Digital Forensics and Cyber Crime

This paper reports experiences and lessons learned in the process of developing and implementing an undergraduate curriculum for digital forensics over the last three years at the University of Illinois at Urbana-Champaign. The project addresses the challenges of developing a higher-education standardized curriculum for digital forensics that meets the needs of the digital forensics community. The curriculum provides degree options and considers the growing employability of digital forensics students in an increasing range of jobs. The approach builds on the multidisciplinary nature of the field. The findings include a curriculum model, detailed course content, exams, and an evaluation package for measuring how students respond to the courses. This paper summarizes the model, results, challenges, and opportunities.

[1]  Jon Postel,et al.  Transmission Control Protocol , 1981, RFC.

[2]  Sherali Zeadally,et al.  Network Forensics: An Analysis of Techniques, Tools, and Trends , 2012, Computer.

[3]  Rajdeep Niyogi,et al.  Network forensic frameworks: Survey and research challenges , 2010, Digit. Investig..

[4]  Simson L. Garfinkel,et al.  Using purpose-built functions and block hashes to enable small block and sub-file forensics , 2010, Digit. Investig..

[5]  David A. McGrew,et al.  An Interface and Algorithms for Authenticated Encryption , 2008, RFC.

[6]  Markus Jakobsson,et al.  What Instills Trust? A Qualitative Study of Phishing , 2007, Financial Cryptography.

[7]  Erik Hjelmvik,et al.  Statistical Protocol IDentification with SPID: Preliminary Results , 2009 .

[8]  Jon Postel,et al.  Internet Protocol , 1981, RFC.

[9]  Ondrej Rysavý,et al.  Fast RTP Detection and Codecs Classification in Internet Traffic , 2014, J. Digit. Forensics Secur. Law.

[10]  Li-Jen Shannon,et al.  A Case Study: Applying Critical Thinking Skills to Computer Science and Technology , 2012 .

[11]  Eric Rescorla,et al.  The Transport Layer Security (TLS) Protocol Version 1.2 , 2008, RFC.

[12]  Bill Fenner,et al.  The sockets networking API , 2004 .

[13]  Sarang Dharmapurikar,et al.  Robust TCP Stream Reassembly in the Presence of Adversaries , 2005, USENIX Security Symposium.

[14]  Stefan A. Robila,et al.  Societal Aspects of Phishing , 2006, 2006 IEEE International Symposium on Technology and Society.

[15]  Michael Cohen,et al.  PyFlag - An advanced network forensic framework , 2008, Digit. Investig..

[16]  M. Freiermuth Text, lies and electronic bait: An analysis of email fraud and the decisions of the unsuspecting , 2011 .

[17]  Rui Chen,et al.  Research Article Phishing Susceptibility: An Investigation Into the Processing of a Targeted Spear Phishing Email , 2012, IEEE Transactions on Professional Communication.

[18]  Roy T. Fielding,et al.  Hypertext Transfer Protocol - HTTP/1.0 , 1996, RFC.