A Model and Guide for an Introductory Computer Security Forensics Course

نویسندگان

  • Doug White
  • Alan Rea
  • W. Brett McKenzie
  • Louis W. Glorfeld
چکیده

This paper discusses the critical need for instructors to bring aspects of computing forensics into Information Technology courses and posits that we make computer forensics a course—or a major portion of a course—offered under the auspices of IT security across all IT-related disciplines, but especially those with a business orientation. To facilitate computer forensics implementation in IT courses, the authors briefly discuss the major aspects of computer forensics, such as legal investigations and policy formation. The authors primarily focus on aspects that most IT students will be involved in during this process: collection, logging, verification, and preservation of electronic evidence needed by investigators. Topics include both managerial and technical aspects. Students learn how to develop investigative documentation and study chain of custody documents. They also learn how to safely handle hardware to capture, examine, and preserve disk images, analyze system log files, and find hidden and deleted files.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Crime Investigation: A Course in Computer Forensics

The growing amount of crime, such as corporate frauds and virus attacks, in the last two decades highlights not only the importance of computer forensics in crime investigations but also the lack of forensic specialists in this area. An urgent need exists for universities to provide courses on computer forensics to ease the shortage of forensic specialists. This paper proposes a sixdimensional ...

متن کامل

Avoiding Cyber-attacks to DMZ and Capturing Forensics from Intruders Using Honeypots

Nowadays, honeypots are widely used to divert attackers from the original target and keep them busy within a decoy environment. DeMilitarized Zone (DMZ) is an important zone for network administrators, because many of the services to the public network is provided at this zone. Many of the security tools such as firewalls, intrusion detection systems and several other secu...

متن کامل

Developing a new digital forensics curriculum

We are developing a new undergraduate certificate program in digital forensics at the University of Illinois at Urbana-Champaign. To create a curriculum consistent with the fundamentally multidisciplinary nature of the field of digital forensics, we assembled a curriculum development team that includes domain experts from the fields of computer science, law, social science, psychology, and acco...

متن کامل

Avoiding Cyber-attacks to DMZ and Capturing Forensics from Intruders Using Honeypots

Nowadays, honeypots are widely used to divert attackers from the original target and keep them busy within a decoy environment. DeMilitarized Zone (DMZ) is an important zone for network administrators, because many of the services to the public network is provided at this zone. Many of the security tools such as firewalls, intrusion detection systems and several other secu...

متن کامل

Security and Computer Forensics in Web Engineering Education

The integration of security and forensics into Web Engineering curricula is imperative! Poor security in web-based applications is continuing to cost organizations millions and the losses are still increasing annually. Security is frequently taught as a stand-alone course, assuming that security can be 'bolted on' to a web application at some point. Security issues must be integrated into Web E...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2004