Introduction to Computer Forensics for Non-Majors Yana Kortsarts, Computer Science William Harver, Criminal Justice Widener University.

Slides:



Advertisements
Similar presentations
Ability-Based Education at Alverno College. Proposed Outcomes for Session 1. To introduce you to Alvernos approach to designing integrative general education.
Advertisements

Welcome to the seminar course
Standards Alignment A study of alignment between state standards and the ACM K-12 Curriculum.
Apprenticeship and Workplace Mathematics Meeting the Needs of Today’s Students.
Advanced Legal Research in a Practice-Oriented Curriculum Matthew C. Cordon Reference Librarian & Associate Professor of Law Baylor Law School.
Assurance of Learning The School of Business and Economics SUNY Plattsburgh.
1 i206: Distributed Computing Applications & Infrastructure 2012
Computers in Principle & Practice I - V Deena Engel Computers in Principle and Practice I V , Sections 1 & 2 Fall, 2009 Deena Engel .
Two e-Learning elective seminars in Novi Sad Putnik Z., Komlenov Ž., Budimac Z. DMI, Faculty of Science University of Novi Sad.
CIT110 – Introduction to Information Technology Dr. Catherine Dwyer Fall 2011.
Kontos1 Principles of Quality Instruction in Web Classes George Kontos, Ed.D. Assistant Professor
Web Design! John Paxton Montana State University - Bozeman CCSC Northwestern Region Saturday, October 8 th, 2004.
CSCD 433/533 Advanced Computer Networks Lecture 1 Course Overview Fall 2011.
Frank L. H. WolfsDepartment of Physics and Astronomy, University of Rochester The Personal Response System (PRS) at the University of Rochester. Frank.
CSCD 434 Spring 2011 Lecture 1 Course Overview. Contact Information Instructor Carol Taylor 315 CEB Phone: Office.
Science behind a hot air balloon Investigation into gas laws James Lovatt School of Education Studies Centre for the Advancement of Science and Mathematics.
Science Inquiry Minds-on Hands-on.
Blended Courses: How to have the best of both worlds in higher education By Susan C. Slowey.
Cooperative learning and its effects on the academic achievement and interest level of major and non-major students in an introductory engineering course.
Introduction to Computer Forensics Fall Computer Crime Computer crime is any criminal offense, activity or issue that involves computers (
Ryann Kramer EDU Prof. R. Moroney Summer 2010.
Developing Oral and Written Communication Skills in Undergraduate Computer Science and Information Systems Curriculum Yana Kortsarts, Adam Fischbach, Jeff.
Informatics in secondary and elementary schools in Serbia Ohrid, 25. August, 2011.
Custom Faculty Development: Reach Faculty Where They Live Linda A. Leake, M. Ed. Instructional Designer/Blackboard Support Specialist University of Louisville.
 A set of objectives or student learning outcomes for a course or a set of courses.  Specifies the set of concepts and skills that the student must.
1 UTeach Professional Development Courses. 2 UTS Step 1 Early exposure to classroom environment (can be as early as a student’s first semester)
The Common Core Curriculum By Dean Berry, Ed. D. Gregg Berry, B.A.
Symposium 2001June 24, 2001 Curriculum Is Just the Beginning Chris Stephenson University of Waterloo.
Communication Degree Program Outcomes
An innovative learning model for computation in first year mathematics Birgit Loch Department of Mathematics and Computing, USQ Elliot Tonkes CS Energy,
Workshop Notes Course development: Free and Open Software Development.
Introduction to Information Security J. H. Wang Sep. 15, 2014.
EGS 1001C Introduction to Engineering Succeeding in the Classroom Professor: Dr. Miguel Alonso Jr.
The Savvy Cyber Teacher ® Using the Internet Effectively in the K-12 Classroom 1 Savvy Cyber Teacher ® Using the Internet Effectively in the K-12 Classroom.
Introduction to Network Security J. H. Wang Feb. 24, 2011.
Universally Designed Syllabi Kirsten Behling, MA Suffolk University.
February 28, 2008The Teaching Center, Washington University The Teaching Citation Program & Creating a Teaching Portfolio Beth Fisher, Ph.D. Assistant.
Computer Forensics Principles and Practices
CSCD 434 Network Security Spring 2014 Lecture 1 Course Overview.
CLOUD COMPUTING Overview on cloud computing. Cloud vendors. Cloud computing is a type of internet based computing where we use a network of remote servers.
© 2012 Cengage Learning. All Rights Reserved. This edition is intended for use outside of the U.S. only, with content that may be different from the U.S.
ScWk 242 Course Overview and Review of ScWk 240 Concepts ScWk 242 Session 1 Slides.
ECE 1100: Introduction to Electrical and Computer Engineering Wanda Wosik Associate Professor, ECE Dept. Notes 1 Spring 2011 Slides adapted from lectures.
1 CAP6133: Advanced Topics in Computer Security and Computer Forensics (spring’08) Class Overview Dr. Cliff Zou.
Student Preferences For Learning College Algebra in a Web Enhanced Environment Dr. Laura J. Pyzdrowski, Pre-Collegiate Mathematics Coordinator Institute.
Design of a Typical Course s c h o o l s o f e n g I n e e r I n g S. D. Rajan Professor of Civil Engineering Professor of Aerospace and Mechanical Engineering.
Using Alice in an introductory programming course for non-CS majors Adelaida A. Medlock Department of Computer Science Drexel University
Information Assurance – A Technology Transfer Success Story Deidre W. Evans, Edward L. Jones, Christy L. Chatmon Computer and Information Sciences Department.
Introduction to Information Security J. H. Wang Sep. 18, 2012.
Interdisciplinary Computing Raising the Bar for Computing Education.
Welcome to Online Journalism: Theory and Practice Course Summer 2011.
Information Systems Education Conference - ISECON Ryerson University School of Information Technology Management The Use of Internet-based Tools.
Seminar 1IT484 - Network Security1 Welcome To IT484 Network Security Dr. David Teneyuca, CISSP Instructor.
Lecture 1 Page 1 CS 236 Online Introduction CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
How To Use The PLTW ® Curricula Presented By Sam Cox April 23 rd, 2009 STI Prep New Instructor Orientation.
CJ-499 CAPSTONE Instructor David F. Connor. Unit 1 Assessment No Assessments scheduled for this Unit Complete – Introduce Yourself Response Read about.
Stage 1 Integrated learning Coffee Shop. LEARNING REQUIREMENTS The learning requirements summarise the knowledge, skills, and understanding that students.
ONLINE COURSES - SIFS FORENSIC SCIENCE PROGRAMME - 2 Our online course instructors are working professionals handling real-life cases related to various.
WACREN CONFERENCE 2016 E-LEARNING AND ONLINE LEARNING Just-in-Time Teaching – A State of the Art of a Blended Learning and Teaching Approach Elaborated.
NOTE: To change the image on this slide, select the picture and delete it. Then click the Pictures icon in the placeholder to insert your own image. UDL.
CIS 170 MART Teaching Effectively/cis170mart.com FOR MORE CLASSES VISIT HHS 460 AID Inspiring Minds/hhs460aid.com FOR MORE CLASSES VISIT.
Introduction to Computer Forensics Fall Computer Crime Computer crime is any criminal offense, activity or issue that involves computers (
West Campus Science Electives
CSC207 Fall 2016.
Purpose of Class To prepare students for research and advanced work in security topics To familiarize students working in other networking areas with important.
Introduction to Computer Forensics
Cryptography and Computer Security for Undergraduates
CSCD 434 Network Security Spring 2012 Lecture 1 Course Overview.
The Variety of Reports in Business
CSCD 434 Network Security Spring 2019 Lecture 1 Course Overview.
Presentation transcript:

Introduction to Computer Forensics for Non-Majors Yana Kortsarts, Computer Science William Harver, Criminal Justice Widener University

Definitions Computer forensics, still a rather new discipline in computer security, focuses on finding digital evidence after a computer security incident has occurred Computer Forensics is the application of science and engineering to the legal problem of digital evidence. It is a synthesis of science and law. Computer forensics is the scientific examination and analysis of data held on, or retrieved from, computer storage media in such a way that the information can be used as evidence in a court of law. Computer forensics has a clear interdisciplinary nature

In this Paper We discuss our experience and course results teaching an interdisciplinary course, Introduction to Computer Forensics, in Fall The course was taught by an interdisciplinary team of computer science and criminal justice faculty. The course was designed as a science elective for non- majors and was open as a free elective for computer science (CS) and computer information systems majors (CIS) as well. Ideas for Fall 07 implementation of the course.

The Course Design, Goals and Challenges Computer forensics is a very challenging topic for instructors to teach and for students to learn, but at the same time the topic is very attractive. Recently, many universities and colleges have started to offer courses in computer forensics at different levels and to design computer forensics curricula. While there are experiences to learn from, the area is still very young, and designing a computer forensics course takes a lot of effort: the individual features of the department should be taken into account as well as available lab resources and funds, since computer forensics software and hardware can be expensive.

The Course Design, Goals and Challenges The decision was made first to design an Introduction to Computer Forensics course that primarily would target non-majors and would be open as a free elective to CS and CIS majors. This was done with the idea of fulfilling the departments’ long-term plans to develop an upper level technical elective course for majors. The rationale behind this decision was to design a course for non-majors that would not focus on programming, but at the same time would cover computer science and information systems topics that are attractive for non- majors.

The Course Design, Goals and Challenges Introduction to Computer Forensics first iteration: Fall Enrollment: 14 students, 9 - non-majors and 5 - majors. No prerequisites were required for the course. Taught by computer science and criminal justice faculty. Met in the lecture room and in the lab, 3 hours weekly. The lab was equipped with dual bootable PC’s that run Windows and Linux OS Most of the software was free or open source software. Free trial periods for several commercial packages were used for the course

Challenges Challenging task to teach the topic for non-majors. Traditionally: upper level technical elective course in the computer science (CS) and information systems (IS) curriculum. Students have all the required knowledge in computer and network security, cryptology, and operating systems. In our course: most of the students were non-majors, they had never been exposed to advanced computer science and information systems topics before. In our course: students were coming from diverse disciplines some with good technical and mathematical background and some without. We experienced difficulties finding a comprehensive, pedagogically sound textbook on computer forensics that could be used to teach this subject for non-majors.

Course Curriculum: Introductory Lecture Definitions of the term “computer forensics” to give students an idea of what this course was about. Structure of the course, the tentative list of topics, the level of the technical content, to make sure that CS and CIS students would have right expectations from the course. Interdisciplinary nature of the topic and of the course The global technical nature of the topic - computer forensics requires knowledge in computer science and information systems as a whole The course was compressed of different topics that were all connected under umbrella of applications of these topics in the computer forensics field.

Course Curriculum: Introduction to Criminal Justice First two weeks of the course Were taught by the criminal justice faculty. Students learned about the criminal justice system components, structure and conduct of investigations, and collection of evidence. Students got familiar with various laws and regulations dealing with computer forensic analysis. An exam culminated this part of the course to assess students’ knowledge.

Course Curriculum What is computer? What is information? Introduction to History of Computing. Introduction to Computer Ethics. Encryption and Forensics. Part I Steganography Computer examination process. MD5 algorithm, fingerprints and hashes. Application to Computer Forensics. Introduction to Linux OS and Introduction to FTimes system baselining and evidence collection tool. Encryption and Forensics. Part II: Introduction to Public Key Cryptology and Pretty Good Privacy (PGP) encryption tool. Cyber Terrorism

What is computer? What is information? Introduction to History of Computing Brief introduction the to history of computing Concepts of computer hardware, software, computer programs and operation systems; binary, octal and hexadecimal number systems; and concept of data storage in the computer memory. This material was mostly familiar to CS and CIS students and we decided that these topics would be taught by majors, which would allow active participation in the teaching process and for the non-majors to learn material from their peers.

Introduction to Computer Ethics Topic was mostly new for all students Provided an introduction to ethics in information technology Professional codes of ethics Discussion of privacy issues and intellectual property Introduction to computer and internet crime, types of malicious software, and security incidents. All topics were taught with active student’s participation Students formed interdisciplinary teams and prepared short presentations (5-10 minutes) about different malicious software, and computer crimes that were reported and ended in the court. The presentations were conducted at the end of each lecture time.

Encryption and Forensics. Part I Brief history of cryptography Definitions of cryptology concepts, simple symmetric (private key) ciphers Connection between computer forensics and cryptology. The topic of public key cryptology was explained later in the course. The topic of cryptology is not an easy topic to comprehend for non- majors, since the topic requires a solid mathematical background. In order to make this part of the course successful, the class was divided into small interdisciplinary teams and all concepts were practiced within the team with the help of majors. To master the symmetric ciphers, students played “fastest team to encrypt/decrypt the message” games. This was the last topic that was taught in the lecture room. The rest of the course was conducted in the computer lab.

Steganography Steganography – the art and science of writing hidden messages in such a way that no one apart from the sender and intended recipient even realizes there is a hidden message The relation of steganography to computer forensics Steganography software Invisible Secrets 4 The lab assignments included simple hide/unhide tasks with encryption and decryption of the password. Team project: create a document with multiple hidden files, and for each hidden file to provide a hint to decrypt or uncover the password, using the encryption techniques learned so far, or/and using the knowledge of the binary/octal/hexadecimal number systems, or/and using the definitions of the computer science concepts learned so far. This was done in an effort to connect all topics under one umbrella. Reading and discussion of several articles related to the topic

Computer Examination Process Searching and seizing computers for obtaining computer-based evidence and the presentation of the evidence in the court. Resources published on the United States Department of Justice, Computer Crime & Intellectual Property Section webpage Paper: “Searching and Seizing Computers and Obtaining Electronic Evidence in Criminal Investigations” The hands-on activities for this session included practice in writing computer forensics reports.

MD5 Algorithm, Fingerprints and Hashes Application to Computer Forensics Windows OS, open source software MD5sums 1.2 from pc-tools.net. MD5 algorithm, the concept of hash function, and the concept of hash values were partially explained by majors, and provided opportunities for active learning. Calculation the MD5sums for files and directories. Students were required to be capable of answering the question whether the content of the file was altered or not. Students explored how different manipulations of the files and directories affecting the MD5sums values. Students worked according to proposed scenarios and used MD5sums for evidence validation

Introduction to Linux and FTimes System Baselining and Evidence Collection Tool Most difficult part of the course for all students. FTimes Tool was a new tool for all students. All activities were done in teams. Learning Linux OS at an introductory level: basic file manipulation operations, EMACS editor, manual pages, built-in MD5sum command. Learning FTimes tool at the introductory level: reading the paper “System Baselining – Forensics Perspective”, doing a simplified version of the first lab exercise Ftimes Mechanics from the Bootcamp session of the FTimes webpage A lot of opportunities to introduce students to real forensics analysis, but at the same time this is already a very challenging tool to learn for non-major.

Encryption and Forensics. Part II: Introduction to Public Key Cryptology and Pretty Good Privacy (PGP) Encryption Tool. Challenging topic, and requires a solid mathematical background. All in-class activities were done in the interdisciplinary teams. Concept of private and public key, difference between symmetric and public key cryptology, applications of public key cryptology for computer forensics purposes, the RSA algorithm. Hands-on activities: encryption and decryption using RSA, finding and presenting information about additional public key cryptology algorithms, and finding information and discussing the weaknesses of the public key cryptology. The second part of this topic was devoted to learning how to use PGP encryption tool ( We used a 30 day free trial period.

Cyber Terrorism Last topic covered in the course. Students were required to read and participate in the in- class discussion of two papers from ACM Journal of Communication Volume 47, Issue 3, March 2004 Students also were referred to the National Cyber Security Division website ( This topic also provided an opportunity to summarize the material that was covered in the course and to finalize the course.

Course Results To assess the students’ experience, we designed a short post-survey that included only open-ended questions and asked students to provide their feedback. Most of the students, about 95%, answered that the course met their expectation Three most favorite activities and three least favorite topics. About 50%, mentioned LINUX as the least favorite topic. Favorite: steganography, MD5, cryptology and binary system. Some students wrote that they took Introduction to Criminal Justice course prior to our course and criminal justice topic was not their favorite because of this reason.

Course Results Most favorite and least favorite activities: working in the lab was their favorite part, and the beginning of the course that was conducted in the lecture room, while provided opportunities for active participation, was the least favorite. Lab assignments helped to gain better understanding of the material. Contribution of the team work to learning course material: received positive answers from all students, they liked team work, helped to better understand the course material, and provided an opportunity to share information. provided a possibility to practice how to explain material to other students. it was beneficial to learn from the instructor and from the peers at the same time.

Course Results Percentage division of the criminal justice and computer science topics: on average, students proposed: 25% criminal justice and 75% to computer science. Some students suggested that the topics should be blended together throughout the course. Recommendations to improve the course: teach the course in the lab for the entire semester, to teach more in depth some of the technical topics, a separate course for majors, and some suggestions about the prerequisites for the course, a guest speaker from the computer forensic field

Course Results Students showed satisfaction from the course. It is possible to teach introduction to computer forensics for non-majors by taking into account very careful consideration of the topics, preparing detailed and simplified explanations of the advanced computer science and information systems topics, and creating team projects and hands-on activities. It was a very beneficial experience for the instructors and for the students to be involved in team teaching. Students had an opportunity to see how the computer forensics problem is approached from different perspective- computer science and criminal justice- and instructors had an opportunity to learn from each other and to create a productive collaboration while teaching the course.

Lessons Learned and Future Plans Fall 2007: several changes were introduced. The entire course meets in the computer lab Modification of the lecture style to use in-class activities: the lectures are shortened and the concentration is on the hands-on activities. Guest Speaker from Regional Computer Forensics Laboratory We are constantly working on making better connections among all topics covered in the course and computer forensics by designing assignments that have a computer forensics nature.

Lessons Learned and Future Plans Redesign the LINUX topic to make it more attractive to non-majors by designing computer forensics scenarios that require knowledge and understanding of certain LINUX features. Students will have an opportunity to learn LINUX while solving computer forensics mysteries. We purchased the Invisible Secret steganography software Interdisciplinary team work and team competition activities Textbook: difficult task, even for majors continue the search for the textbook working on our own lecture notes Website: cs.widener.edu/~yanakocs.widener.edu/~yanako