Computer Forensics Education
نویسندگان
چکیده
1. Introduction Traditional information security research focuses on defending systems against attack before they happen. More recently, security auditing has evolved to intrusion detection systems that are concerned with recognizing attacks and taking action to curb further damage at the time of the attack. Comparatively little research has focused on after the fact investigation, partly because network owners are willing to absorb losses from computer crime rather than risking their reputation by allowing details of their exploited vulnerabilities to become public. In the face of growing losses resulting from computer crime, interest in after the fact investigation and evidence gathering techniques is growing. An essential element in improving forensic techniques is development of a comprehensive approach to forensics education. In this paper we present requirements, resources, and proposed pedagogical approaches for developing and implementing a forensics program in higher education. In the next section we address the composition of a forensics workforce and follow with a discussion of curricula issues. We then present arguments for finding suitable resources for a forensic education program and conclude with a summary and recommendations. 2. Background. The term " computer forensics " is used in many contexts and has many synonyms. The term originated with early law enforcement practitioners who used the term to refer to the examination of stand-alone computers for digital evidence of all forms of crime. Some prefer to call this aspect of computer forensics by the term " media analysis ". As computers became larger and more networked, computer forensics became a term commonly used to refer to the post-incident analysis of computers victimized by an intrusion or malicious code. Particularly in the former instance, where network traffic is captured and analyzed, people may describe this as " network forensics " [1]. Some have argued that " forensic computing " is a more accurate term for either of these scenarios, especially since more and more digital evidence is being examined from objects not commonly thought of as computers (i.e. digital cameras). Despite this, we will utilize the generic term computer forensics to apply to both workstation and network-focused forensic disciplines. Occasionally, we also use the phrase Computer and Network Forensics or CNF when discussing Abstract While research is exploding on information security, the need for application of science and education to forensics for computer related crimes is largely limited to law enforcement organizations. At the recent Workshop on Computer Forensics, …
منابع مشابه
On the Development of Digital Forensics Curriculum
Computer Crime and computer related incidents continue their prevalence and frequency, resulting in losses approaching billions of dollars. To fight against these crimes and frauds, it is urgent to develop digital forensics education programs to train a suitable workforce that can effectively investigate computer crimes and incidents. There is presently no standard to guide the design of digita...
متن کاملTrainees' Competency Based-Assessment Methods in Cyber Forensics Education or Training Programmes - A Review
Cyber Forensics Investigations training or education is relatively new. The nature of Cyber Forensics is multidisciplinary, which enforces proliferations to diverse training programmes, from a handful of day's workshop to Masters Degree in Cyber Forensics. Thus, researchers found that the world lacks experts of Cyber Forensics due to some factors. Consequently, this paper focuses to analyze the...
متن کاملAn Interdisciplinary Approach to Forensic IT and Forensic Psychology Education
In WISE 4, Armstrong [1] presented a multidisciplinary view in computer forensics education. The view was primarily focusing solely on the education of computer forensics students, which was indeed along the lines of multidisciplinarity. However, this view does not involve integration between the different disciplines. In this paper, the scope of the approach is extended in order to allow a two...
متن کاملSecurity and Computer Forensics in Web Engineering Education
The integration of security and forensics into Web Engineering curricula is imperative! Poor security in web-based applications is continuing to cost organizations millions and the losses are still increasing annually. Security is frequently taught as a stand-alone course, assuming that security can be 'bolted on' to a web application at some point. Security issues must be integrated into Web E...
متن کاملComputer Forensics for Graduate Accountants: A Motivational Curriculum Design Approach
Computer forensics involves the investigation of digital sources to acquire evidence that can be used in a court of law. It can also be used to identify and respond to threats to hosts and systems. Accountants use computer forensics to investigate computer crime or misuse, theft of trade secrets, theft of or destruction of intellectual property, and fraud. Education of accountants to use forens...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- IEEE Security & Privacy
دوره 1 شماره
صفحات -
تاریخ انتشار 2003