•  
  •  
 

Prior Publisher

The Association of Digital Forensics, Security and Law (ADFSL)

Abstract

Computer Crime and computer related incidents continue their prevalence and frequency, resulting in losses approaching billions of dollars. To fight against these crimes and frauds, it is urgent to develop digital forensics education programs to train a suitable workforce that can effectively investigate computer crimes and incidents. There is presently no standard to guide the design of digital forensics curriculum for an academic program. In this research, previous work on digital forensics curriculum design and existing education programs are thoroughly investigated. Both digital forensics educators and practitioners were surveyed and results were analyzed to determine the industry and law enforcement need for skills and knowledge for their digital forensic examiners. Based on the survey results and the topics that make up certificate programs in digital forensics, topics that are desired in digital forensics courses are identified. Finally, based on the research findings, six digital forensics courses and required topics are proposed to be offered in both undergraduate and graduate digital forensics programs.

References

Barbara, J.J. (2009). The Case Against PI Licensing for Digital Forensic Examiners. Forensics Magazine, 6(2), 23-29.

Berghel, H. (2003). The discipline of Internet forensics. Communications of the ACM, 46(8), 15-20.

Brueckner, S., Guaspari, D., Adelstein, F., & Weeks, J. (2008) Automated computer forensics training in a virtualized environment. Journal of Digital Investigation, 5(2008), S105-S111.

Carlton, G.H. (2007). A grounded theory approach to identifying and measuring forensic data acquisition tasks. Journal of Digital Forensics, Security and Law, 2(1), 35-56.

CERT. (2003). CERT statistics. Retrieved from http://www.cert.org/stats/

CERT. (2006). CERT statistics. Retrieved from http://www.cert.org/stats/

Champlain College. (2011). Computer & Digital Forensics Major. Retrieved from http://www.champlain.edu/Undergraduate-Studies/Majors-andPrograms/Computer-and-Digital-Forensics.html.

Craiger, P., Ponte, L., Whitcomb, C., Pollitt, M., & Eaglin, R. (2007). Master's Degree in Digital Forensics. In Proceedings of the 40th Hawaii International Conference on System Sciences.

Erbacher, R.F., & Swart, R. (2007) Computer Forensics: Education and Training. Retrieved from http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.97.6123&rep=rep 1&type=pdf

FEPAC. (2008). America Academy of Forensics Science. Forensics science education programs accreditation commission, accreditation standards. Retrieved from http://aafs.org/sites/default /files/pdf/FEPACStandards072410DRAFT.pdf

Gottschalk, L., Liu, J., Dathan, B., Fitzgerald S., & Stein, M. (2005). Computer Forensics Programs in Higher Education: A Preliminary Study. Metropolitan State University. In Proceedings of the 36th SIGCSE Technical Symposium on Computer Science Education.

Huebner, E., Ben, D., & Ruan, C. (2008). Computer Forensics Tertiary Education in Australia. 2008 IEEE International conference on computer Science and Software Engineering. Dec 12-14, 2008.

Kessler, G.C. (2007). Online Education in Computer and Digital Forensics: A Case Study. In Proceedings of the 40th Hawaii International Conference on Systems Sciences (HICSS 40), Jan 3-6, 2007, Hawaii, USA.

Kessler, G.C. & Haggerty, D. (2008). Pedagogy and Overview of a Graduate Program in Digital Investigation Management. In Proceedings of the 41st Hawaii International Conference on System Sciences.

Kessler, G.C. & Schirling, M.E. (2006) The Design of Undergraduate Degree Program in Computer & Digital Forensics. Journal of Digital Forensics, Security & Law, 1(3), 37-50.

Kiley, M., Shinbara, T., & Rogers, M. K. (2007). IPod Forensics Update. International Journal of Digital Evidence, 6(1), 1-9.

Lang, D. (1999). Design and Development of a Distance Education Paradigm for Training Computer Forensics Examiners: A Limited Review of Literature. Retrieved from http://www.computerteacher.org/CFLR.htm

Liu, J. (2006). Developing an innovative baccalaureate program in computer forensics. In Proceedings of the 36th ASEE/IEEE Frontiers in Education Conference. October 28–31, 2006, San Diego, CA.

NIPC. (2003). National Infrastructure Protection Center white paper -- Risk Management: An Essential Guide to Protecting Critical Assets. Retrieved from http://www.nipc.gov/publications/ nipcpub/newnipcpub.htm

NIST. (2007). National Institute of Standards and Technology (NIST). Education and Training in Digital Evidence: A Guide for Law Enforcement, Educational Institutions, and Students. Gaithersburg, MD: NIST, Technical Working Group for Education -- Digital Evidence.

Peterson, G.L., Raines, R.A., & Baldwin, R.O. (2007). Graduate Digital Forensics Education at the Air Force Institute of Technology. In Proceedings of the 40th Annual Hawaii International Conference on System Sciences (HICSS’07).1530- 1605/07. Jan 3-6, 2007,Hawaii, USA

Pogue, C., Altheide, C., & Haverkos, T. (2008). Unix and Linux Forensics Analysis DVD Toolkit. Syngress.

Rogers, M.K. (2003). The role of criminal profiling in computer forensic investigations. Journal of Computer Security, 22(4), 292-298.

Rogers, M.K. & Seigfried, K. (2004). The future of computer forensics: A needs analysis survey. Journal of Computer and Security, 23, 12-16.

Sam Houston State University. (2009). The Digital Forensics undergraduate program. Department of Computer Science. Retrieved from http://www.shsu.edu/catalog/df.html#df390

Singleton, T.W., Singleton, A.J., Bologna, G.J., & Lindquist, R.J. (2006). Fraud Auditing and Forensics Accounting, 3rd ed.

John Wiley & Sons, Inc. Spitzner, L. (2003). The Honeynet Project: Trapping the hackers. IEEE Security and Privacy, 1(2), 15-23.

SWGIT. (2004). Scientific Working Groups on Digital Evidence and Imaging Technology. SWGDE/SWGIT Guidelines & Recommendation for Training in Digital Multimedia Evidence. Version 1.

Taylor, C., Endicott-Popovsky, B., & Philips, A. (2007, April). Forensic Education: Assessment and Measures of Excellence. IEEE ADFE. 155-165.

Troell, L., Pan, Y., & Stackpole, B. (2003). Forensic Course Development. In Proceedings of the Conference on Information Technology Curriculum 4 (CITC4 ‘03) (Lafayette, IN, October 16-18, 2003). 265-269.

UCF. (2010). Master of Science in Forensic Program. University of Central Florida. Retrieved from http://msdf.ucf.edu/curriculum.html

URI. (2012). Digital Forensics Programs. The University of Rhode Island. Retrieved from http://forensics.cs.uri.edu/courses.php

Wassenaar, D., Woo, D., & Wu. P. (2009). A Certificate Program in Computer Forensics. Journal of Computing Science in College, 24(1), 158-167.

West Virginia University. (2007). West Virginia University Forensic Science Initiative. Technical Working Group for Education and Training in Digital Forensics.

Wolf, U. (2009). Cyber-Crime: Law Enforcement Must Keep Pace With TechSavvy Criminals. Retrieved from http://www.govtech.com/dc/articles/575223

Yasinsac, A. (2002). Information Security Curricula in Computer Science Departments: Theory and Practice. The George Washington University Journal of Information Security, 1(2) 1-9.

Yasinsac, A., Erbacher, R.F., Marks, D.G., Pollitt, M.M., & Sommer, P.M. (2003). Computer Forensics Education. IEEE Security & Privacy, 1(4), 15-23.

Share

COinS
 
 

To view the content in your browser, please download Adobe Reader or, alternately,
you may Download the file to your hard drive.

NOTE: The latest versions of Adobe Reader do not support viewing PDF files within Firefox on Mac OS and if you are using a modern (Intel) Mac, there is no official plugin for viewing PDF files within the browser window.