Computer Forensics Education: The Applications of Forensic Tools in Modern Education System

Authors

  • Samy Abdelwahab Safaan Department of Natural and Applied Sciences, Community College of Buraydah, Qassim University, Buraydah, 52571, Saudi Arabia

DOI:

https://doi.org/10.54536/ajcp.v1i2.1077

Keywords:

Computer Forensics Education, Cyber Security, Digital Forensics, Digital Forensic Tools, Encase, FTK

Abstract

Cybercrime and computer-related incidents are becoming more prevalent and common, resulting in billions of dollars in damages. To address these crimes and scams, there is an urgent need to build digital forensics training programme, that will equip relevant professionals to investigate computer crime and events efficiently. There is presently no standard that governs the development of an academic program’s digital forensics curriculum. This study extensively investigates prior work on curriculum design in digital forensics as well as existing computer forensics course offered at the first is the Community College in Buraidah, and the second is the Community College in Unaizah namely, “Cyber Security Diploma” The Cyber Security Diploma is offered in both colleges, the Community College in Buraidah and Unaizah, and the diploma is at the third level of the course “Computer Forensic Analysis,” which is the focus of the research topic. Interviews were conducted with both digital forensic trainers and practitioners, and the findings were examined in order to identify and assess the skills and knowledge required by the industry and law enforcement agencies for their digital forensic examiners. Hands-on training may be delivered by constructing and managing a student laboratory specifically designed for digital forensic examination instruction. A laboratory can be outfitted with a wide range of software solutions, ranging from commercial investigation suites to free command line tools. Similarly, the forensic workstations that execute the software might be supplied by the vendor as stand-alone devices or assembled from separate components in-house. Building and administering a student lab successfully can be a daunting task, but it can also be done on a little budget as long as the focus stays on student achievement.

Downloads

Download data is not yet available.

References

Branham, R. A. (2019). Hash it out: fourth amendment protection of electronically stored child exploitation. Akron Law Review, 53(1), 7.

Brinson, A., Robinson, A., & Rogers, M. (2006). A cyber forensics ontology: Creating a new approach to studying cyber forensics. digital investigation, 3, 37-43.

Cantrell, G., & Dampier, D. A. (2012). Implementing the automated phases of the partially-automated digital triage process model. Journal of Digital Forensics, Security and Law, 7(4), 5.

Case, A., Cristina, A., Marziale, L., Richard, G. G., & Roussev, V. (2008). FACE: Automated digital evidence discovery and correlation. digital investigation, 5, S65-S75.

Casey, E. (2020). Strengthening trust: Integration of digital investigation and forensic science. In (Vol. 33, pp. 301000): Elsevier.

Cummins Flory, T. A. (2016). Digital forensics in law enforcement: A needs based analysis of Indiana agencies. Journal of Digital Forensics, Security and Law, 11(1), 4.

Cunha, I., Cavalcante, J., & Patel, A. (2017). A proposal for curriculum development of educating and training Brazilian police officers in digital forensics investigation and cybercrime prosecution. International Journal of Electronic Security and Digital Forensics, 9(3), 209-238.

Digabriele, J. A. (2008). An empirical investigation of the relevant skills of forensic accountants. Journal of education for Business, 83(6), 331-338.

Fakouri, R., & Teimouri, M. (2019). Dataset for file fragment classification of image file formats. BMC research notes, 12(1), 1-3.

Fellows, S. Immune System’ Cyber-Security for SCADA Systems. Engineering & Technology Reference, 1(1). https://doi.org/10.1049/etr.2015.0103

Gamlo, A., & Bamasak, O. (2011). A multi-tier framework for securing e-transactions in e-government systems of Saudi Arabia. International Journal of Electronic Finance, 5(2), 126-149.

Garfinkel, S. L. (2013). Digital media triage with bulk data analysis and bulk_extractor. Computers & Security, 32, 56-72.

González Jaimes, E. (2016). Academic competences of university graduates and their job occupation prediction / College graduates’ academic skills and their occupational employment projection. https://doi.org/10.23913 / ricsh.v5i10.78

Gottschalk, L., Liu, J., Dathan, B., Fitzgerald, S., & Stein, M. (2005). Computer forensics programs in higher education: a preliminary study. Proceedings of the 36th SIGCSE technical symposium on Computer science education,

Harvey, D. J. (2019). Digital Evidence Admissibility: Some Issues. Available at SSRN 3505611.

Kessler, G. C. (2010). Judges’ awareness, understanding, and application of digital evidence. Nova Southeastern University.

Lee, H. C., & Pagliaro, E. M. (2013). Forensic evidence and crime scene investigation. Journal of Forensic Investigation, 1(2), 1-5.

Liu, F., & Tu, M. (2020). An Analysis Framework of Portable and Measurable Higher Education for Future Cybersecurity Workforce Development. Journal of Education and Learning (EduLearn), 14(3), 322-330.

Mattijssen, E. J., Witteman, C. L., Berger, C. E., Brand, N. W., & Stoel, R. D. (2020). Validity and reliability of forensic firearm examiners. Forensic science international, 307, 110112.

Mellars, B. (2004). Forensic examination of mobile phones. digital investigation, 1(4), 266-272.

Pollitt, M., Nance, K., Hay, B., Dodge, R. C., Craiger, P., Burke, P., Marberry, C., & Brubaker, B. (2008). Virtualization and digital forensics: A research and education agenda. Journal of Digital Forensic Practice, 2(2), 62-73.

Raval, H. (2020b). Artificial Intelligence Forensics, Machine Learning Forensics and Digital Forensics. Digital Forensics (4n6) Journal. https://doi.org/https://doi.org/10.46293/4n6/2020.02.04.05

Ruffell, A. (2010). Forensic pedology, forensic geology, forensic geoscience, geoforensics and soil forensics. Forensic science international, 202(1-3), 9-12.

Sánchez, J., Salinas, A., Contreras, D., & Meyer, E. (2011). Does the new digital generation of learners exist? A qualitative study. British journal of educational technology, 42(4), 543-556.

Sikos, L. F. (2021). AI in digital forensics: Ontology engineering for cybercrime investigations. Wiley Interdisciplinary Reviews: Forensic Science, 3(3), e1394.

Sindhu, K., & Meshram, B. (2012). Digital forensics and cyber crime datamining.

Taylor, C., Endicott-Popovsky, B., & Frincke, D. A. (2007). Specifying digital forensics: A forensics policy approach. digital investigation, 4, 101-104.

Thompson, S. (2019). Apprenticeships as the answer to closing the cyber skills gap. Network Security, 2019(12), 9-11.

Tilekar, T. The Conceivability and Admissibility of Forensic Evidence from IoT Devices in Digital Forensics. Digital Forensics (4n6) Journal., pp. 53–54. https://doi.org/10.46293/4n6/2020.02.02.10.

Tsai, C.-F. (2015). Dynamic grey platform for efficient forecasting management. Journal of Computer and System Sciences, 81(6), 966-980.

Tu, M., Xu, D., Wira, S., Balan, C., & Cronin, K. (2012). On the development of a digital forensics curriculum. Journal of Digital Forensics, Security and Law, 7(3), 2.

Yasinsac, A., Erbacher, R. F., Marks, D. G., Pollitt, M. M., & Sommer, P. M. (2003). Computer forensics education. IEEE Security & Privacy, 1(4), 15-23.

Downloads

Published

2022-12-29

How to Cite

Samy Abdelwahab Safaan. (2022). Computer Forensics Education: The Applications of Forensic Tools in Modern Education System. American Journal of Chemistry and Pharmacy, 1(2), 13–20. https://doi.org/10.54536/ajcp.v1i2.1077