The Need for and Contents of a Course in Forensic Information Systems & Computer Science at the University of Cape Town

This paper aims to investigate the need for and contents of a course in forensic Information Systems and Computer Science at UCT. In order to do this, the reader is introduced to computer crime and shown how the forensic process of identifying, preserving, recovering, analyzing, and documenting computer data supposedly used in crimes committed using computers is helping in investigating and solving these types of crime. An actual forensic approach known as the End-toEnd Digital Investigation is also discussed.

[1]  G. Dhinakar Raj Intellectual Property Rights - An Overview , 2007 .

[2]  George M. Mohay,et al.  Computer and Intrusion Forensics , 2003 .

[3]  Pablo García-Crovetto Lázaro,et al.  Forensic Computing from a Computer Security perspective , 2004 .

[4]  Michael Gregg Certified ethical hacker , 2006 .

[5]  M. Herselman,et al.  Cyber crime influencing businesses in South Africa , 2004 .

[6]  John Fitch,et al.  Course notes , 1975, SIGS.

[7]  Peter Stephenson A comprehensive approach to digital incident investigation , 2003, Inf. Secur. Tech. Rep..

[8]  Broucek,et al.  Forensic Computing Developing a Conceptual Approach in the Era of Information Warfare , 2001 .

[9]  Sue Fitzgerald,et al.  Computer forensics programs in higher education: a preliminary study , 2005, SIGCSE '05.

[10]  Nicole Beebe,et al.  A hierarchical, objectives-based framework for the digital investigations process , 2005, Digit. Investig..

[11]  Yin Pan,et al.  Forensic course development , 2003, CITC4 '03.

[12]  A. Coulthard,et al.  Computer viruses: a quantitative analysis , 2002 .

[13]  Tony Krone,et al.  Hacking Motives: High Tech Crime Brief , 2005 .

[14]  N. L. Piquero,et al.  Causes and Prevention of Intellectual Property Crime , 2005 .

[15]  John S. Heidemann,et al.  A framework for classifying denial of service attacks , 2003, SIGCOMM '03.

[16]  Jianyi Lin,et al.  Computer crime and security survey , 2002 .

[17]  Sue Fitzgerald,et al.  Computer forensics programs in higher education: a preliminary study , 2005 .