Computer Forensics Education

نویسندگان

  • Alec Yasinsac
  • Robert F. Erbacher
  • Donald G. Marks
  • Mark Pollitt
  • Peter M. Sommer
چکیده

1. Introduction Traditional information security research focuses on defending systems against attack before they happen. More recently, security auditing has evolved to intrusion detection systems that are concerned with recognizing attacks and taking action to curb further damage at the time of the attack. Comparatively little research has focused on after the fact investigation, partly because network owners are willing to absorb losses from computer crime rather than risking their reputation by allowing details of their exploited vulnerabilities to become public. In the face of growing losses resulting from computer crime, interest in after the fact investigation and evidence gathering techniques is growing. An essential element in improving forensic techniques is development of a comprehensive approach to forensics education. In this paper we present requirements, resources, and proposed pedagogical approaches for developing and implementing a forensics program in higher education. In the next section we address the composition of a forensics workforce and follow with a discussion of curricula issues. We then present arguments for finding suitable resources for a forensic education program and conclude with a summary and recommendations. 2. Background. The term " computer forensics " is used in many contexts and has many synonyms. The term originated with early law enforcement practitioners who used the term to refer to the examination of stand-alone computers for digital evidence of all forms of crime. Some prefer to call this aspect of computer forensics by the term " media analysis ". As computers became larger and more networked, computer forensics became a term commonly used to refer to the post-incident analysis of computers victimized by an intrusion or malicious code. Particularly in the former instance, where network traffic is captured and analyzed, people may describe this as " network forensics " [1]. Some have argued that " forensic computing " is a more accurate term for either of these scenarios, especially since more and more digital evidence is being examined from objects not commonly thought of as computers (i.e. digital cameras). Despite this, we will utilize the generic term computer forensics to apply to both workstation and network-focused forensic disciplines. Occasionally, we also use the phrase Computer and Network Forensics or CNF when discussing Abstract While research is exploding on information security, the need for application of science and education to forensics for computer related crimes is largely limited to law enforcement organizations. At the recent Workshop on Computer Forensics, …

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

On the Development of Digital Forensics Curriculum

Computer Crime and computer related incidents continue their prevalence and frequency, resulting in losses approaching billions of dollars. To fight against these crimes and frauds, it is urgent to develop digital forensics education programs to train a suitable workforce that can effectively investigate computer crimes and incidents. There is presently no standard to guide the design of digita...

متن کامل

Trainees' Competency Based-Assessment Methods in Cyber Forensics Education or Training Programmes - A Review

Cyber Forensics Investigations training or education is relatively new. The nature of Cyber Forensics is multidisciplinary, which enforces proliferations to diverse training programmes, from a handful of day's workshop to Masters Degree in Cyber Forensics. Thus, researchers found that the world lacks experts of Cyber Forensics due to some factors. Consequently, this paper focuses to analyze the...

متن کامل

An Interdisciplinary Approach to Forensic IT and Forensic Psychology Education

In WISE 4, Armstrong [1] presented a multidisciplinary view in computer forensics education. The view was primarily focusing solely on the education of computer forensics students, which was indeed along the lines of multidisciplinarity. However, this view does not involve integration between the different disciplines. In this paper, the scope of the approach is extended in order to allow a two...

متن کامل

Security and Computer Forensics in Web Engineering Education

The integration of security and forensics into Web Engineering curricula is imperative! Poor security in web-based applications is continuing to cost organizations millions and the losses are still increasing annually. Security is frequently taught as a stand-alone course, assuming that security can be 'bolted on' to a web application at some point. Security issues must be integrated into Web E...

متن کامل

Computer Forensics for Graduate Accountants: A Motivational Curriculum Design Approach

Computer forensics involves the investigation of digital sources to acquire evidence that can be used in a court of law. It can also be used to identify and respond to threats to hosts and systems. Accountants use computer forensics to investigate computer crime or misuse, theft of trade secrets, theft of or destruction of intellectual property, and fraud. Education of accountants to use forens...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • IEEE Security & Privacy

دوره 1  شماره 

صفحات  -

تاریخ انتشار 2003