Internet Forensics
United States v Gorshkov Detailed Forensics and Case Study; Expert Witness Perspective
SADFE '05 Proceedings of the First International Workshop on Systematic Approaches to Digital Forensic Engineering on Systematic Approaches to Digital Forensic Engineering
How to be a Digital Forensic Expert Witness
SADFE '05 Proceedings of the First International Workshop on Systematic Approaches to Digital Forensic Engineering on Systematic Approaches to Digital Forensic Engineering
Guide to Computer Forensics and Investigations, Second Edition
Guide to Computer Forensics and Investigations, Second Edition
Cryptography & Network Security
Cryptography & Network Security
Journal of Computing Sciences in Colleges
Hi-index | 0.00 |
Most information systems are designed without anticipating malicious use; however, the exponential growth of attacks illustrates vulnerabilities in traditional systems. Computer forensics aids in the reconstruction of the time stamped actions that led to an attack or intrusion. Since those attacks affect performance, there is a need to harden and protect the information infrastructure. Cyber Laws provide protection to systems by prosecuting cyber security violators and cyber criminals. Real world case studies provide a better understanding of security issues and help developers design and implement security features. This paper describes a computer forensics course designed around federal and state level court cases representing real cyber crime, one related to a wrongful prosecution that our team defended successfully, as well as findings from investigations and their importance. These course materials are freely available for other instructors to use in their classrooms.