ALEX Classroom Resource

  

Computer Forensics

  Classroom Resource Information  

Title:

Computer Forensics

URL:

https://www.txcte.org/resource/lesson-plan-computer-forensics

Content Source:

Other
Texas CTE
Type: Lesson/Unit Plan

Overview:

In this lesson, students will discuss computer forensics and complete an activity in which they will process an electronic crime scene. Students will understand how computers and other electronic data storage devices leave the footprints and data trails of their users.

Content Standard(s):
Digital Literacy and Computer Science
DLIT (2018)
Grade: 9-12
14) Compare ways to protect devices, software, and data.

Unpacked Content
Evidence Of Student Attainment:
Students will:
  • compare ways to protect devices.
  • compare ways to protect software.
  • compare ways to protect data.
Teacher Vocabulary:
computing devices, software, and data
Knowledge:
Students know:
  • that it is important to protect data, software, and devices.
  • why it is important to protect data, software, and devices.
Skills:
Students are able to:
  • compare ways to protect devices.
  • compare ways to protect software.
  • compare ways to protect data.
Understanding:
Students understand that:
  • multiple methods exist to protect data, software, and devices.
  • some methods are more effective than others at meeting specific criteria.
  • it is important to evaluate option for protection of data, software, and devices.
Digital Literacy and Computer Science
DLIT (2018)
Grade: 9-12
16) Identify laws regarding the use of technology and their consequences and implications.

Examples: Unmanned vehicles, net neutrality/common carriers, hacking, intellectual property, piracy, plagiarism.

Unpacked Content
Evidence Of Student Attainment:
Students will:
  • identify laws relative to the use of technology.
  • identify consequences of violating laws relative to the use of technology.
  • identify implications of laws relative to the use of technology.
Teacher Vocabulary:
  • net neutrality
  • hacking
  • intellectual property
  • piracy plagiarism
Knowledge:
Students know:
  • technology changes at a rapid rate.
  • all things that are possible with technology may not be ethical.
  • that laws exist or are created to encourage individuals and entities to operate in an ethical manner.
Skills:
Students are able to:
  • identify laws relative to the use of technology.
  • identify consequences of violating laws relative to the use of technology.
  • identify implications of laws relative to the use of technology.
Understanding:
Students understand that:
  • technology changes at a rapid rate.
  • all things that are possible with technology may not be ethical.
  • that laws exist or are created to encourage individuals and entities to operate in an ethical manner.
Digital Literacy and Computer Science
DLIT (2018)
Grade: 9-12
32) Use data analysis tools and techniques to identify patterns in data representing complex systems.

Unpacked Content
Evidence Of Student Attainment:
Students will:
  • identify patterns in data.
  • use data analysis tools and techniques.
  • use data analysis tools and techniques to identify patterns in data representing complex systems.
Teacher Vocabulary:
  • datamining
Knowledge:
Students know:
  • how to identify patterns in data.
  • how to select and apply data analysis tools and techniques.
  • use data analysis tools and techniques to identify patterns in data representing complex systems.
Skills:
Students are able to:
  • evaluate data sets.
  • select and apply data analysis tools and techniques.
  • use technology to mine data.
Understanding:
Students understand that:
  • data can be important in a problem
  • solving process.
  • tools exists to aid in the processing of complex data sets.
  • it can be more efficient to allow a program to identify patterns in a complex data set.
Tags: computer forensics, data recovery, digital footprints, forensics
License Type: Custom Permission Type
See Terms: https://pass.texasgateway.org/tos
For full descriptions of license types and a guide to usage, visit :
https://creativecommons.org/licenses
Accessibility
Comments
  This resource provided by:  
Author: Aimee Bates