International Conference on Digital Forensics and Cyber Crime

Digital Forensics and Cyber Crime pp 3-15 | Cite as

Digital Forensics Education: A Multidisciplinary Curriculum Model

  • Imani Palmer
  • Elaine Wood
  • Stefan Nagy
  • Gabriela Garcia
  • Masooda Bashir
  • Roy Campbell
Conference paper
Part of the Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering book series (LNICST, volume 157)

Abstract

This paper reports experiences and lessons learned in the process of developing and implementing an undergraduate curriculum for digital forensics over the last three years at the University of Illinois at Urbana-Champaign. The project addresses the challenges of developing a higher-education standardized curriculum for digital forensics that meets the needs of the digital forensics community. The curriculum provides degree options and considers the growing employability of digital forensics students in an increasing range of jobs. The approach builds on the multidisciplinary nature of the field. The findings include a curriculum model, detailed course content, exams, and an evaluation package for measuring how students respond to the courses. This paper summarizes the model, results, challenges, and opportunities.

Keywords

Digital forensics Standardization Higher education Portable curriculum Multidisciplinary approach 

References

  1. 1.
    Meyers, M., Rogers, M.: CF: the need for standardization and certification. Int. J. Digital Evid. 3(2), 1–11 (2004)Google Scholar
  2. 2.
    Yasinsac, A., Erbacher, R.F., Marks, D.G., Pollitt, M.M., Sommer, P.M.: Computer forensics education. IEEE Secur. Priv. 1(4), 15–23 (2003)CrossRefGoogle Scholar
  3. 3.
    Bem, D., Huebner, E.: Computer forensics workshop for undergraduate students. In: Proceedings of the Tenth Conference on Australian Computing Education, vol. 78, pp. 29–33. Australian Computer Society, Inc., January 2008Google Scholar
  4. 4.
    Kessler, G.C., Schirling, M.E.: The design of an undergraduate degree program in computer and digital forensics. J. Digital Forensics Secur. Law 1(3), 37–50 (2006)Google Scholar
  5. 5.
    Bashir, M., Applequist, J., Campbell, R., DeStefano, L., Garcia, G., Lang, A.: Development and dissemination of a new multidisciplinary undergraduate curriculum in digital forensics. In: ADFSL, Richmond, Virginia, 28–29 May 2014Google Scholar
  6. 6.
    Chi, H., Dix-Richardson, F., Evans, D.: Designing a computer forensics concentration for cross-disciplinary undergraduate students. In: Information Security Curriculum Development Conference, pp. 52–57. ACM (2010)Google Scholar
  7. 7.
    Srinivasan, S.: Computer forensics curriculum in security education. In: Information Security Curriculum Development Conference, pp. 32–36. ACM (2009)Google Scholar
  8. 8.
    Wassenaar, D., Woo, D., Wu, P.: A certificate program in computer forensics. J. Comput. Sci. Coll. 24(4), 158–167 (2009)Google Scholar
  9. 9.
    Woods, K., Lee, C.A., Garfinkel, S., Dittrich, D., Russel, A., Kearton, K.: Creating realistic corpora for forensic and security education. In: Proceedings of the ADFSL Conference on Digital Forensics Security and Law, pp. 123–134 (2011)Google Scholar
  10. 10.
    Lang, A., Bashir, M., Campbell, R., DeStefano, L.: Developing a new digital forensics curriculum. In: DFWRS, Denver, CO, 3–6 August 2014Google Scholar
  11. 11.
    Walls, R.J., Levine, B.N., Liberatore, M., Shields, C.: Effective digital forensic research is investigator-centric. In: HotSec (2011)Google Scholar
  12. 12.
    Beebe, N.: Digital forensic research: the good, the bad and the unaddressed. In: Peterson, G., Shenoi, S. (eds.) IFIP WG. IFIP AICT, vol. 306, pp. 17–36. Springer, Heidelberg (2009)CrossRefGoogle Scholar
  13. 13.
    Kwan, M., Chow, K.-P., Law, F., Lai, P.: Reasoning about evidence using bayesian networks. In: Ray, I., Shenoi, S. (eds.) Advances in Digital Forensics IV. IFIP, vol. 285, pp. 275–289. Springer, Heidelberg (2008)CrossRefGoogle Scholar
  14. 14.
    Bishop, M.: Education in information security. IEEE Concurrency 8(4), 4–8 (2000)CrossRefGoogle Scholar
  15. 15.
    Craiger, P., Ponte, L., Whitcomb, C., Pollitt, M., Eaglin, R.: Master’s degree in digital forensics. In: System Sciences, HICSS 2007, 40th AHIC, pp. 264b. IEEE (2007)Google Scholar
  16. 16.
    Nance, K., Armstrong, H., Armstrong, C.: Digital forensics: defining an education agenda. In: System Sciences, HICSS 2010, 43rd AHIC, pp. 1–10. IEEE (2010)Google Scholar
  17. 17.
    Burnett, S.F.: Computer security training and education: a needs analysis. In: 2012 IEEE Symposium on Security and Privacy, p. 0026. IEEE Computer Society (1996)Google Scholar
  18. 18.
    Cooper, P., Finley, G.T., Kaskenpalo, P.: Towards standards in digital forensics education. In: Proceedings of the 2010 ITiCSE Working Group Reports, New York, pp. 87–95. ACM (2010)Google Scholar
  19. 19.
    Gottschalk, L., Liu, J., Dathan, B., Fitzgerald, S., Stein, M.: Computer forensics programs in higher education: a preliminary study. In: SIGCSE Bulletin, vol. 37, pp. 147–151 (2005)Google Scholar
  20. 20.
    Liu, J.: Implementing a baccalaureate program in computer forensics. J. Comput. Sci. Coll. 25(3), 101–109 (2010)Google Scholar
  21. 21.
    FEPAC Accreditation standards Technical report. AAFS (2012)Google Scholar
  22. 22.
    Curricula, C.: Report of ACM/IEEE-CS Joint Curriculum Task Force (1991)Google Scholar
  23. 23.
    WVUFSI: Technical working group for education and training in digital forensics technical report. U.S. Department of Justice, August 2007Google Scholar
  24. 24.
    Scientific Working Group on Digital Forensics. SWGDE/SWGIT guidelines and recommendations for training in digital and multimedia evidence technology (2010). https://www.swgde.org/documents/CurrentDocuments
  25. 25.
    Schipp, J., Dopheide, J., Slagell, A.: ISLET: an isolated, scalable and lightweight environment for training. In: The Proceedings of XSEDE 2015, St. Louis, MO, July 2015Google Scholar
  26. 26.
    Woods, K., Lee, C., Garfinkel, S., Dittrich, D., Russel, A., Kearton, K.: Creating realistic corpora for forensic and security education. In: ADFSL Conference on Digital Forensics, Security and Law (2011)Google Scholar
  27. 27.
    Ismand, E.S., Hamilton, J.A. Jr.: A digital forensics program to retrain America’s veterans. In: 5th ASIA, pp. 62–66 (2010)Google Scholar
  28. 28.
    Al Amro, S., Chiclana, F., Elizondo, D.A.: Application of fuzzy logic in computer security and forensics. In: Elizondo, D.A., Solanas, A., Martinez, A. (eds.) Computational Intelligence for Privacy and Security. SCI, vol. 394, pp. 35–49. Springer, Heidelberg (2012)CrossRefGoogle Scholar

Copyright information

© Institute for Computer Sciences, Social informatics and Telecommunication Engineering 2015

Authors and Affiliations

  • Imani Palmer
    • 1
  • Elaine Wood
    • 2
  • Stefan Nagy
    • 1
  • Gabriela Garcia
    • 3
  • Masooda Bashir
    • 4
  • Roy Campbell
    • 1
  1. 1.Department of Computer ScienceUniversity of Illinois at Urbana-ChampaignUrbana-ChampaignUSA
  2. 2.Department of EnglishUniversity of Illinois at Urbana-ChampaignUrbana-ChampaignUSA
  3. 3.Illinois Science, Technology, Engineering, and Mathematics Education InitiativeUniversity of Illinois at Urbana-ChampaignUrbana-ChampaignUSA
  4. 4.Graduate School of Library and Information ScienceUniversity of Illinois at Urbana-ChampaignUrbana-ChampaignUSA

Personalised recommendations