Analyzing the Quality Assurance of Trainees Competency Assessment and Accreditation of Cyber Forensic Education/Training Programs

Size: px
Start display at page:

Download "Analyzing the Quality Assurance of Trainees Competency Assessment and Accreditation of Cyber Forensic Education/Training Programs"

Transcription

1 Analyzing the Quality Assurance of Trainees Competency Assessment and Accreditation of Cyber Forensic Education/Training Programs Elfadil Sabeil Faculty of Computer Science & Information Systems Johor Baru, Malaysia Azizah Bt Abdul Manaf Advanced Informatics School Kuala Lumpur, Malaysia Zuraini Ismail Advance Informatics School Kuala Lumpur, Malaysia Abstract This paper presents a critical analysis on the trainee s competency assessment (evaluation) quality assurance and accreditation of Cyber forensic programs provided by some training institutions in USA, U.K., Australia and China. It summarizes the existing competency assessment quality assurance based on both internal and external and accreditation for Associate and Diploma Degree Programs, Certificate Programs, Undergraduate Programs and Master/graduate Programs. It briefly highlights factors which should be considered when offering any Cyber forensic training/education program. The result shows that Cyber forensic training/education has inadequate consideration for the competency assessment quality assurance and accreditation. Keywords-component; competency assessment quality assurance; accreditation; internal ; external I. INTRODUCTION In the current era, information and communications technology (ICT) is predominantly part of our life, mostly in a positive way [1]. It is covers many aspect of activities for most of people around the world. In addition, most of people depend on ICT to communicate, transport, produce food, trade, entertain and so forth. The rapid progress and development of computers, networks and communications create ever changing world. However, nowadays most of technologies are prone to criminal activities. In other words, they contribute to various huge Cyber crimes [2]. There are relatively few criminal and civil cases that do not involve computer evidence. A research has estimated of over 85% of criminal and civil prosecution cases have involved digital evidence [3]. These crimes include fraud, hacking identity theft and other illegal activities. Consequently, Cyber crimes have a massive impact on world economies. Studies carried out in USA and UK companies indicate that the financial losses due to cyber crimes are very high [4, 5]. Therefore, several businesses have lost reputation, while violation to individual privacy and even public safety and national security interests are also in rise. Thus, securing information system assets of organizations has also become more complex and highly recommended as computer resources become more vital. Cyber forensic exists as a response to combat crimes committed by leveraging computer utilities either as source of crime, stores of crime s data or facilitating criminal activities. Z. Hamzah [6] defines Cyber forensic as legal aspects of computer investigation and involves the analysis of digital evidence covering the identification, examination, preservation and presentment of potential electronic evidence in a manner that would allow such evidence to be admitted in a court of law. Cyber forensics can play a significant role in computer and network security, information assurance, law enforcement, and national defence [1]. For instance, Cyber forensic investigators (CFIs) play a vital role in contingency planning in business or National Critical Corporations (NCC). This comes due to the fact that both service return and maintaining crime evidence are required when systems are compromised [7]. In addition to that, the task of the CFIs is not only to investigate crimes but it also to teach the laymen when presenting technical testimony terms in court. Therefore, they must have qualifications, skills, experience, education and training in the relevant field in order to meet the investigation requirements [8]. In spite of the fact that the Cyber forensic goes backs to 30 years ago, and new training/education qualifications emerge regularly in some development countries, researchers have found that many countries around the world lack Cyber forensic investigators [9, 10, 11]. The lack of professionalism in Cyber forensic comes due to some factors. For instances, training and education services on Cyber forensics investigation are relatively new. Furthermore, many of the qualifications are presented by vendors and owners of investigation tools. In addition, most of the training/education providers concentrate on the system weakness or training trainees on the use of specific tools or techniques, rather than concentrating on knowledge, skills, ability (KSA) and assessment needs [12]. Moreover, most of them are not verified by independent external examiner and accreditation bodies [13]. In this paper, the authors (Digital Forensics certification holders) contribution is to review the current situation of the Cyber forensic education and training competency assessment quality assurance (internal/external ) /11/$ IEEE V4-346

2 and accreditation [13]; in both academic and non academic institutions. This paper is divided into four sections. The first section introduces the problem behind this paper. Section two presents a critical analysis concerning the accreditation and competency assessment quality assurance in Cyber forensic training/education institutions. In section three, the authors discuss the result of the analysis, and section four summarizes the findings. II. ACCREDITATION AND QUALITY ASSURANCE Quality assurance is a process of assessing quality through both planned and orderly actions in order to show a product/service confidence or specific requirements for quality are met on the service offered [14]. Thus, the Quality assurance systems would minimize the risks inherent in training providers by maintaining the quality of teaching/training and assessment methods carried on training providers. W. Pond [15] states Accreditation as the procedure by which an authoritative body gives formal recognition that a body or person is competent to carry out specific tasks. Accreditation is a header of the quality assurance program that monitors the efforts of management practices, personnel performance, internal and external quality system and procedures exerted to meet national and/or international standards [14]. Accreditation has many benefits, including:- Validation and external value assurance. Encourages students/trainees to select a program. Proves the quality of the program. Training/educational programs are classified into four categories as follows:- A. Associate and Diploma Degree Programs The authors revision covers a total of five programs; see Table I. West Virginia University [16], University of North Texas [17, 19] and North American educational institutions [20] from the USA offer associate degree programs of Cyber Forensics. Edith Cowan University [17, 21] and Canberra Institute of Technology [17] from Australia both offer Computer Forensic Advanced Diplomas. For the five training/education programs, only the West Virginia University shows an expectation to implement accreditation program; while internal and external are not in other programs. TABLE I. ASSOCIATE AND DIPLOMA DEGREE PROGRAMS Countries USA Australia Total Numbers of Training providers Internal External Stated/ expected Stated/ expected Accreditation Stated/ expected 1-1 B. Certificate Programs Eight Cyber forensics training/education programs offering certifications are analyzed.the programs vary in terms of providing a subject in computer forensic, to awarding academic certificate in digital forensics. In Australia, University of South Australia [17], and University of Melbourne School of Enterprise [33] offer Cyber forensics certification program. Only University of South Australia shows accreditation system. Likewise, West Virginia University [16] has expectations to have accreditation from an accrediting body recognized by the U.S. Department of Education, while the others programs such as Cypress College s CIS certificate programs [18], InfoSec Institute [23], SANS [36] and CyberSecurity Institute [37] don t show their accreditation system. It is important to note that the International Society of Forensic Computer Examiners (ISFCE) [22] offers Certified Computer Examiner (CCE) which primarily focuses on quality assurance program; whereas the internal quality is revised by ISFCE Certification Board, ISFCE Ethical Standards Committee and Certification Candidate Appeal Committee. Also, in order to maintain its external quality the ISFCE reviews all course material and assesses whether the curriculum adequately meets the testing standards for the Certified Computer Examiner (CCE) exam or not. TABLE II. CERTIFICATE PROGRAMS Countries USA Australia Total Numbers of Training providers Internal Stated/ expected External Stated/ expected Accreditation Stated/ expected C. Undergraduate Programs Undergraduate degree programs in Cyber forensic cover a wide range of topics. Twenty undergraduate programs from different countries are reviewed (see Table III). Ten training/education providers in USA [34, 35]: Central Michigan University [25], California State University [26], California State Polytechnic University [26], Poly Pomona [26], Longwood University [27], West Virginia University [16], University of North Texas [17] Sam Houston State University [29] and Department of Information and Computer Sciences Metropolitan State University [30] offer undergraduate degree programs in Cyber forensic and computer information system. Only West Virginia University offers a program with an expected accreditation V4-347

3 from accrediting bodies recognized by the U.S. Department of Education. In addition, the competency assessment quality assurance is not by all of training/education providers. Canterbury Christ Church University in U.K [31] provides an undergraduate degree in Cyber forensic programs and shows both competency assessment quality assurance and accreditation that comply by The Quality Assurance Agency for Higher Education (QAA), which fully met with European standards. Furthermore, eight training/education providers from Australia: University of Western Sydney [17], Garda College [9], Deakin University [28, 32], Edith Cowan University [17, 21] and Murdoch University [17, 24], provide Bachelor of Counter Terrorism, Security and Intelligence (Computer Science), Bachelor of Computer Science (Computer Security), Bachelor of Information Technology (Computer Security), and BSc. in Cyber Forensics, Information Security and Management. Three of them have accreditation bodies such as The Information Systems Audit and Control Association (ISACA) and Australian Computer Society (ACS), while all of them haven t claimed their competency assessment internal procedures. Hebei University of Police [10] in China offers a 4-year study digital forensics program, whose accreditation is not confirmed as well as the quality assurance system. TABLE III. UNDERGRADUATE PROGRAMS Countries USA U. K Australia China Total Numbers of Training providers Internal Stated/ expected External Stated/ expected Accreditation Stated/ expected D. Graduate Programs Master and graduate diploma programs have a significant contribution in Cyber forensics training/education fields. Several training/education providers conduct different types of Master/graduate diploma programs as shown in Table IV. In USA only West Virginia University [16] shows an accreditation program expectation by a recognized body of Education Department, while Longwood University [27] and University of North Texas [17] are not. Similarly all universities don t maintain their competency assessment quality assurance. In UK, only one program [31] offered at master degree level in Cyber forensics is reviewed. It shows an adoption of competency assessment quality assurance and accreditation. The rest of the others programs are from Australia. Edith Cowan University [17] provides Master of digital forensic, Master of computer security, Graduate diploma of digital forensics and Graduate certificate of digital forensics [21]. Also, the University of South Australia [17] offers Msc. (Computer & Info Sc.). Curtin University of Technology [17] provides Master of internet security and forensics. Macquarie University [17] offers Postgraduate Certificate in Computer Forensics. Furthermore, University of Melbourne School of Enterprise [17], [28] offers Master of forensics and enterprise security. However, only University of South Australia and Curtin University of Technology maintain their accreditation program by ACS, British Computer Society (BCS) and Australian and New Zealand Forensic Science Society (ANZFSS); while all of them don t state their competency assessment internal and external TABLE IV. GRADUATE PROGRAMS Countries USA U K. Australia Total Numbers of Training providers Internal Stated/ expected External Stated/ expected Accreditation Stated/ expected III DISCUSSION The notion of training/education quality is very old. Both private and public educational providers concern with products/services quality. If the services/products do not have market value due to poor quality, the institution will collapse. Cyber forensics education/training programs have specific purposes /objectives to target trainees. Those targets play a significant role to determine the quality assurance services. Regardless of the type of training program, traditional quality assurance methods such as library utilities, teaching and contact hours, examination monitoring and so forth are often impractical or irrelevant in today s Cyber forensic training/education reality. As mentioned earlier, the objective of this study focuses on competency assessment quality assurance and accreditation of the training/education program rather than the entire traditional quality assurance methods. The result in Table (I) (Associate and Diploma Degree Programs) shows similarities on the situation of both internal and accreditation. They are totally not in the whole programs. In addition to that, only one of four organizations (25%) confirmed its accreditation expectation. Table II which tabulates Certificate Programs shows only 12.5% internal and accreditation. The result of the analysis on Undergraduate Programs (Table III) shows 5% external, 5% internal and 25% V4-348

4 accreditation. Finally, Table IV, Master/Graduate diploma shows 10% to internal verifier, 10% external verifier, and 40% to accreditation. IV. CONCLUSION In summary, Cyber forensic training/education services proliferate to diverse qualifications, from a handful of day s workshop to Masters Degree in Cyber forensics. With the immaturity of education/training and practicing field, most of the training/education providers don t worry about the competency assessment quality assurance and accreditation. Therefore, the situation contributes on poor services delivery and outcomes. The study shows the total of competency assessment quality internal range from 0% to 12.5%, external is from 0% to 10% and accreditation is from 20% to 40. These results reflect that the area of Cyber forensic training/education has insufficient concerns on assessment quality assurance and accreditation. V. ACKNOWLEDGEMENT This work is of a research that has been done in (UTM), under support from Ministry of Science, Technology & Innovation, Malaysia. REFERENCES [1] W. Figg and Z. Zhou, computer Forensics Minor Curriculum Proposal, Department of Computer Information Systems, Dakota State University, Madison, SD 57042, portal.acm.org/ft_gateway.cfm?id= &type=pdf, 2007 [2] J. Fernandez, S. Smith, M. Garcia and D. Kar, Computer forensics: a critical need in computer science programs, Journal of Computing Sciences in Colleges, Volume 20 Issue 4, Consortium for Computing Sciences in Colleges, 2005 [3] C. Taylor, B. Endicott-Popovsky and A. Phillips, Forensics Education: Assessment and Measures of Excellence, Proceedings of the Second International Workshop on Systematic Approaches to Digital Forensic Engineering (SADFE'07), 2007 [4] J. Venter, Process Flows for Cyber Forensics Training and Operation, Pretoria, South Africa, researchspace.csir.co.za/dspace/bitstream/10204/1073/1/venter_2006.pdf, (2006). [5] R. Pidanick, An Investigation of Computer Forensics, Information System Control Journal, Volume 3, /Documents/jpdf043-InvestigationofComputerForensics.pdf [6] Z. Hamzah, E-Security Law & Strategy, Malayan Law Journal Sdn Bhd, Kelana Jaya Malaysia, KL, ISBN pp. 122 [7] D. Hopkins, Innovative Corporation Solutions, Inc, ofcomputerforensics.pdf, 2006 [8] Schroeder S.C., How to be a Digital Forensic Expert Witness, Systematic Approaches to Digital Forensic Engineering, First International Workshop on, 7-9 Nov. 2005, pp [9] D. Bem and E. Huebner Computer Forensics Workshop for Undergraduate Students, crpit.com/confpapers/crpitv78bem.pdf,2008, last surf on 8 Aug [10] L. Zhijun and W. Ning, Developing a Computer Forensics Program in Police Higher Education, Computer Science & Education. ICCSE '09. 4th International Conference on, July 2009, pp [11] S. Lim, Demand up, supply short for forensic professionals Anonymous, New Straits Times, Kuala Lumpur, Jul 20, pp. 5 [12] K Nance, H. Armstrong and C. Armstrong, Defining an Education Agenda, System Sciences (HICSS), rd Hawaii International Conference on, Digital Object Identifier: /HICSS , Publication Year: 2010, pp [13] JJ Barbara, Certification and Accreditation Overview, , [14] EURIM, Supplying the Skills for Justice, [15] W. Pond, Twenty-first century education and training: Implications for quality assurance, The Internet and Higher Education, Volume 4, Issues 3-4, 2001, pp [16] West Virginia University Forensic Science Initiative, Technical Working Group for Education and Training in Digital, [17] E. Huebner, D. Bem and Ch. Ruan, Computer Forensics Tertiary Education in Australia, Computer Science and Software Engineering, 2008 International Conference on, Volume 5, Dec pp [18] D. Wassenaar, D. Woo and P. Wu, A certificate program in computer forensics, Journal of Computing Sciences in Colleges, Volume 24 Issue 4, Consortium for Computing Sciences in Colleges, 2009 [19] Graduate Studies, Criminal justice, 10 Aug 2010 [20] L. Gttschalk, J. Liu, B. Dathan, S. Fitzgerald and M. Stein, Computer forensics programs in higher education: a preliminary study, Proceedings of the 36th SIGCSE technical symposium on Computer science education, ACM, [21] Edith Cowan University, Digital forensic courses, :jzqn_jrbvsm&cof=FORID:11&sa=Search&tab=websi te&x=12&y=9 [22] ISFCE, CCE Certification, The International Society of Forensic Computer Examiners, [23] InfoSec Institute, Computer Forensics Training, [24] Murdoch University, Cyber Forensics, Security-and-Management/ [25] Yasinsac A., Erbacher R.F., Marks D.G., Pollitt M.M. and Sommer, P.M, Computer forensics education, Security & Privacy, IEEE, Volume 1, Issue 4, July-Aug pp [26] L. Soe, D. Manson and M. Wright, Establishing Network Computer Forensics Classes, InfoSecCD '04, Proceedings of the 1st annual conference on Information security curriculum development, ACM, October [27] G. Dardick and L. Lau, Interdisciplinary minor in digital forensics, security and law, SIGITE '05, Proceedings of the 6th conference on Information technology education, ACM, October 2005 [28] Deakin university, Bachelor of Information Technology (I.T. Security), =digital%20forensic [29] D. Collins and T. McGuire, Using the dc3 forensic challenge as a basis for a special topics digital forensics upper level undergraduate course*, Journal of Computing Sciences in Colleges, Volume 23 Issue 6, Consortium for Computing Sciences in Colleges, June [30] J. Liu, Implementing a baccalaureate program in computer forensics*, Implementing a baccalaureate program in computer forensics, Journal of Computing Sciences in Colleges, Volume 25 Issue 3, Consortium for Computing Sciences in Colleges, January [31] Stephens, Paul, Induruwa and Abhaya, Cybercrime investigation training and specialist education for the European Union, Proceedings - 2nd International Annual Workshop on Digital Forensics and Incident Analysis, WDFIA 2007, Proceedings - 2nd International Annual Workshop on Digital Forensics and Incident Analysis, WDFIA pp [32] Batten L and L. Pan, Teaching Digital Forensics to Undergraduate Students, Security & Privacy, IEEE,Volume 6, Issue 3, May-June 2008, pp V4-349

5 [33] MCCP, Master of eforensics and Enterprise Security, [34] L. Troell, Y. Pan, B. Stackpole, Forensic Course Development Computer Forensics, CITC4 '03, Proceedings of the 4th conference on Information technology curriculum, ACM, October 2003I. [35] Luther T. et al. Forensic Course Development One Year Later. SIGITE 04, October 28 30, 2004, Salt Lake City, Utah, USA. ACM /04/0010 [36] SANS, GIAC Forensic Certification, [37] CSI, Computer forensic fundamentals, amentals.htm V4-350

Textbooks for Computer Forensic Courses: A Preliminary Study

Textbooks for Computer Forensic Courses: A Preliminary Study Textbooks for Computer Forensic Courses: A Preliminary Study Jigang Liu, Larry Gottschalk, Kuodi Jian Department of Information and Computer Sciences Metropolitan State University St. Paul, Minnesota USA

More information

Information Security Management Curriculum Development: An Australian Example

Information Security Management Curriculum Development: An Australian Example Proceedings of Informing Science & IT Education Conference (InSITE) 2009 Information Security Management Curriculum Development: An Australian Example Matthew Warren and Shona Leitch School of Information

More information

AN ANALYSIS OF THE CURRICULUM COMPONENTS OF COMPUTER FORENSICS UNDERGRADUATE COURSES IN THE UNITED KINGDOM

AN ANALYSIS OF THE CURRICULUM COMPONENTS OF COMPUTER FORENSICS UNDERGRADUATE COURSES IN THE UNITED KINGDOM AN ANALYSIS OF THE CURRICULUM COMPONENTS OF COMPUTER FORENSICS UNDERGRADUATE COURSES IN THE UNITED KINGDOM Paula Thomas Faculty of Advanced Technology, University of Glamorgan 2 CF37 1DL, Pontypridd pthomas@glam.ac.uk

More information

Forensic Computing Training, Certification and Accreditation: An Australian Overview

Forensic Computing Training, Certification and Accreditation: An Australian Overview Forensic Computing Training, Certification and Accreditation: An Australian Overview Matthew Simon, Jill Slay Centre of Excellence in Defence and Industry Systems Capability (CEDISC), Defence and Systems

More information

On the Development of a Digital Forensics Curriculum

On the Development of a Digital Forensics Curriculum On the Development of a Digital Forensics Curriculum Manghui Tu 1 Department of Computer Information Technology and Graphics Purdue University Calumet Dianxiang Xu College of Business and Information Systems

More information

Carrier B. and Spafford E. (2003). Getting Physical with the Digital Investigation Process. International Journal of Digital Evidence. Volume 2(2).

Carrier B. and Spafford E. (2003). Getting Physical with the Digital Investigation Process. International Journal of Digital Evidence. Volume 2(2). 140 RUJUKAN Agarwal, A. et al. (2011). Systematic Digital Forensic Investigation Model.International Journal of Computer Science and Security (IJCSS),.Volume 5 (Issue 1). Ali, K.M. (2012). Digital Forensics

More information

Postgraduate. eforensics. swinburne.edu.au/postgrad

Postgraduate. eforensics. swinburne.edu.au/postgrad Postgraduate eforensics swinburne.edu.au/postgrad Program details }} Graduate Certificate in eforensics The postgraduate program in eforensics aims to deliver high-quality industry-relevant education to

More information

MALAYSIA ANTI-CORRUPTION ACADEMY: GLOBAL COMMITMENT TOWARDS ANTI-CORRUPTION CAPACITY BUILDING

MALAYSIA ANTI-CORRUPTION ACADEMY: GLOBAL COMMITMENT TOWARDS ANTI-CORRUPTION CAPACITY BUILDING MALAYSIA ANTI-CORRUPTION ACADEMY: GLOBAL COMMITMENT TOWARDS ANTI-CORRUPTION CAPACITY BUILDING PRESENTER: ROHAIZAD YAAKOB SENIOR ASSISTANT DIRECTOR INTERNATIONAL STUDIES CENTRE MALAYSIA ANTI-CORRUPTION

More information

Australian Accreditation Centre Engineering Technology Programs Accredited by Engineers Australia (Last updated 9 April 2014)

Australian Accreditation Centre Engineering Technology Programs Accredited by Engineers Australia (Last updated 9 April 2014) Australian Accreditation Centre Engineering Technology Programs Accredited by Engineers Australia (Last updated 9 April 2014) Contents Introduction... 2 Accreditation of Australian Engineering Technology

More information

Developing and Enhancing Cyber Security Capabilities in the Region. Khaled Gamo Technology Advisor Ministry of communication and informatics

Developing and Enhancing Cyber Security Capabilities in the Region. Khaled Gamo Technology Advisor Ministry of communication and informatics Developing and Enhancing Cyber Security Capabilities in the Region Khaled Gamo Technology Advisor Ministry of communication and informatics 1 Content 1 2 3 Cyber Security Strategy and Key Requirement Efforts

More information

Computer Forensics Examiners as Private Investigators: The Role of Academia in the Debate. CDFSL 2008 Oklahoma City, OK April 23, 2008

Computer Forensics Examiners as Private Investigators: The Role of Academia in the Debate. CDFSL 2008 Oklahoma City, OK April 23, 2008 Computer Forensics Examiners as Private Investigators: The Role of Academia in the Debate CDFSL 2008 Oklahoma City, OK April 23, 2008 Gary C. Kessler Champlain College Burlington, VT DISCLAIMER I teach

More information

CFET 2008 Conference Schedule

CFET 2008 Conference Schedule CFET 2008 Conference Schedule Day 1 1 st September 2008 10.00-10.30 Registration & Coffee foyer Powell Building 10.30-10.45 Welcome to the Conference Professor Michael Wright, Vice Chancellor Denis Edgar-Nevill,

More information

First Pacific Islands Capacity Building Workshop on Child Online Protection

First Pacific Islands Capacity Building Workshop on Child Online Protection First Pacific Islands Capacity Building Workshop on Child Online Protection Extracting Intelligence to Turn the Tables on Child Abuse Material Traffickers. Dr Allan Watt Centre for Policing, Intelligence

More information

Cybercrime & Cybersecurity: the Ongoing Battle International Hellenic University

Cybercrime & Cybersecurity: the Ongoing Battle International Hellenic University Cybercrime & Cybersecurity: the Ongoing Battle International Hellenic University Andreas Athanasoulias, CISM, CISSP Information Security Officer & Security Consultant Brief introduction My career path

More information

Digital Forensics Department- 2008 Report Submission Date: 08 th March 2009

Digital Forensics Department- 2008 Report Submission Date: 08 th March 2009 Digital Forensics Department- 2008 Report Submission Date: 08 th March 200 1.0 Introduction 2008 has been a very challenging year for Digital Forensics Department (DFD) with the increase of cases from

More information

Computer Forensics and Security Management (MSCFSM)

Computer Forensics and Security Management (MSCFSM) Computer Forensics and Security Management (MSCFSM) View PDF of Computer Forensics and Security Management Admissions Checklist Prospective students should use this checklist to obtain specific admissions

More information

Jason Jordaan: MTech, BTech, CFE, PMCSSA, ACE

Jason Jordaan: MTech, BTech, CFE, PMCSSA, ACE Jason Jordaan: MTech, BTech, CFE, PMCSSA, ACE 9 Cranbrook Road, Sunnyridge, East London, 5201 Cellphone Number: 083 556 7112 E-Mail: JJordaan@siu.org.za Professional Summary A multidisciplinary digital

More information

Union County College Faculty Curriculum Committee. New Course Proposal Form

Union County College Faculty Curriculum Committee. New Course Proposal Form Union County College Faculty Curriculum Committee New Course Proposal Form To all faculty members seeking to introduce a new course proposal to the Curriculum Committee, please make sure to complete the

More information

On the Development of a Digital Forensics Curriculum

On the Development of a Digital Forensics Curriculum Journal of Digital Forensics, Security and Law Volume 7 Number 3 Article 2 2012 On the Development of a Digital Forensics Curriculum Manghui Tu Purdue University, Calumet Dianxiang Xu Dakota State University

More information

Nettitude Ltd. (FHEQ) level 7] MSc Postgraduate Diploma Postgraduate Certificate. British Computer Society (BCS) Master s Degree in Computing

Nettitude Ltd. (FHEQ) level 7] MSc Postgraduate Diploma Postgraduate Certificate. British Computer Society (BCS) Master s Degree in Computing Faculty of Engineering and Informatics Programme Specification Programme title: MSc Cyber Security Academic Year: 2015/16 Degree Awarding Body: Partner(s), delivery organisation or support provider (if

More information

PROGRAMME DEVELOPMENT UNIT

PROGRAMME DEVELOPMENT UNIT PROGRAMME DEVELOPMENT UNIT BUILDING THE NATIONAL QUALIFICATIONS FRAMEWORK AT INSTITUTIONAL LEVEL The Programme Development Unit in the Office of the Vice-Rector: Academic Affairs and Research has overall

More information

GUIDELINES FOR FORENSIC LABORATORY MANAGEMENT PRACTICES INTRODUCTION

GUIDELINES FOR FORENSIC LABORATORY MANAGEMENT PRACTICES INTRODUCTION GUIDELINES FOR FORENSIC LABORATORY MANAGEMENT PRACTICES INTRODUCTION The American Society of Crime Laboratory Directors is a professional organization of managers and supervisors employed in forensic laboratories.

More information

DEVELOPMENT AND DISSEMINATION OF A NEW MULTIDISCIPLINARY UNDERGRADUATE CURRICULUM IN DIGITAL FORENSICS

DEVELOPMENT AND DISSEMINATION OF A NEW MULTIDISCIPLINARY UNDERGRADUATE CURRICULUM IN DIGITAL FORENSICS DEVELOPMENT AND DISSEMINATION OF A NEW MULTIDISCIPLINARY UNDERGRADUATE CURRICULUM IN DIGITAL FORENSICS Masooda Bashir (mnb@illinois.edu) Graduate School of Library and Information Science Jenny A. Applequist

More information

An Analysis of Computer Forensic Practitioners Perspectives on Education and Training Requirements

An Analysis of Computer Forensic Practitioners Perspectives on Education and Training Requirements An Analysis of Computer Forensic Practitioners Perspectives on Education and Training Requirements Colin J. Armstrong Gailaad Pty Ltd, Perth, Western Australia ColinArmstrong@gailaad.com Abstract. It could

More information

Emerging risks for internet users

Emerging risks for internet users Sabeena Oberoi Assistant Secretary, Cyber Security and Asia Pacific Branch Department of Broadband, Communications and the Digital Economy Government s role - DBCDE The new Australian Government Cyber

More information

S u p p o r t i n g f o r e n s i c p r a c t i t i o n e r s w o r l d w i d e. Copyright of The Chartered Society of Forensic Sciences

S u p p o r t i n g f o r e n s i c p r a c t i t i o n e r s w o r l d w i d e. Copyright of The Chartered Society of Forensic Sciences S u p p o r t i n g f o r e n s i c p r a c t i t i o n e r s w o r l d w i d e Copyright of The Chartered Society of Forensic Sciences . Education and Industry Liaison Forum Home Office, London 19 th

More information

Protecting Malaysia in the Connected world

Protecting Malaysia in the Connected world Protecting Malaysia in the Connected world cyber Security Company of the Year (Cybersecurity Malaysia, 2014) Most innovative information security company in Malaysia (Cybersecurity Malaysia, 2012) BAE

More information

Advancing Digital Forensics

Advancing Digital Forensics Advancing Digital Forensics Katrin Franke 1, Erik Hjelmås 1, and Stephen D. Wolthusen 1,2 1 Norwegian Information Security Laboratory, Department of Computer Science, Gjøvik University College, Norway,

More information

Foreign language 6 + 2. Physical education 3 + + 10. State security 5 + 11. Internal security of the European Union 3 + + 12.

Foreign language 6 + 2. Physical education 3 + + 10. State security 5 + 11. Internal security of the European Union 3 + + 12. LEVEL OF EDUCATION: first degree FIELD OF STUDY: Internal security SPECIALISATION: none PROFILE OF EDUCATION: general academic No. Subject ECTS credits Taught in Polish Taught in English 1. Foreign language.

More information

Short courses presented by the NWU Programme in Forensic Accountancy

Short courses presented by the NWU Programme in Forensic Accountancy Short courses presented by the NWU Programme in Forensic Accountancy Certificate in: Commercial Forensic Accounting Commercial Forensic Law Commercial Forensic Investigation Commercial Forensic Information

More information

Modalities for Forensic Review of Computer Related Frauds

Modalities for Forensic Review of Computer Related Frauds Modalities for Forensic Review of Computer Related Frauds Neneh Addico (CFE, CA), MTN Ghana Outline Recent Computer Crime Cases What is Computer Crime Forensics Types of Computer Related Crimes Relevance

More information

MSc Forensic Information Technology

MSc Forensic Information Technology MSc Forensic Information Technology Programme Specification Primary Purpose: Course management, monitoring and quality assurance. Secondary Purpose: Detailed information for students, staff and employers.

More information

Cyber Security Operations Centre Reveal Their Secrets - Protect Our Own Defence Signals Directorate

Cyber Security Operations Centre Reveal Their Secrets - Protect Our Own Defence Signals Directorate Cyber Security Operations Centre Reveal Their Secrets - Protect Our Own Defence Signals Directorate Contents Message from the Director 3 Cyber Security Operations Centre 5 Cyber Security Strategy 7 Conversation

More information

BACHELOR OF CRIMINOLOGY AND SECURITY MANAGEMENT(BCSM

BACHELOR OF CRIMINOLOGY AND SECURITY MANAGEMENT(BCSM About the programme Crime and security related matters have become a major concern in modern society. In view of this development, it has become increasingly necessary to enhance the capacity of institutions

More information

Ernesto F. Rojas CISSP, DFCP, IAM, IEM, DABRI, PSC, MBA

Ernesto F. Rojas CISSP, DFCP, IAM, IEM, DABRI, PSC, MBA Ernesto F. Rojas CISSP, DFCP, IAM, IEM, DABRI, PSC, MBA Mr. Rojas has over 25 years of information systems consulting, supervisory, managerial and executive experience in various industries. He is considered

More information

ENGINEERS AUSTRALIA ACCREDITATION WEBSITE

ENGINEERS AUSTRALIA ACCREDITATION WEBSITE Contents AUSTRALIAN COLLEGE OF KUWAIT (Next General Review 2018)... 3 AUSTRALIAN MARITIME COLLEGE (Next General Review 2020)... 4 AUSTRALIAN NATIONAL UNIVERSITY... 6 CENTRAL QUEENSLAND UNIVERSITY (ROCKHAMPTON

More information

CYBER SECURITY TRAINING SAFE AND SECURE

CYBER SECURITY TRAINING SAFE AND SECURE CYBER SECURITY TRAINING KEEPING YOU SAFE AND SECURE Experts in Cyber Security training. Hardly a day goes by without a cyber attack being reported. With this ever-increasing threat there is a growing need

More information

How To Get A Degree From A University

How To Get A Degree From A University REGULATION 3 COLLEGES Approved by Council: 30 November 2005 Revised by Council: 18 May 2011, 16 October 2013, 7 May 2014 3.1 The Council may designate an institution as a recognised teaching institution

More information

Scientific Working Group on Digital Evidence (SWGDE)

Scientific Working Group on Digital Evidence (SWGDE) Scientific Working Group on Digital Evidence (SWGDE) Position on the National Research Council Report to Congress Strengthening Forensic Science in the United States: A Path Forward In the National Research

More information

counter fraud specialist (cacfs)

counter fraud specialist (cacfs) CIPFA accredited counter fraud specialist (cacfs) Building the counter fraud profession CIPFA COUNTER FRAUD CENTRE It will certainly help us to safeguard our assets against the risk of fraud. And it will

More information

understanding and managing enterprise risk; evaluating organizational structure and communications; assessing and handling insider threats;

understanding and managing enterprise risk; evaluating organizational structure and communications; assessing and handling insider threats; GermanoLawLLC provides client- focused counsel and assistance regarding cybersecurity and data privacy concerns. We help companies understand, prepare for and address internal and external cybersecurity

More information

ERM Symposium April 2009. Moderator Nancy Bennett

ERM Symposium April 2009. Moderator Nancy Bennett ERM Symposium April 2009 RI4-Implementing a Comprehensive Privacy Program John Kelly Joseph Nocera Moderator Nancy Bennett Data & Identity Theft: Keeping sensitive data out of the wrong hands Presented

More information

Developments in cybercrime and cybersecurity

Developments in cybercrime and cybersecurity Developments in cybercrime and cybersecurity Developments in cybercrime and cybersecurity As customers and clients increasingly go online to do their banking with convenience, privacy and security their

More information

CURRICULUM VITAE. Jason Jordaan: CFE, PMCSSA, ACE

CURRICULUM VITAE. Jason Jordaan: CFE, PMCSSA, ACE CURRICULUM VITAE Jason Jordaan: CFE, PMCSSA, ACE MTech (Forensic Investigation), BComHons (Information Systems), BSc (CJ Computer Science) Summa Cum Laude, BTech (Policing) +27 (083) 556 7112 jjordaan@siu.org.za

More information

Tertiary Institution Accreditation and Endorsement 2015 Valuation

Tertiary Institution Accreditation and Endorsement 2015 Valuation Tertiary Institution Accreditation and Endorsement 2015 Valuation National Office ABN 49 007 505 866 6 Campion Street Deakin ACT 2600 Telephone: 02 6282 2411 Facsimile: 02 6285 2194 Email: national@api.org.au

More information

WILLIAM OETTINGER PHONE (702) 292-4645 WOETTINGER@GMAIL.COM

WILLIAM OETTINGER PHONE (702) 292-4645 WOETTINGER@GMAIL.COM WILLIAM OETTINGER PHONE (702) 292-4645 WOETTINGER@GMAIL.COM SUMMARY OF QUALIFICATIONS Veteran investigator in a traditional and computer-related environment. A leader experienced in organizing, directing,

More information

April 2014. Revised February 2016. College of Education, Criminal Justice and Human Services. School Of Criminal Justice

April 2014. Revised February 2016. College of Education, Criminal Justice and Human Services. School Of Criminal Justice School Of Baccalaureate Degree in 18 BS CJ and 18 BS-DL CJ-DL College of Education, and Human Services April 2014 Revised February 2016 Primary Faculty: Sue Bourke (513) 556-1353 susan.bourke@uc.edu Ed

More information

FACULTY OF ACCOUNTANCY (FPK) PROGRAMMES OFFERED MASTER OF BUSINESS ADMINISTRATION (ACCOUNTING)

FACULTY OF ACCOUNTANCY (FPK) PROGRAMMES OFFERED MASTER OF BUSINESS ADMINISTRATION (ACCOUNTING) FACULTY OF ACCOUNTANCY (FPK) PROGRAMMES OFFERED 1. MBA (Accounting) - Coursework 2. MBA (Professional Accounting) - Coursework 3. MBA (E-commerce) - Coursework 4. MSc (International Accounting) - Coursework

More information

Identifying Cyber Risks and How they Impact Your Business

Identifying Cyber Risks and How they Impact Your Business 10 December, 2014 Identifying Cyber Risks and How they Impact Your Business David Bateman, Partner, K&L Gates, Seattle Sasi-Kanth Mallela, Special Counsel, K&L Gates, London Copyright 2013 by K&L Gates

More information

ISO 27001 Information Security Management Services (Lot 4)

ISO 27001 Information Security Management Services (Lot 4) ISO 27001 Information Security Management Services (Lot 4) CONTENTS 1. WHY LEICESTERSHIRE HEALTH INFORMATICS SERVICE?... 3 2. LHIS TECHNICAL ASSURANCE SERVICES... 3 3. SERVICE OVERVIEW... 4 4. EXPERIENCE...

More information

GEMSAS Grade Point Average calculations

GEMSAS Grade Point Average calculations GEMSAS Grade Point Average calculations For the purposes of selection of graduate-entry applicants into Australian medical schools belonging to the GAMSAT Consortium, the following guidelines have been

More information

Education Capability. Major Sporting Events

Education Capability. Major Sporting Events Australian Education And Training Capability Major Sporting Events Contents Australian education and training in events 3 HIGHER EDUCAtion 4 Edith Cowan University 4 Griffith University 4 James Cook University

More information

Cyber Crime and Digital Forensics in Japan

Cyber Crime and Digital Forensics in Japan Cyber Crime and Digital Forensics in Japan Tetsutaro UEHARA Academic Center for Computing and Media Studies, Kyoto University uehara@media.kyoto-u.ac.jp Table of Contents Introduction: Motivation and Background

More information

COLORADO STATE UNIVERSITY, GLOBAL CAMPUS NEW DEGREE PROGRAMS

COLORADO STATE UNIVERSITY, GLOBAL CAMPUS NEW DEGREE PROGRAMS Page 1 of 5 TOPIC: PREPARED BY: COLORADO STATE UNIVERSITY, GLOBAL CAMPUS NEW DEGREE PROGRAMS MARGOT PLOTZ I. SUMMARY This agenda items requests approval of seven new degree programs at Colorado State University,

More information

Computer Forensics Workshop for Undergraduate Students

Computer Forensics Workshop for Undergraduate Students Computer Forensics Workshop for Undergraduate Students Derek Bem and Ewa Huebner School of Computing and Mathematics University of Western Sydney Penrith Campus, Locked bag 1797, Penrith South DC NSW 1797,

More information

CYBERSECURITY IN FINANCIAL SERVICES POINT OF VIEW CHALLENGE 1 REGULATORY COMPLIANCE ACROSS GEOGRAPHIES

CYBERSECURITY IN FINANCIAL SERVICES POINT OF VIEW CHALLENGE 1 REGULATORY COMPLIANCE ACROSS GEOGRAPHIES POINT OF VIEW CYBERSECURITY IN FINANCIAL SERVICES Financial services institutions are globally challenged to keep pace with changing and covert cybersecurity threats while relying on traditional response

More information

June 2008 Report No. 08-037. An Audit Report on The Texas Education Agency s Oversight of Alternative Teacher Certification Programs

June 2008 Report No. 08-037. An Audit Report on The Texas Education Agency s Oversight of Alternative Teacher Certification Programs John Keel, CPA State Auditor An Audit Report on The Texas Education Agency s Oversight of Alternative Teacher Certification Programs Report No. 08-037 An Audit Report on The Texas Education Agency s Oversight

More information

Criminal Justice Technology course (Note a) 3 2220:100. Criminal Justice Technology course (Note a) 3 2220:100

Criminal Justice Technology course (Note a) 3 2220:100. Criminal Justice Technology course (Note a) 3 2220:100 BS Political Science / Criminal Justice 370010BST (Track 2) Attention students who were admitted to this program prior to Fall 2015, please refer to the curriculum guide found on page 6. The curriculum

More information

Sufficiency of Windows Event log as Evidence in Digital Forensics

Sufficiency of Windows Event log as Evidence in Digital Forensics Sufficiency of Windows Event log as Evidence in Digital Forensics Nurdeen M. Ibrahim & A. Al-Nemrat, Hamid Jahankhani, R. Bashroush University of East London School of Computing, IT and Engineering, UK

More information

RUSSELL IMPLEMENTATION SERVICES INC.

RUSSELL IMPLEMENTATION SERVICES INC. RUSSELL IMPLEMENTATION SERVICES INC. Part of Russell Investments 1301 Second Avenue, 18 th Floor Seattle, WA 98101 206-505-7877 WWW.RUSSELL.COM March 19, 2015 The following Brochure Supplements provide

More information

School of Physical and Geographical Sciences

School of Physical and Geographical Sciences School of Physical and Geographical s 1 About Keele Dual or Single Honours Programs Study TWO subjects Beautiful, safe campus Strong sense of community Low cost of living Student Life union, societies,

More information

LONDON METROPOLITAN UNIVERSITY Course Specification template

LONDON METROPOLITAN UNIVERSITY Course Specification template LONDON METROPOLITAN UNIVERSITY Course Specification template The University s course specification template has been developed to fulfil three main functions; it shall act: as a source of information for

More information

Australia Australia & H.K. New Zealand

Australia Australia & H.K. New Zealand THE OPEN UNIVERSITY OF HONG KONG ADVANCED STANDING OFFICE Total Credit Value of Qualifications Approved by Academic Board/Senate Australia Australia & H.K. New Zealand Australia, Australia & H.K., New

More information

RUSSELL INVESTMENT MANAGEMENT COMPANY

RUSSELL INVESTMENT MANAGEMENT COMPANY RUSSELL INVESTMENT MANAGEMENT COMPANY Part of Russell Investments 1301 Second Avenue, 18 th Floor Seattle, WA 98101 206-505-7877 WWW.RUSSELL.COM March 19, 2015 The following Brochure Supplements provide

More information

DIPLOMA IN DIPL FORENSIC ACCOUNTING

DIPLOMA IN DIPL FORENSIC ACCOUNTING DIPLOMA IN FORENSIC ACCOUNTING Web: www.bolc.co.uk Email: admissions@bolc.co.uk Course Introduction: With the increasing level of prosecution for financial fraud, the demand for forensic accountants has

More information

NORTH CAROLINA COMMUNITY COLLEGE SYSTEM H. Martin Lancaster, President

NORTH CAROLINA COMMUNITY COLLEGE SYSTEM H. Martin Lancaster, President NORTH CAROLINA COMMUNITY COLLEGE SYSTEM H. Martin Lancaster, President February 7, 2008 RESPONSE DEADLINE: February 28, 2008 MEMORANDUM TO: FROM: SUBJECT: Chief Academic Officers Delores A. Parker, Vice

More information

In an age where so many businesses and systems are reliant on computer systems,

In an age where so many businesses and systems are reliant on computer systems, Cyber Security Laws and Policy Implications of these Laws In an age where so many businesses and systems are reliant on computer systems, there is a large incentive for maintaining the security of their

More information

STUDYING FIRST YEAR FORENSIC COMPUTING: MANAGING THE STUDENT EXPERIENCE

STUDYING FIRST YEAR FORENSIC COMPUTING: MANAGING THE STUDENT EXPERIENCE STUDYING FIRST YEAR FORENSIC COMPUTING: MANAGING THE STUDENT EXPERIENCE David W Salt University of Derby School of Computing Derby d.w.salt@derby.ac.uk Harjinder Singh Lallie University of Derby School

More information

POLICING SUITE GUIDE SCHOOL OF LAW, CRIMINAL JUSTICE AND COMPUTING

POLICING SUITE GUIDE SCHOOL OF LAW, CRIMINAL JUSTICE AND COMPUTING POLICING SUITE GUIDE SCHOOL OF LAW, CRIMINAL JUSTICE AND COMPUTING POLICING SUITE 01 POLICING... 06 02 POLICING (CRIME SCIENCE)... 08 03 POLICING (CRIMINAL INVESTIGATION)... 10 04 POLICING (CRIMINAL PSYCHOLOGY)...

More information

IT Security Management 100 Success Secrets

IT Security Management 100 Success Secrets IT Security Management 100 Success Secrets 100 Most Asked Questions: The Missing IT Security Management Control, Plan, Implementation, Evaluation and Maintenance Guide Lance Batten IT Security Management

More information

SENATE STANDING COMMITTEE ON LEGAL AND CONSTITUTIONAL AFFAIRS AUSTRALIAN FEDERAL POLICE. Question No. 100

SENATE STANDING COMMITTEE ON LEGAL AND CONSTITUTIONAL AFFAIRS AUSTRALIAN FEDERAL POLICE. Question No. 100 SENATE STANDING COMMITTEE ON LEGAL AND CONSTITUTIONAL AFFAIRS AUSTRALIAN FEDERAL POLICE Question No. 100 Senator McKenzie asked the following question at the hearing on 24 May 2012: a) How do you define

More information

MSc Forensic Psychology. Programme Specification Faculty of Education, Law and Social Sciences May 2010

MSc Forensic Psychology. Programme Specification Faculty of Education, Law and Social Sciences May 2010 MSc Forensic Psychology Programme Specification Faculty of Education, Law and Social Sciences May 2010 Programme Specification: MSc Forensic Psychology NOTE: This specification provides a concise summary

More information

Nsw Policing Studies Criminal Law Handbook

Nsw Policing Studies Criminal Law Handbook Nsw Policing Studies Criminal Law Handbook Children and criminal law - children and police - Young Offenders Act Court (NSW) - criminal records - care and protection of children and young people. CSU's

More information

E. DOCTOR OF THEOLOGY (ThD) AWARD SUMMARY. Qualifications for Admission to Candidature

E. DOCTOR OF THEOLOGY (ThD) AWARD SUMMARY. Qualifications for Admission to Candidature E. DOCTOR OF THEOLOGY (ThD) AWARD SUMMARY Qualifications for Admission to Candidature Duration Structure English Proficiency A person may apply for admission to the ThD if he or she has obtained or is

More information

Promoting a cyber security culture and demand compliance with minimum security standards;

Promoting a cyber security culture and demand compliance with minimum security standards; Input by Dr. S.C. Cwele Minister of State Security, Republic of South Africa Cyber Security Meeting, Johannesburg 27 March 2014 I would like to thank the Wits School of Governance for inviting us to contribute

More information

USF Graduate Catalog 2015 2016 SECTION 18. http://www.grad.usf.edu/

USF Graduate Catalog 2015 2016 SECTION 18. http://www.grad.usf.edu/ SECTION 18 COLLEGE OF GRADUATE STUDIES (ADMINISTERED BY THE OFFICE OF GRADUATE STUDIES) 616 Section 18 College of Graduate Studies Changes to Note The following curricular changes for the Office of Graduate

More information

Cyber Security Strategy

Cyber Security Strategy NEW ZEALAND S Cyber Security Strategy 2015 A secure, resilient and prosperous online New Zealand Ministerial Foreword The internet and technology have become a fundamental element in our lives. We use

More information

RUSSELL REAL ESTATE ADVISERS, INC.

RUSSELL REAL ESTATE ADVISERS, INC. RUSSELL REAL ESTATE ADVISERS, INC. Part of Russell Investments 1301 Second Avenue, 18 th Floor Seattle, WA 98101 206-505-7877 WWW.RUSSELL.COM March 19, 2015 The following Brochure Supplements provide information

More information

The Arab Society for Forensic Sciences and Forensic Medicine (ASFSFM): Bringing together regional and international expertise

The Arab Society for Forensic Sciences and Forensic Medicine (ASFSFM): Bringing together regional and international expertise Arab Journal of Forensic Sciences and Forensic Medicine 2014; Volume 1 Issue (0), 17-21 17 Naif Arab University for Security Sciences Arab Journal of Forensic Sciences and Forensic Medicine www.nauss.edu.sa

More information

GUIDELINES ISSUED BY THE VALUERS REGISTRATION BOARD THE PROCESS FOR EVALUATING THE EQUIVALENCE OF

GUIDELINES ISSUED BY THE VALUERS REGISTRATION BOARD THE PROCESS FOR EVALUATING THE EQUIVALENCE OF Appendix 1 GUIDELINES ISSUED BY THE VALUERS REGISTRATION BOARD ON THE PROCESS FOR EVALUATING THE EQUIVALENCE OF NEW ZEALAND QUALIFICATIONS OTHER THAN VALUERS REGISTRATION BOARD ACCREDITED DEGREES AND INTERNATIONAL

More information

USF Graduate Catalog 2014 2015 SECTION 23. http://www.grad.usf.edu/

USF Graduate Catalog 2014 2015 SECTION 23. http://www.grad.usf.edu/ SECTION 23 COLLEGE OF GRADUATE STUDIES (ADMINISTERED BY THE OFFICE OF GRADUATE STUDIES) 616 Section 23 College of Graduate Studies Changes to Note The following curricular changes for the Office of Graduate

More information

Cybersecurity in Nepal

Cybersecurity in Nepal Cybersecurity in Nepal Presenter: Ambika Shrestha Chitrakar PhD candidate at Gjøvik University College Representing Nepal Linkedin: https://no.linkedin.com/in/ambikash IFIP TC3 ISES (Information Security

More information

TWINNING DEGREE PROGRAMMES TWINNING DEGREE PROGRAMMES 1

TWINNING DEGREE PROGRAMMES TWINNING DEGREE PROGRAMMES 1 TWINNING DEGREE PROGRAMMES W o r l d C l a s s D e g r e e s, T r u l y A s i a n V a l u e s TWINNING DEGREE PROGRAMMES 1 Edition 1/2010 MALAYSIA An Excellent Destination for Pursuing Higher Education

More information

REVISED GRID FOR MICRO LEVEL APPROACH

REVISED GRID FOR MICRO LEVEL APPROACH Cover sheet Country: Sector: Level: United Kingdom Bank EQF Level: 6 IT NQF Level: 6 Institution (private/state): Name of the study program : Duration (in years/months): University (state) BSc Computer

More information

Developing an Innovative Baccalaureate Program in Computer Forensics

Developing an Innovative Baccalaureate Program in Computer Forensics Developing an Innovative Baccalaureate Program in Computer Forensics Jigang Liu Department of Information and Computer Sciences Metropolitan State University St. Paul, Minnesota 55106 jigang.liu@metrostate.edu

More information

Background. Executive Summary

Background. Executive Summary Background The Interdisciplinary Research Centre in Cyber Security at the University of Kent in Canterbury recently launched a second online survey 1 in order to get a better picture of the prevalence

More information

This course has specialisations available in financial planning and banking

This course has specialisations available in financial planning and banking Education provider Course Duration Prerequisite Available majors Course description Charles Sturt University Master of Applied Finance 2 years full- time or equivalent part- time study CQUniversity Australia

More information

Speaker: Ms Stephanie Chan, Psychologist, MSc in Forensic Psychology. Director: Dr A Majeed B A Khander, concurrently Deputy Director of Police

Speaker: Ms Stephanie Chan, Psychologist, MSc in Forensic Psychology. Director: Dr A Majeed B A Khander, concurrently Deputy Director of Police Home Team Behavioural Sciences Centre (HTBSC) Speaker: Ms Stephanie Chan, Psychologist, MSc in Forensic Psychology Guests: Penelope, Jane HTBSC Director: Dr A Majeed B A Khander, concurrently Deputy Director

More information

CURRICULUM VITAE. David T. Gallant (USAF Retired) President, Gallant Computer Investigative Services, LLC

CURRICULUM VITAE. David T. Gallant (USAF Retired) President, Gallant Computer Investigative Services, LLC CURRICULUM VITAE David T. Gallant (USAF Retired) President, Gallant Computer Investigative Services, LLC EDUCATION: Bachelor of Science, University of the State of New York, Albany, NY, 1995 AA, Criminal

More information

CYBER LIABILITY RISKS SEMINAR Programme overview. THURSDAY 1 OCTOBER 2015 8.30am 1.00pm Green Park Conference Centre, Reading

CYBER LIABILITY RISKS SEMINAR Programme overview. THURSDAY 1 OCTOBER 2015 8.30am 1.00pm Green Park Conference Centre, Reading CYBER LIABILITY RISKS SEMINAR Programme overview THURSDAY 1 OCTOBER 2015 8.30am 1.00pm Green Park Conference Centre, Reading JLT Specialty (JLT) would like to invite you to a highly informative technical

More information

Diploma in Forensic Accounting (Level 4) Course Structure & Contents

Diploma in Forensic Accounting (Level 4) Course Structure & Contents Brentwood Open Learning College Diploma in Forensic Accounting (Level 4) Course Structure & Contents Diploma in Forensic Accounting Course Structure & Contents Page 1 Unit 1 Introduction Forensic Accounting

More information

CONNECTING WITH CONFIDENCE: OPTIMISING AUSTRALIA S DIGITAL FUTURE. AIIA Response

CONNECTING WITH CONFIDENCE: OPTIMISING AUSTRALIA S DIGITAL FUTURE. AIIA Response CONNECTING WITH CONFIDENCE: OPTIMISING AUSTRALIA S DIGITAL FUTURE AIIA Response 14 November 2011 INTRODUCTION The Australian Information Industry Association (AIIA) is the peak national body representing

More information

Master of Policing, Intelligence and Counter Terrorism - 2010

Master of Policing, Intelligence and Counter Terrorism - 2010 Master of Policing, Intelligence and Counter Terrorism - 2010 Provided by POSTGRADUATE Master of Policing, Intelligence and Counter Terrorism About this course Terrorism has become a reality on the international

More information

Cybercrime Law (and the Problems of Police Enforcement)

Cybercrime Law (and the Problems of Police Enforcement) Cybercrime Law (and the Problems of Police Enforcement) Denis Edgar-Nevill Chair, BCS Cybercrime Forensics SG Head of Department of Computing Canterbury Christ Church University COMPUTING LAW INFORMATICS

More information

Cybersecurity Educational Standards

Cybersecurity Educational Standards Cybersecurity Educational Standards Stephen Cooper, Stanford University Elizabeth Hawthorne, Union County College Lance C. Pérez, University of Nebraska - Lincoln Susanne Wetzel, Stevens Institute of Technology

More information

SRO-EA s Cyber security Initiatives in Eastern Africa

SRO-EA s Cyber security Initiatives in Eastern Africa UNECA Sub Regional Office For Esatern Africa SRO-EA 2010 EAIGF 11-13 August 2010, Kampala, Uganda SRO-EA s Cyber security Initiatives in Eastern Africa Mr Mactar SECK United Nations ECA SRO- EA Key Categories

More information

Security & privacy in the cloud; an easy road?

Security & privacy in the cloud; an easy road? Security & privacy in the cloud; an easy road? A journey to the trusted cloud Martin Vliem CISSP, CISA National Security Officer Microsoft The Netherlands mvliem@microsoft.com THE SHIFT O L D W O R L D

More information

E-SECURITY REVIEW 2008 DISCUSSION PAPER FOR PUBLIC CONSULTATION

E-SECURITY REVIEW 2008 DISCUSSION PAPER FOR PUBLIC CONSULTATION 1. Introduction E-SECURITY REVIEW 2008 DISCUSSION PAPER FOR PUBLIC CONSULTATION Australia s national security and economic and social well-being rely upon the use and availability of a range of Information

More information

We pride ourselves on delivering a timely, professional and effective witness protection service

We pride ourselves on delivering a timely, professional and effective witness protection service Protecting witnesses The CMC is committed to providing an effective witness protection service. We have maintained a 100 per cent success rate in keeping witnesses safe. We pride ourselves on delivering

More information

Feature. How to Maximize Evidential Weight of Electronically Stored Information Recommendations of BS 10008

Feature. How to Maximize Evidential Weight of Electronically Stored Information Recommendations of BS 10008 Feature Haris Hamidovic, CIA, ISMS IA, ITIL, IT Project+, is chief information security officer at Microcredit Foundation EKI Sarajevo, Bosnia and Herzegovina. Prior to his current assignment, Hamidovic

More information