Designing computer forensics courses using case studies to enhance computer security curricula

  • Authors:
  • Ajantha Herath;Suvineetha Herath;Rohitha Goonatilake;Susantha Herath;Jayantha Herath

  • Affiliations:
  • Richard Stockton State College of New Jersey, NJ;Richard Stockton State College of New Jersey, NJ;Texas A&M International University, TX;St Cloud State University, MN;St Cloud State University, MN

  • Venue:
  • Journal of Computing Sciences in Colleges - Papers of the Fourteenth Annual CCSC Midwestern Conference and Papers of the Sixteenth Annual CCSC Rocky Mountain Conference
  • Year:
  • 2007

Quantified Score

Hi-index 0.00

Visualization

Abstract

Most information systems are designed without anticipating malicious use; however, the exponential growth of attacks illustrates vulnerabilities in traditional systems. Computer forensics aids in the reconstruction of the time stamped actions that led to an attack or intrusion. Since those attacks affect performance, there is a need to harden and protect the information infrastructure. Cyber Laws provide protection to systems by prosecuting cyber security violators and cyber criminals. Real world case studies provide a better understanding of security issues and help developers design and implement security features. This paper describes a computer forensics course designed around federal and state level court cases representing real cyber crime, one related to a wrongful prosecution that our team defended successfully, as well as findings from investigations and their importance. These course materials are freely available for other instructors to use in their classrooms.