Development of masters modules in computer forensics and cybercrime for computer science and forensic science students

نویسنده

  • Richard E. Overill
چکیده

In mid-2004, it was decided that the list of optional modules available to students taking the MSc programme in Computing, Internet Law and Management at King’s College London (KCL) should be supplemented with a module in computer forensics (CF) and cybercrime. It was proposed that this module should be delivered as a reading course to be assessed by means of a dissertation and a linked viva voce examination. We trace the evolution of this module over the three academic years from 2005/2006 to 2007/2008 inclusive and discuss the range of dissertation topics selected by the students. The results and the evidence from anonymous student feedback surveys are analysed quantitatively and are compared with those from a longer established module on forensic computing and CF which forms an integral part of the interdisciplinary MSc in Forensic Science at KCL. We conclude with a critical assessment of the success of both modules.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

An Approach for Digital Forensics Using Behavior Analysis

Computer forensics is the application of investigation and analysis techniques to gather and preserve evidence from a particular computing device in a way that is suitable for presentation in a court of law. Behavior analysis is rooted in the behaviorist tradition and utilizes learning principles to bring about behavior change. Digital forensics is a branch of forensic science encompassing the ...

متن کامل

Computer Forensics for Graduate Accountants: A Motivational Curriculum Design Approach

Computer forensics involves the investigation of digital sources to acquire evidence that can be used in a court of law. It can also be used to identify and respond to threats to hosts and systems. Accountants use computer forensics to investigate computer crime or misuse, theft of trade secrets, theft of or destruction of intellectual property, and fraud. Education of accountants to use forens...

متن کامل

Computer Forensics : An Essential Ingredient for Cyber Security

Computer forensics uses computer investigation and analysis techniques to collect evidence regarding what happened on a computer that is admissible in a court of law. Computer forensics requires a wellbalanced combination of technical skills, legal acumen, and ethical conduct. Computer forensics specialists use powerful software tools to uncover data to be sorted through, and then must figure o...

متن کامل

Development and Delivery of Coursework: Legal/Regulatory/Policy Environment of Cyber-Forensics

This paper describes a cyber-forensics course that integrates important public policy and legal issues as well as relevant forensic techniques. Cyber-forensics refers to the amalgam of multi-disciplinary activities involved in the identification, gathering, handling, custody, use and security of electronic files and records, involving expertise from the forensic domain, and which produces evide...

متن کامل

Cloud Computing Implications to Digital Forensics a New Methodology Proposal

This paper deals with a novel approach to digital investigations, aimed at optimizing law enforcement’s tasks, concerning digital evidence acquisition, examination, analysis and reporting, and reducing investigation complexity and operational costs. In the face of Internet’s pervasiveness and massive market penetration of high-performing and low-cost handset devices, resulting in a worldwide di...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • IJESDF

دوره 2  شماره 

صفحات  -

تاریخ انتشار 2009