Open source software is software where the source code is available for
the user of the software and is free to be distributed [Woo05].
RAM Random Access Memory. A temporary memory storage for a computer
system and will be...
WAN Wide Area Network. WAN is a network that has a wide communication
geographical area. The most common use of WAN is the Internet. In
addition, it can be a combination of LAN networks [Wig(n.d.)].
NTFS NTFS is a file system that was developed...
2.3 Digital Forensics Curriculum Design and Model
Yasinsac, Erbacher, Marks, Pollitt & Sommer proposed a model for digital
forensics education or training [Yas03]. It is shown in Figure 2. This model illustrates
digital forensics training based...
technical electives and open university electives [Wes07]. Additionally, they suggested
that each of the technical subjects must be accompanied 1 hour lab hours. The purpose of
this lab course is to maintain hands-on experience among students...
RESEARCH METHODOLOGY AND RESULTS
The purpose of this chapter is to discuss the research methodology and the results
of this study. It is divided to research methodology and results sections. The research
The programs that offer digital forensics program are taken and listed in a
database. In this study, all data are putted into Excel worksheet. A list of universities or
colleges that offer digital forensics program is created and is categorized...
usually it is accomplished by doing research on any topic that touches about digital
forensics [URI(b), CER].
The requirements of those programs mentioned above actually depend on the
level of the program itself. For instance, if a future...
Figure 13 – Curriculum for Digital forensics baccalaureate program
(36 – 40 credit hours)
Depends on the university, the students will take general
subjects recommended by the university. It is
As discussed in the previous chapters, from this research, we managed to come up
with a pattern on how digital forensics education should be established. The five
components consist of general, basic foundation, forensics...
APPENDIX A: LIST OF DIGITAL FORENSICS ANALYSIS TOOLS
1. Encase (www.guidancesoftware.com)
EnCase as its motto “The world leader in digital investigation” implies, is one of
the most applied digital forensic analysis tools by law enforcement....
4. iLook (http://www.perlustro.com/ustreasury_website/iLookv8.html)
iLook is another digital forensic analysis tool that is currently used and
maintained by the Internal Revenue Service Criminal Investigation Division (IRS-CI).
EnCase (mentioned above). SMART is unique because it is a cross-platform
software. In fact, Enron case investigation used SMART.
6. WinHex (http://www.x-ways.net/winhex/)
X-Ways Software Technology created another digital forensic analysis tool...
source disk image. This tool is written in Java and can be downloaded without
17. dd (http://www.forensicswiki.org/wiki/Dd)
dd is an open source disk imaging tool and available to download online with no
charge. It does not have an...
20. Mobiledit! Forensic (http://www.mobiledit.com/forensic/)
Mobiledit! is a another cell phone forensic analysis tool that is developed by
Compelson Laboratories. The National Institute of Standard Technology
recognizes this tool and it is...
Organization Details summary
• Network Intrusions
• Internet Investigations
• Processing NTFS
• Data Recovery
• Macintosh Operating Systems
• Hardware Recognition
FACT offers membership to law enforcement agencies
document all the steps involved at the crime scene. The main purpose of this step
is to make sure that crime scene is protected and secured.
All seized materials from the crime scene are documented and Chain of custody...