Computer forensics education: the open source approach

Ewa Huebner, Derek Bem, Hon Cheung

    Research output: Chapter in Book / Conference PaperChapter

    Abstract

    ![CDATA[In this chapter we discuss the application of the open source software tools in computer forensics education at tertiary level. We argue that open source tools are more suitable than commercial tools, as they provide the opportunity for students to gain in-depth understanding and appreciation of the computer forensic process as opposed to familiarity with one software product, however complex and multi-functional. With the access to all source programs the students become more than just the consumers of the tools as future forensic investigators. They can also examine the code, understand the relationship between the binary images and relevant data structures, and in the process gain necessary background to become the future creators of new and improved forensic software tools. As a case study we present an advanced subject, Computer Forensics Workshop, which we designed for the Bachelor's degree in computer science at the University of Western Sydney. We based all laboratory work and the main take-home project in this subject on open source software tools. We found that without exception more than one suitable tool can be found to cover each topic in the curriculum adequately. We argue that this approach prepares students better for forensic field work, as they gain confidence to use a variety of tools, not just a single product they are familiar with.]]
    Original languageEnglish
    Title of host publicationOpen Source Software for Digital Forensics
    EditorsEwa Z. Huebner, Stefano Zanero
    Place of PublicationUSA
    PublisherSpringer Science+Business Media
    Pages9-23
    Number of pages15
    ISBN (Print)9781441958037
    Publication statusPublished - 2010

    Keywords

    • software engineering
    • computer crimes

    Fingerprint

    Dive into the research topics of 'Computer forensics education: the open source approach'. Together they form a unique fingerprint.

    Cite this