you found this interesting you could explore more free Computing courses or view the range of currently available OU Computing & IT courses.</p><div class="oucontent-box oucontent-s-hollowbox2 oucontent-s-box oucontent-s-noheading "><div class="oucontent-outer-box"><div class="oucontent-inner-box"><p>The Open University is conducting a survey investigating how people use the free educational content on our OpenLearn website. The aim is to provide a better free learning experience for everyone. So if you have 10 minutes to spare, we’d be delighted if you could take part and <span class="oucontent-linkwithtip"><a class="oucontent-hyperlink" href="https://www.surveymonkey.com/r/OL_course">tell us what you think</a></span></p><p>Please note this will take you out of OpenLearn, we suggest you open this in a new tab by right clicking on the link and choosing ‘Open Link in new Tab’.</p></div></div></div>
<p>Computer forensics is an exciting area, often glamorised (and its capabilities exaggerated) in films and television shows like <i>CSI</i>, <i>NCIS</i> and <i>Spooks</i>. You may have heard the area described using slightly different words, each of which may bring to mind different activities.</p><div class=" oucontent-activity oucontent-s-heavybox1 oucontent-s-box "><div class="oucontent-outer-box"><h3 class="oucontent-h3 oucontent-nonumber"><span lang="EN-GB" xml:lang="EN-GB">Activity 1</span></h3><div class="oucontent-inner-box"><div class="oucontent-saq-question"><p>Write down all the topics that you can think of that might be encompassed by the term ‘computer forensics and investigations’.</p></div>
<div class="oucontent-saq-discussion"><h4 class="oucontent-h4">Discussion</h4><p>Here are some of the names we thought of; your list should include at least some of these:</p><ul class="oucontent-bulleted"><li>computer forensics</li><li>forensic computing</li><li>forensic science</li><li>digital forensics</li><li>network forensics</li><li>ICT forensics</li><li>forensic investigations</li><li>digital investigations</li><li>business continuity</li><li>incident response</li><li>computer policing</li><li>high-tech crime investigation</li><li>computer security</li><li>incident management.</li></ul></div></div></div></div><p>Whether you have come from an area where you have acquired knowledge of ‘the nuts and bolts’ of how computers operate (but have had very little experience of investigations or legal aspects), or come from a management, legal, or investigatory background (but have little practical knowledge of the insides of computers and software) then this unit is for you. Part of the interest and excitement of the area of digital investigations is that it is multi-disciplinary and there are always new things to learn. This unit will be quite a challenge but we hope you will find it stimulating and exciting, as well as of considerable practical value.</p><p>This study unit is an adapted extract from the Open University course M263 <i>Building blocks of software</i>, which is no longer taught by the University. If you want to study formally with us, you may wish to explore other courses we offer in this <span class="oucontent-linkwithtip"><a class="oucontent-hyperlink" href="http://www3.open.ac.uk/study/undergraduate/qualification/computing-and-it/index.htm">subject area</a></span>.</p>
<p>Computer forensics is an exciting area, often glamorised (and its capabilities exaggerated) in films and television shows like <i>CSI</i>, <i>NCIS</i> and <i>Spooks</i>. You may have heard the area described using slightly different words, each of which may bring to mind different activities.</p><div class=" oucontent-activity oucontent-s-heavybox1 oucontent-s-box "><div class="oucontent-outer-box"><h3 class="oucontent-h3 oucontent-heading oucontent-nonumber"><span lang="EN-GB" xml:lang="EN-GB">Activity 1</span></h3><div class="oucontent-inner-box"><div class="oucontent-saq-question"><p>Write down all the topics that you can think of that might be encompassed by the term ‘computer forensics and investigations’.</p></div>
<div class="oucontent-saq-discussion"><h4 class="oucontent-h4">Discussion</h4><p>Here are some of the names we thought of; your list should include at least some of these:</p><ul class="oucontent-bulleted"><li>computer forensics</li><li>forensic computing</li><li>forensic science</li><li>digital forensics</li><li>network forensics</li><li>ICT forensics</li><li>forensic investigations</li><li>digital investigations</li><li>business continuity</li><li>incident response</li><li>computer policing</li><li>high-tech crime investigation</li><li>computer security</li><li>incident management.</li></ul></div></div></div></div><p>Whether you have come from an area where you have acquired knowledge of ‘the nuts and bolts’ of how computers operate (but have had very little experience of investigations or legal aspects), or come from a management, legal, or investigatory background (but have little practical knowledge of the insides of computers and software) then this free course, <i>Introduction to computer forensics and investigations</i>, is for you. Part of the interest and excitement of the area of digital investigations is that it is multi-disciplinary and there are always new things to learn. This course will be quite a challenge but we hope you will find it stimulating and exciting, as well as of considerable practical value.This OpenLearn course includes adapted extracts from an Open University course which is no longer available to new students. If you found this interesting you could explore more free Computing courses or view the range of currently available OU Computing & IT courses.</p><p>This OpenLearn course provides a sample of Postgraduate level study in <span class="oucontent-linkwithtip"><a class="oucontent-hyperlink" href="http://www.open.ac.uk/postgraduate/qualifications/f04?LKCAMPAIGN=ebook_&MEDIA=ou">Mathematics</a></span>.</p>
<p>
</p><p>Computer forensics is an exciting area, often glamorised (and its capabilities exaggerated) in films and television shows like <i>CSI</i>, <i>NCIS</i> and <i>Spooks</i>. You may have heard the area described using slightly different words, each of which may bring to mind different activities.</p><div class=" oucontent-activity oucontent-s-heavybox1 oucontent-s-box "><div class="oucontent-outer-box"><h3 class="oucontent-h3 oucontent-heading oucontent-nonumber"><span lang="EN-GB" xml:lang="EN-GB">Activity 1</span></h3><div class="oucontent-inner-box"><div class="oucontent-saq-question"><p>Write down all the topics that you can think of that might be encompassed by the term ‘computer forensics and investigations’.</p></div>
<div class="oucontent-saq-discussion"><h4 class="oucontent-h4">Discussion</h4><p>Here are some of the names we thought of; your list should include at least some of these:</p><ul class="oucontent-bulleted"><li>computer forensics</li><li>forensic computing</li><li>forensic science</li><li>digital forensics</li><li>network forensics</li><li>ICT forensics</li><li>forensic investigations</li><li>digital investigations</li><li>business continuity</li><li>incident response</li><li>computer policing</li><li>high-tech crime investigation</li><li>computer security</li><li>incident management.</li></ul></div></div></div></div><p>Whether you have come from an area where you have acquired knowledge of ‘the nuts and bolts’ of how computers operate (but have had very little experience of investigations or legal aspects), or come from a management, legal, or investigatory background (but have little practical knowledge of the insides of computers and software) then this free course, <i>Introduction to computer forensics and investigations</i>, is for you. Part of the interest and excitement of the area of digital investigations is that it is multi-disciplinary and there are always new things to learn. This course will be quite a challenge but we hope you will find it stimulating and exciting, as well as of considerable practical value.This OpenLearn course includes adapted extracts from an Open University course which is no longer available to new students. If you found this interesting you could explore more free Computing courses or view the range of currently available OU Computing & IT courses.
</p><div class="oucontent-box oucontent-s-heavybox1 oucontent-s-box "><div class="oucontent-outer-box"><h3 class="oucontent-h3 oucontent-heading oucontent-nonumber">Enrol on OpenLearn to gain a record of achievement</h3><div class="oucontent-inner-box"><p>If you would like to gain a record of achievement, you can study this free course on OpenLearn. Once you set up a free Open University account and enrol on this course, you can track your progress in MyOpenLearn. When you’ve finished you can print off the free <b>activity record</b> to demonstrate your learning.</p><p>Go to the course on OpenLearn:
<span class="oucontent-linkwithtip"><a class="oucontent-hyperlink" href="http://www.open.edu/openlearn/science-maths-technology/computing-and-ict/introduction-computer-forensics-and-investigations/content-section-0">www.open.edu/<span class="oucontent-hidespace"> </span>openlearn/<span class="oucontent-hidespace"> </span>science-maths-technology/<span class="oucontent-hidespace"> </span>computing-and-ict/<span class="oucontent-hidespace"> </span>introduction-computer-forensics-and-investigations/<span class="oucontent-hidespace"> </span>content-section-0</a></span></p></div></div></div><div class="oucontent-box oucontent-s-hollowbox2 oucontent-s-box oucontent-s-noheading "><div class="oucontent-outer-box"><div class="oucontent-inner-box"><p>The Open University is conducting a survey investigating how people use the free educational content on our OpenLearn website. The aim is to provide a better free learning experience for everyone. So if you’re a regular user of OpenLearn and have 10 minutes to spare, we’d be delighted if you could take part and <a class="oucontent-hyperlink" href="https://www.surveymonkey.com/s/9G5JS2Y">tell us what you think</a>. Please note this will take you out of OpenLearn, we suggest you open this in a new tab by right clicking on the link and choosing open in a new tab.</p></div></div></div>
<p>Computer forensics is an exciting area, often glamorised (and its capabilities exaggerated) in films and television shows like <i>CSI</i>, <i>NCIS</i> and <i>Spooks</i>. You may have heard the area described using slightly different words, each of which may bring to mind different activities.</p><div class=" oucontent-activity oucontent-s-heavybox1 oucontent-s-box "><div class="oucontent-outer-box"><h3 class="oucontent-h3 oucontent-heading oucontent-nonumber"><span lang="EN-GB" xml:lang="EN-GB">Activity 1</span></h3><div class="oucontent-inner-box"><div class="oucontent-saq-question"><p>Write down all the topics that you can think of that might be encompassed by the term ‘computer forensics and investigations’.</p></div>
<div class="oucontent-saq-discussion"><h4 class="oucontent-h4">Discussion</h4><p>Here are some of the names we thought of; your list should include at least some of these:</p><ul class="oucontent-bulleted"><li>computer forensics</li><li>forensic computing</li><li>forensic science</li><li>digital forensics</li><li>network forensics</li><li>ICT forensics</li><li>forensic investigations</li><li>digital investigations</li><li>business continuity</li><li>incident response</li><li>computer policing</li><li>high-tech crime investigation</li><li>computer security</li><li>incident management.</li></ul></div></div></div></div><p>Whether you have come from an area where you have acquired knowledge of ‘the nuts and bolts’ of how computers operate (but have had very little experience of investigations or legal aspects), or come from a management, legal, or investigatory background (but have little practical knowledge of the insides of computers and software) then this free course, <i>Introduction to computer forensics and investigations</i>, is for you. Part of the interest and excitement of the area of digital investigations is that it is multi-disciplinary and there are always new things to learn. This course will be quite a challenge but we hope you will find it stimulating and exciting, as well as of considerable practical value.</p><div class="oucontent-box oucontent-s-heavybox1 oucontent-s-box "><div class="oucontent-outer-box"><h3 class="oucontent-h3 oucontent-heading oucontent-nonumber">Enrol to get a record of achievement</h3><div class="oucontent-inner-box"><p>By enrolling on this course and setting up a free Open University account you can track your progress in My OpenLearn. When you’ve finished you can print off the free <b>activity record</b> to demonstrate your learning.</p></div></div></div><p>This free course is an adapted extract from the Open University course M263 <i>Building blocks of software</i>, which is no longer taught by the University. If you want to study formally with us, you may wish to explore other courses we offer in this <span class="oucontent-linkwithtip"><a class="oucontent-hyperlink" href="http://www3.open.ac.uk/study/undergraduate/qualification/computing-and-it/index.htm">subject area</a></span>.</p>
This unit is an easy introduction to some of the issues both in data privacy and computer forensics - with a few easily available tools people can reveal the stored passwords on their computer and access previously deleted data so it is a good practical demonstration as well as being easily accessed.<link rel="canonical" href="http://www.open.edu/openlearn/science-maths-technology/computing-and-ict/introduction-computer-forensics-and-investigations/content-section-0" /> First published on Wed, 05 Mar 2014 as <a href="http://www.open.edu/openlearn/science-maths-technology/computing-and-ict/introduction-computer-forensics-and-investigations/content-section-0">Introduction to computer forensics and investigations</a>. To find out more visit The Open University's <a href="http://www.open.edu/openlearn/ole-home-page">Openlearn</a> website. Creative-Commons 2014
With a few easily available tools people can reveal the stored passwords on their computer and access previously deleted data. Learn about some of the issues in data privacy and computer forensics. This free course, Introduction to computer forensics and investigations, provides practical demonstration in a clear and accessible format.<link rel="canonical" href="http://www.open.edu/openlearn/science-maths-technology/computing-and-ict/introduction-computer-forensics-and-investigations/content-section-0" /> First published on Tue, 29 Sep 2015 as <a href="http://www.open.edu/openlearn/science-maths-technology/computing-and-ict/introduction-computer-forensics-and-investigations/content-section-0">Introduction to computer forensics and investigations</a>. To find out more visit The Open University's <a href="http://www.open.edu/openlearn/ole-home-page">Openlearn</a> website. Creative-Commons 2015
With a few easily available tools people can reveal the stored passwords on their computer and access previously deleted data. Learn about some of the issues in data privacy and computer forensics. This free course, Introduction to computer forensics and investigations, provides practical demonstration in a clear and accessible format.<link rel="canonical" href="http://www.open.edu/openlearn/science-maths-technology/computing-and-ict/introduction-computer-forensics-and-investigations/content-section-0" /> First published on Thu, 24 Mar 2016 as <a href="http://www.open.edu/openlearn/science-maths-technology/computing-and-ict/introduction-computer-forensics-and-investigations/content-section-0">Introduction to computer forensics and investigations</a>. To find out more visit The Open University's <a href="http://www.open.edu/openlearn/ole-home-page">Openlearn</a> website. Creative-Commons 2016
This unit is an easy introduction to some of the issues both in data privacy and computer forensics - with a few easily available tools people can reveal the stored passwords on their computer and access previously deleted data so it is a good practical demonstration as well as being easily accessed.<link rel="canonical" href="http://www.open.edu/openlearn/science-maths-technology/computing-and-ict/introduction-computer-forensics-and-investigations/content-section-0" /> First published on Thu, 18 Sep 2014 as <a href="http://www.open.edu/openlearn/science-maths-technology/computing-and-ict/introduction-computer-forensics-and-investigations/content-section-0">Introduction to computer forensics and investigations</a>. To find out more visit The Open University's <a href="http://www.open.edu/openlearn/ole-home-page">Openlearn</a> website. Creative-Commons 2014
With a few easily available tools people can reveal the stored passwords on their computer and access previously deleted data. Learn about some of the issues in data privacy and computer forensics. This free course, Introduction to computer forensics and investigations, provides practical demonstration in a clear and accessible format.<link rel="canonical" href="http://www.open.edu/openlearn/science-maths-technology/computing-and-ict/introduction-computer-forensics-and-investigations/content-section-0" /> First published on Tue, 28 Apr 2015 as <a href="http://www.open.edu/openlearn/science-maths-technology/computing-and-ict/introduction-computer-forensics-and-investigations/content-section-0">Introduction to computer forensics and investigations</a>. To find out more visit The Open University's <a href="http://www.open.edu/openlearn/ole-home-page">Openlearn</a> website. Creative-Commons 2015
With a few easily available tools people can reveal the stored passwords on their computer and access previously deleted data. Learn about some of the issues in data privacy and computer forensics. This free course, Introduction to computer forensics and investigations, provides practical demonstration in a clear and accessible format.<link rel="canonical" href="http://www.open.edu/openlearn/science-maths-technology/computing-and-ict/introduction-computer-forensics-and-investigations/content-section-0" /> First published on Fri, 08 Jan 2016 as <a href="http://www.open.edu/openlearn/science-maths-technology/computing-and-ict/introduction-computer-forensics-and-investigations/content-section-0">Introduction to computer forensics and investigations</a>. To find out more visit The Open University's <a href="http://www.open.edu/openlearn/ole-home-page">Openlearn</a> website. Creative-Commons 2016
With a few easily available tools people can reveal the stored passwords on their computer and access previously deleted data. Learn about some of the issues in data privacy and computer forensics. This free course, Introduction to computer forensics and investigations, provides practical demonstration in a clear and accessible format.<link rel="canonical" href="http://www.open.edu/openlearn/science-maths-technology/computing-and-ict/introduction-computer-forensics-and-investigations/content-section-0" /> First published on Thu, 18 Sep 2014 as <a href="http://www.open.edu/openlearn/science-maths-technology/computing-and-ict/introduction-computer-forensics-and-investigations/content-section-0">Introduction to computer forensics and investigations</a>. To find out more visit The Open University's <a href="http://www.open.edu/openlearn/ole-home-page">Openlearn</a> website. Creative-Commons 2014
Introduction to computer forensics and investigations