Analyzing the Quality Assurance of Trainees Competency Assessment and Accreditation of Cyber Forensic Education/Training Programs
|
|
- Darleen Harrison
- 8 years ago
- Views:
Transcription
1 Analyzing the Quality Assurance of Trainees Competency Assessment and Accreditation of Cyber Forensic Education/Training Programs Elfadil Sabeil Faculty of Computer Science & Information Systems Johor Baru, Malaysia Azizah Bt Abdul Manaf Advanced Informatics School Kuala Lumpur, Malaysia Zuraini Ismail Advance Informatics School Kuala Lumpur, Malaysia Abstract This paper presents a critical analysis on the trainee s competency assessment (evaluation) quality assurance and accreditation of Cyber forensic programs provided by some training institutions in USA, U.K., Australia and China. It summarizes the existing competency assessment quality assurance based on both internal and external and accreditation for Associate and Diploma Degree Programs, Certificate Programs, Undergraduate Programs and Master/graduate Programs. It briefly highlights factors which should be considered when offering any Cyber forensic training/education program. The result shows that Cyber forensic training/education has inadequate consideration for the competency assessment quality assurance and accreditation. Keywords-component; competency assessment quality assurance; accreditation; internal ; external I. INTRODUCTION In the current era, information and communications technology (ICT) is predominantly part of our life, mostly in a positive way [1]. It is covers many aspect of activities for most of people around the world. In addition, most of people depend on ICT to communicate, transport, produce food, trade, entertain and so forth. The rapid progress and development of computers, networks and communications create ever changing world. However, nowadays most of technologies are prone to criminal activities. In other words, they contribute to various huge Cyber crimes [2]. There are relatively few criminal and civil cases that do not involve computer evidence. A research has estimated of over 85% of criminal and civil prosecution cases have involved digital evidence [3]. These crimes include fraud, hacking identity theft and other illegal activities. Consequently, Cyber crimes have a massive impact on world economies. Studies carried out in USA and UK companies indicate that the financial losses due to cyber crimes are very high [4, 5]. Therefore, several businesses have lost reputation, while violation to individual privacy and even public safety and national security interests are also in rise. Thus, securing information system assets of organizations has also become more complex and highly recommended as computer resources become more vital. Cyber forensic exists as a response to combat crimes committed by leveraging computer utilities either as source of crime, stores of crime s data or facilitating criminal activities. Z. Hamzah [6] defines Cyber forensic as legal aspects of computer investigation and involves the analysis of digital evidence covering the identification, examination, preservation and presentment of potential electronic evidence in a manner that would allow such evidence to be admitted in a court of law. Cyber forensics can play a significant role in computer and network security, information assurance, law enforcement, and national defence [1]. For instance, Cyber forensic investigators (CFIs) play a vital role in contingency planning in business or National Critical Corporations (NCC). This comes due to the fact that both service return and maintaining crime evidence are required when systems are compromised [7]. In addition to that, the task of the CFIs is not only to investigate crimes but it also to teach the laymen when presenting technical testimony terms in court. Therefore, they must have qualifications, skills, experience, education and training in the relevant field in order to meet the investigation requirements [8]. In spite of the fact that the Cyber forensic goes backs to 30 years ago, and new training/education qualifications emerge regularly in some development countries, researchers have found that many countries around the world lack Cyber forensic investigators [9, 10, 11]. The lack of professionalism in Cyber forensic comes due to some factors. For instances, training and education services on Cyber forensics investigation are relatively new. Furthermore, many of the qualifications are presented by vendors and owners of investigation tools. In addition, most of the training/education providers concentrate on the system weakness or training trainees on the use of specific tools or techniques, rather than concentrating on knowledge, skills, ability (KSA) and assessment needs [12]. Moreover, most of them are not verified by independent external examiner and accreditation bodies [13]. In this paper, the authors (Digital Forensics certification holders) contribution is to review the current situation of the Cyber forensic education and training competency assessment quality assurance (internal/external ) /11/$ IEEE V4-346
2 and accreditation [13]; in both academic and non academic institutions. This paper is divided into four sections. The first section introduces the problem behind this paper. Section two presents a critical analysis concerning the accreditation and competency assessment quality assurance in Cyber forensic training/education institutions. In section three, the authors discuss the result of the analysis, and section four summarizes the findings. II. ACCREDITATION AND QUALITY ASSURANCE Quality assurance is a process of assessing quality through both planned and orderly actions in order to show a product/service confidence or specific requirements for quality are met on the service offered [14]. Thus, the Quality assurance systems would minimize the risks inherent in training providers by maintaining the quality of teaching/training and assessment methods carried on training providers. W. Pond [15] states Accreditation as the procedure by which an authoritative body gives formal recognition that a body or person is competent to carry out specific tasks. Accreditation is a header of the quality assurance program that monitors the efforts of management practices, personnel performance, internal and external quality system and procedures exerted to meet national and/or international standards [14]. Accreditation has many benefits, including:- Validation and external value assurance. Encourages students/trainees to select a program. Proves the quality of the program. Training/educational programs are classified into four categories as follows:- A. Associate and Diploma Degree Programs The authors revision covers a total of five programs; see Table I. West Virginia University [16], University of North Texas [17, 19] and North American educational institutions [20] from the USA offer associate degree programs of Cyber Forensics. Edith Cowan University [17, 21] and Canberra Institute of Technology [17] from Australia both offer Computer Forensic Advanced Diplomas. For the five training/education programs, only the West Virginia University shows an expectation to implement accreditation program; while internal and external are not in other programs. TABLE I. ASSOCIATE AND DIPLOMA DEGREE PROGRAMS Countries USA Australia Total Numbers of Training providers Internal External Stated/ expected Stated/ expected Accreditation Stated/ expected 1-1 B. Certificate Programs Eight Cyber forensics training/education programs offering certifications are analyzed.the programs vary in terms of providing a subject in computer forensic, to awarding academic certificate in digital forensics. In Australia, University of South Australia [17], and University of Melbourne School of Enterprise [33] offer Cyber forensics certification program. Only University of South Australia shows accreditation system. Likewise, West Virginia University [16] has expectations to have accreditation from an accrediting body recognized by the U.S. Department of Education, while the others programs such as Cypress College s CIS certificate programs [18], InfoSec Institute [23], SANS [36] and CyberSecurity Institute [37] don t show their accreditation system. It is important to note that the International Society of Forensic Computer Examiners (ISFCE) [22] offers Certified Computer Examiner (CCE) which primarily focuses on quality assurance program; whereas the internal quality is revised by ISFCE Certification Board, ISFCE Ethical Standards Committee and Certification Candidate Appeal Committee. Also, in order to maintain its external quality the ISFCE reviews all course material and assesses whether the curriculum adequately meets the testing standards for the Certified Computer Examiner (CCE) exam or not. TABLE II. CERTIFICATE PROGRAMS Countries USA Australia Total Numbers of Training providers Internal Stated/ expected External Stated/ expected Accreditation Stated/ expected C. Undergraduate Programs Undergraduate degree programs in Cyber forensic cover a wide range of topics. Twenty undergraduate programs from different countries are reviewed (see Table III). Ten training/education providers in USA [34, 35]: Central Michigan University [25], California State University [26], California State Polytechnic University [26], Poly Pomona [26], Longwood University [27], West Virginia University [16], University of North Texas [17] Sam Houston State University [29] and Department of Information and Computer Sciences Metropolitan State University [30] offer undergraduate degree programs in Cyber forensic and computer information system. Only West Virginia University offers a program with an expected accreditation V4-347
3 from accrediting bodies recognized by the U.S. Department of Education. In addition, the competency assessment quality assurance is not by all of training/education providers. Canterbury Christ Church University in U.K [31] provides an undergraduate degree in Cyber forensic programs and shows both competency assessment quality assurance and accreditation that comply by The Quality Assurance Agency for Higher Education (QAA), which fully met with European standards. Furthermore, eight training/education providers from Australia: University of Western Sydney [17], Garda College [9], Deakin University [28, 32], Edith Cowan University [17, 21] and Murdoch University [17, 24], provide Bachelor of Counter Terrorism, Security and Intelligence (Computer Science), Bachelor of Computer Science (Computer Security), Bachelor of Information Technology (Computer Security), and BSc. in Cyber Forensics, Information Security and Management. Three of them have accreditation bodies such as The Information Systems Audit and Control Association (ISACA) and Australian Computer Society (ACS), while all of them haven t claimed their competency assessment internal procedures. Hebei University of Police [10] in China offers a 4-year study digital forensics program, whose accreditation is not confirmed as well as the quality assurance system. TABLE III. UNDERGRADUATE PROGRAMS Countries USA U. K Australia China Total Numbers of Training providers Internal Stated/ expected External Stated/ expected Accreditation Stated/ expected D. Graduate Programs Master and graduate diploma programs have a significant contribution in Cyber forensics training/education fields. Several training/education providers conduct different types of Master/graduate diploma programs as shown in Table IV. In USA only West Virginia University [16] shows an accreditation program expectation by a recognized body of Education Department, while Longwood University [27] and University of North Texas [17] are not. Similarly all universities don t maintain their competency assessment quality assurance. In UK, only one program [31] offered at master degree level in Cyber forensics is reviewed. It shows an adoption of competency assessment quality assurance and accreditation. The rest of the others programs are from Australia. Edith Cowan University [17] provides Master of digital forensic, Master of computer security, Graduate diploma of digital forensics and Graduate certificate of digital forensics [21]. Also, the University of South Australia [17] offers Msc. (Computer & Info Sc.). Curtin University of Technology [17] provides Master of internet security and forensics. Macquarie University [17] offers Postgraduate Certificate in Computer Forensics. Furthermore, University of Melbourne School of Enterprise [17], [28] offers Master of forensics and enterprise security. However, only University of South Australia and Curtin University of Technology maintain their accreditation program by ACS, British Computer Society (BCS) and Australian and New Zealand Forensic Science Society (ANZFSS); while all of them don t state their competency assessment internal and external TABLE IV. GRADUATE PROGRAMS Countries USA U K. Australia Total Numbers of Training providers Internal Stated/ expected External Stated/ expected Accreditation Stated/ expected III DISCUSSION The notion of training/education quality is very old. Both private and public educational providers concern with products/services quality. If the services/products do not have market value due to poor quality, the institution will collapse. Cyber forensics education/training programs have specific purposes /objectives to target trainees. Those targets play a significant role to determine the quality assurance services. Regardless of the type of training program, traditional quality assurance methods such as library utilities, teaching and contact hours, examination monitoring and so forth are often impractical or irrelevant in today s Cyber forensic training/education reality. As mentioned earlier, the objective of this study focuses on competency assessment quality assurance and accreditation of the training/education program rather than the entire traditional quality assurance methods. The result in Table (I) (Associate and Diploma Degree Programs) shows similarities on the situation of both internal and accreditation. They are totally not in the whole programs. In addition to that, only one of four organizations (25%) confirmed its accreditation expectation. Table II which tabulates Certificate Programs shows only 12.5% internal and accreditation. The result of the analysis on Undergraduate Programs (Table III) shows 5% external, 5% internal and 25% V4-348
4 accreditation. Finally, Table IV, Master/Graduate diploma shows 10% to internal verifier, 10% external verifier, and 40% to accreditation. IV. CONCLUSION In summary, Cyber forensic training/education services proliferate to diverse qualifications, from a handful of day s workshop to Masters Degree in Cyber forensics. With the immaturity of education/training and practicing field, most of the training/education providers don t worry about the competency assessment quality assurance and accreditation. Therefore, the situation contributes on poor services delivery and outcomes. The study shows the total of competency assessment quality internal range from 0% to 12.5%, external is from 0% to 10% and accreditation is from 20% to 40. These results reflect that the area of Cyber forensic training/education has insufficient concerns on assessment quality assurance and accreditation. V. ACKNOWLEDGEMENT This work is of a research that has been done in (UTM), under support from Ministry of Science, Technology & Innovation, Malaysia. REFERENCES [1] W. Figg and Z. Zhou, computer Forensics Minor Curriculum Proposal, Department of Computer Information Systems, Dakota State University, Madison, SD 57042, portal.acm.org/ft_gateway.cfm?id= &type=pdf, 2007 [2] J. Fernandez, S. Smith, M. Garcia and D. Kar, Computer forensics: a critical need in computer science programs, Journal of Computing Sciences in Colleges, Volume 20 Issue 4, Consortium for Computing Sciences in Colleges, 2005 [3] C. Taylor, B. Endicott-Popovsky and A. Phillips, Forensics Education: Assessment and Measures of Excellence, Proceedings of the Second International Workshop on Systematic Approaches to Digital Forensic Engineering (SADFE'07), 2007 [4] J. Venter, Process Flows for Cyber Forensics Training and Operation, Pretoria, South Africa, researchspace.csir.co.za/dspace/bitstream/10204/1073/1/venter_2006.pdf, (2006). [5] R. Pidanick, An Investigation of Computer Forensics, Information System Control Journal, Volume 3, /Documents/jpdf043-InvestigationofComputerForensics.pdf [6] Z. Hamzah, E-Security Law & Strategy, Malayan Law Journal Sdn Bhd, Kelana Jaya Malaysia, KL, ISBN pp. 122 [7] D. Hopkins, Innovative Corporation Solutions, Inc, ofcomputerforensics.pdf, 2006 [8] Schroeder S.C., How to be a Digital Forensic Expert Witness, Systematic Approaches to Digital Forensic Engineering, First International Workshop on, 7-9 Nov. 2005, pp [9] D. Bem and E. Huebner Computer Forensics Workshop for Undergraduate Students, crpit.com/confpapers/crpitv78bem.pdf,2008, last surf on 8 Aug [10] L. Zhijun and W. Ning, Developing a Computer Forensics Program in Police Higher Education, Computer Science & Education. ICCSE '09. 4th International Conference on, July 2009, pp [11] S. Lim, Demand up, supply short for forensic professionals Anonymous, New Straits Times, Kuala Lumpur, Jul 20, pp. 5 [12] K Nance, H. Armstrong and C. Armstrong, Defining an Education Agenda, System Sciences (HICSS), rd Hawaii International Conference on, Digital Object Identifier: /HICSS , Publication Year: 2010, pp [13] JJ Barbara, Certification and Accreditation Overview, , [14] EURIM, Supplying the Skills for Justice, [15] W. Pond, Twenty-first century education and training: Implications for quality assurance, The Internet and Higher Education, Volume 4, Issues 3-4, 2001, pp [16] West Virginia University Forensic Science Initiative, Technical Working Group for Education and Training in Digital, [17] E. Huebner, D. Bem and Ch. Ruan, Computer Forensics Tertiary Education in Australia, Computer Science and Software Engineering, 2008 International Conference on, Volume 5, Dec pp [18] D. Wassenaar, D. Woo and P. Wu, A certificate program in computer forensics, Journal of Computing Sciences in Colleges, Volume 24 Issue 4, Consortium for Computing Sciences in Colleges, 2009 [19] Graduate Studies, Criminal justice, 10 Aug 2010 [20] L. Gttschalk, J. Liu, B. Dathan, S. Fitzgerald and M. Stein, Computer forensics programs in higher education: a preliminary study, Proceedings of the 36th SIGCSE technical symposium on Computer science education, ACM, [21] Edith Cowan University, Digital forensic courses, :jzqn_jrbvsm&cof=FORID:11&sa=Search&tab=websi te&x=12&y=9 [22] ISFCE, CCE Certification, The International Society of Forensic Computer Examiners, [23] InfoSec Institute, Computer Forensics Training, [24] Murdoch University, Cyber Forensics, Security-and-Management/ [25] Yasinsac A., Erbacher R.F., Marks D.G., Pollitt M.M. and Sommer, P.M, Computer forensics education, Security & Privacy, IEEE, Volume 1, Issue 4, July-Aug pp [26] L. Soe, D. Manson and M. Wright, Establishing Network Computer Forensics Classes, InfoSecCD '04, Proceedings of the 1st annual conference on Information security curriculum development, ACM, October [27] G. Dardick and L. Lau, Interdisciplinary minor in digital forensics, security and law, SIGITE '05, Proceedings of the 6th conference on Information technology education, ACM, October 2005 [28] Deakin university, Bachelor of Information Technology (I.T. Security), =digital%20forensic [29] D. Collins and T. McGuire, Using the dc3 forensic challenge as a basis for a special topics digital forensics upper level undergraduate course*, Journal of Computing Sciences in Colleges, Volume 23 Issue 6, Consortium for Computing Sciences in Colleges, June [30] J. Liu, Implementing a baccalaureate program in computer forensics*, Implementing a baccalaureate program in computer forensics, Journal of Computing Sciences in Colleges, Volume 25 Issue 3, Consortium for Computing Sciences in Colleges, January [31] Stephens, Paul, Induruwa and Abhaya, Cybercrime investigation training and specialist education for the European Union, Proceedings - 2nd International Annual Workshop on Digital Forensics and Incident Analysis, WDFIA 2007, Proceedings - 2nd International Annual Workshop on Digital Forensics and Incident Analysis, WDFIA pp [32] Batten L and L. Pan, Teaching Digital Forensics to Undergraduate Students, Security & Privacy, IEEE,Volume 6, Issue 3, May-June 2008, pp V4-349
5 [33] MCCP, Master of eforensics and Enterprise Security, [34] L. Troell, Y. Pan, B. Stackpole, Forensic Course Development Computer Forensics, CITC4 '03, Proceedings of the 4th conference on Information technology curriculum, ACM, October 2003I. [35] Luther T. et al. Forensic Course Development One Year Later. SIGITE 04, October 28 30, 2004, Salt Lake City, Utah, USA. ACM /04/0010 [36] SANS, GIAC Forensic Certification, [37] CSI, Computer forensic fundamentals, amentals.htm V4-350
Textbooks for Computer Forensic Courses: A Preliminary Study
Textbooks for Computer Forensic Courses: A Preliminary Study Jigang Liu, Larry Gottschalk, Kuodi Jian Department of Information and Computer Sciences Metropolitan State University St. Paul, Minnesota USA
More informationInformation Security Management Curriculum Development: An Australian Example
Proceedings of Informing Science & IT Education Conference (InSITE) 2009 Information Security Management Curriculum Development: An Australian Example Matthew Warren and Shona Leitch School of Information
More informationAN ANALYSIS OF THE CURRICULUM COMPONENTS OF COMPUTER FORENSICS UNDERGRADUATE COURSES IN THE UNITED KINGDOM
AN ANALYSIS OF THE CURRICULUM COMPONENTS OF COMPUTER FORENSICS UNDERGRADUATE COURSES IN THE UNITED KINGDOM Paula Thomas Faculty of Advanced Technology, University of Glamorgan 2 CF37 1DL, Pontypridd pthomas@glam.ac.uk
More informationForensic Computing Training, Certification and Accreditation: An Australian Overview
Forensic Computing Training, Certification and Accreditation: An Australian Overview Matthew Simon, Jill Slay Centre of Excellence in Defence and Industry Systems Capability (CEDISC), Defence and Systems
More informationOn the Development of a Digital Forensics Curriculum
On the Development of a Digital Forensics Curriculum Manghui Tu 1 Department of Computer Information Technology and Graphics Purdue University Calumet Dianxiang Xu College of Business and Information Systems
More informationCarrier B. and Spafford E. (2003). Getting Physical with the Digital Investigation Process. International Journal of Digital Evidence. Volume 2(2).
140 RUJUKAN Agarwal, A. et al. (2011). Systematic Digital Forensic Investigation Model.International Journal of Computer Science and Security (IJCSS),.Volume 5 (Issue 1). Ali, K.M. (2012). Digital Forensics
More informationPostgraduate. eforensics. swinburne.edu.au/postgrad
Postgraduate eforensics swinburne.edu.au/postgrad Program details }} Graduate Certificate in eforensics The postgraduate program in eforensics aims to deliver high-quality industry-relevant education to
More informationMALAYSIA ANTI-CORRUPTION ACADEMY: GLOBAL COMMITMENT TOWARDS ANTI-CORRUPTION CAPACITY BUILDING
MALAYSIA ANTI-CORRUPTION ACADEMY: GLOBAL COMMITMENT TOWARDS ANTI-CORRUPTION CAPACITY BUILDING PRESENTER: ROHAIZAD YAAKOB SENIOR ASSISTANT DIRECTOR INTERNATIONAL STUDIES CENTRE MALAYSIA ANTI-CORRUPTION
More informationAustralian Accreditation Centre Engineering Technology Programs Accredited by Engineers Australia (Last updated 9 April 2014)
Australian Accreditation Centre Engineering Technology Programs Accredited by Engineers Australia (Last updated 9 April 2014) Contents Introduction... 2 Accreditation of Australian Engineering Technology
More informationDeveloping and Enhancing Cyber Security Capabilities in the Region. Khaled Gamo Technology Advisor Ministry of communication and informatics
Developing and Enhancing Cyber Security Capabilities in the Region Khaled Gamo Technology Advisor Ministry of communication and informatics 1 Content 1 2 3 Cyber Security Strategy and Key Requirement Efforts
More informationComputer Forensics Examiners as Private Investigators: The Role of Academia in the Debate. CDFSL 2008 Oklahoma City, OK April 23, 2008
Computer Forensics Examiners as Private Investigators: The Role of Academia in the Debate CDFSL 2008 Oklahoma City, OK April 23, 2008 Gary C. Kessler Champlain College Burlington, VT DISCLAIMER I teach
More informationCFET 2008 Conference Schedule
CFET 2008 Conference Schedule Day 1 1 st September 2008 10.00-10.30 Registration & Coffee foyer Powell Building 10.30-10.45 Welcome to the Conference Professor Michael Wright, Vice Chancellor Denis Edgar-Nevill,
More informationFirst Pacific Islands Capacity Building Workshop on Child Online Protection
First Pacific Islands Capacity Building Workshop on Child Online Protection Extracting Intelligence to Turn the Tables on Child Abuse Material Traffickers. Dr Allan Watt Centre for Policing, Intelligence
More informationCybercrime & Cybersecurity: the Ongoing Battle International Hellenic University
Cybercrime & Cybersecurity: the Ongoing Battle International Hellenic University Andreas Athanasoulias, CISM, CISSP Information Security Officer & Security Consultant Brief introduction My career path
More informationDigital Forensics Department- 2008 Report Submission Date: 08 th March 2009
Digital Forensics Department- 2008 Report Submission Date: 08 th March 200 1.0 Introduction 2008 has been a very challenging year for Digital Forensics Department (DFD) with the increase of cases from
More informationComputer Forensics and Security Management (MSCFSM)
Computer Forensics and Security Management (MSCFSM) View PDF of Computer Forensics and Security Management Admissions Checklist Prospective students should use this checklist to obtain specific admissions
More informationJason Jordaan: MTech, BTech, CFE, PMCSSA, ACE
Jason Jordaan: MTech, BTech, CFE, PMCSSA, ACE 9 Cranbrook Road, Sunnyridge, East London, 5201 Cellphone Number: 083 556 7112 E-Mail: JJordaan@siu.org.za Professional Summary A multidisciplinary digital
More informationUnion County College Faculty Curriculum Committee. New Course Proposal Form
Union County College Faculty Curriculum Committee New Course Proposal Form To all faculty members seeking to introduce a new course proposal to the Curriculum Committee, please make sure to complete the
More informationOn the Development of a Digital Forensics Curriculum
Journal of Digital Forensics, Security and Law Volume 7 Number 3 Article 2 2012 On the Development of a Digital Forensics Curriculum Manghui Tu Purdue University, Calumet Dianxiang Xu Dakota State University
More informationNettitude Ltd. (FHEQ) level 7] MSc Postgraduate Diploma Postgraduate Certificate. British Computer Society (BCS) Master s Degree in Computing
Faculty of Engineering and Informatics Programme Specification Programme title: MSc Cyber Security Academic Year: 2015/16 Degree Awarding Body: Partner(s), delivery organisation or support provider (if
More informationPROGRAMME DEVELOPMENT UNIT
PROGRAMME DEVELOPMENT UNIT BUILDING THE NATIONAL QUALIFICATIONS FRAMEWORK AT INSTITUTIONAL LEVEL The Programme Development Unit in the Office of the Vice-Rector: Academic Affairs and Research has overall
More informationGUIDELINES FOR FORENSIC LABORATORY MANAGEMENT PRACTICES INTRODUCTION
GUIDELINES FOR FORENSIC LABORATORY MANAGEMENT PRACTICES INTRODUCTION The American Society of Crime Laboratory Directors is a professional organization of managers and supervisors employed in forensic laboratories.
More informationDEVELOPMENT AND DISSEMINATION OF A NEW MULTIDISCIPLINARY UNDERGRADUATE CURRICULUM IN DIGITAL FORENSICS
DEVELOPMENT AND DISSEMINATION OF A NEW MULTIDISCIPLINARY UNDERGRADUATE CURRICULUM IN DIGITAL FORENSICS Masooda Bashir (mnb@illinois.edu) Graduate School of Library and Information Science Jenny A. Applequist
More informationAn Analysis of Computer Forensic Practitioners Perspectives on Education and Training Requirements
An Analysis of Computer Forensic Practitioners Perspectives on Education and Training Requirements Colin J. Armstrong Gailaad Pty Ltd, Perth, Western Australia ColinArmstrong@gailaad.com Abstract. It could
More informationEmerging risks for internet users
Sabeena Oberoi Assistant Secretary, Cyber Security and Asia Pacific Branch Department of Broadband, Communications and the Digital Economy Government s role - DBCDE The new Australian Government Cyber
More informationS u p p o r t i n g f o r e n s i c p r a c t i t i o n e r s w o r l d w i d e. Copyright of The Chartered Society of Forensic Sciences
S u p p o r t i n g f o r e n s i c p r a c t i t i o n e r s w o r l d w i d e Copyright of The Chartered Society of Forensic Sciences . Education and Industry Liaison Forum Home Office, London 19 th
More informationProtecting Malaysia in the Connected world
Protecting Malaysia in the Connected world cyber Security Company of the Year (Cybersecurity Malaysia, 2014) Most innovative information security company in Malaysia (Cybersecurity Malaysia, 2012) BAE
More informationAdvancing Digital Forensics
Advancing Digital Forensics Katrin Franke 1, Erik Hjelmås 1, and Stephen D. Wolthusen 1,2 1 Norwegian Information Security Laboratory, Department of Computer Science, Gjøvik University College, Norway,
More informationForeign language 6 + 2. Physical education 3 + + 10. State security 5 + 11. Internal security of the European Union 3 + + 12.
LEVEL OF EDUCATION: first degree FIELD OF STUDY: Internal security SPECIALISATION: none PROFILE OF EDUCATION: general academic No. Subject ECTS credits Taught in Polish Taught in English 1. Foreign language.
More informationShort courses presented by the NWU Programme in Forensic Accountancy
Short courses presented by the NWU Programme in Forensic Accountancy Certificate in: Commercial Forensic Accounting Commercial Forensic Law Commercial Forensic Investigation Commercial Forensic Information
More informationModalities for Forensic Review of Computer Related Frauds
Modalities for Forensic Review of Computer Related Frauds Neneh Addico (CFE, CA), MTN Ghana Outline Recent Computer Crime Cases What is Computer Crime Forensics Types of Computer Related Crimes Relevance
More informationMSc Forensic Information Technology
MSc Forensic Information Technology Programme Specification Primary Purpose: Course management, monitoring and quality assurance. Secondary Purpose: Detailed information for students, staff and employers.
More informationCyber Security Operations Centre Reveal Their Secrets - Protect Our Own Defence Signals Directorate
Cyber Security Operations Centre Reveal Their Secrets - Protect Our Own Defence Signals Directorate Contents Message from the Director 3 Cyber Security Operations Centre 5 Cyber Security Strategy 7 Conversation
More informationBACHELOR OF CRIMINOLOGY AND SECURITY MANAGEMENT(BCSM
About the programme Crime and security related matters have become a major concern in modern society. In view of this development, it has become increasingly necessary to enhance the capacity of institutions
More informationErnesto F. Rojas CISSP, DFCP, IAM, IEM, DABRI, PSC, MBA
Ernesto F. Rojas CISSP, DFCP, IAM, IEM, DABRI, PSC, MBA Mr. Rojas has over 25 years of information systems consulting, supervisory, managerial and executive experience in various industries. He is considered
More informationENGINEERS AUSTRALIA ACCREDITATION WEBSITE
Contents AUSTRALIAN COLLEGE OF KUWAIT (Next General Review 2018)... 3 AUSTRALIAN MARITIME COLLEGE (Next General Review 2020)... 4 AUSTRALIAN NATIONAL UNIVERSITY... 6 CENTRAL QUEENSLAND UNIVERSITY (ROCKHAMPTON
More informationCYBER SECURITY TRAINING SAFE AND SECURE
CYBER SECURITY TRAINING KEEPING YOU SAFE AND SECURE Experts in Cyber Security training. Hardly a day goes by without a cyber attack being reported. With this ever-increasing threat there is a growing need
More informationHow To Get A Degree From A University
REGULATION 3 COLLEGES Approved by Council: 30 November 2005 Revised by Council: 18 May 2011, 16 October 2013, 7 May 2014 3.1 The Council may designate an institution as a recognised teaching institution
More informationScientific Working Group on Digital Evidence (SWGDE)
Scientific Working Group on Digital Evidence (SWGDE) Position on the National Research Council Report to Congress Strengthening Forensic Science in the United States: A Path Forward In the National Research
More informationcounter fraud specialist (cacfs)
CIPFA accredited counter fraud specialist (cacfs) Building the counter fraud profession CIPFA COUNTER FRAUD CENTRE It will certainly help us to safeguard our assets against the risk of fraud. And it will
More informationunderstanding and managing enterprise risk; evaluating organizational structure and communications; assessing and handling insider threats;
GermanoLawLLC provides client- focused counsel and assistance regarding cybersecurity and data privacy concerns. We help companies understand, prepare for and address internal and external cybersecurity
More informationERM Symposium April 2009. Moderator Nancy Bennett
ERM Symposium April 2009 RI4-Implementing a Comprehensive Privacy Program John Kelly Joseph Nocera Moderator Nancy Bennett Data & Identity Theft: Keeping sensitive data out of the wrong hands Presented
More informationDevelopments in cybercrime and cybersecurity
Developments in cybercrime and cybersecurity Developments in cybercrime and cybersecurity As customers and clients increasingly go online to do their banking with convenience, privacy and security their
More informationCURRICULUM VITAE. Jason Jordaan: CFE, PMCSSA, ACE
CURRICULUM VITAE Jason Jordaan: CFE, PMCSSA, ACE MTech (Forensic Investigation), BComHons (Information Systems), BSc (CJ Computer Science) Summa Cum Laude, BTech (Policing) +27 (083) 556 7112 jjordaan@siu.org.za
More informationTertiary Institution Accreditation and Endorsement 2015 Valuation
Tertiary Institution Accreditation and Endorsement 2015 Valuation National Office ABN 49 007 505 866 6 Campion Street Deakin ACT 2600 Telephone: 02 6282 2411 Facsimile: 02 6285 2194 Email: national@api.org.au
More informationWILLIAM OETTINGER PHONE (702) 292-4645 WOETTINGER@GMAIL.COM
WILLIAM OETTINGER PHONE (702) 292-4645 WOETTINGER@GMAIL.COM SUMMARY OF QUALIFICATIONS Veteran investigator in a traditional and computer-related environment. A leader experienced in organizing, directing,
More informationApril 2014. Revised February 2016. College of Education, Criminal Justice and Human Services. School Of Criminal Justice
School Of Baccalaureate Degree in 18 BS CJ and 18 BS-DL CJ-DL College of Education, and Human Services April 2014 Revised February 2016 Primary Faculty: Sue Bourke (513) 556-1353 susan.bourke@uc.edu Ed
More informationFACULTY OF ACCOUNTANCY (FPK) PROGRAMMES OFFERED MASTER OF BUSINESS ADMINISTRATION (ACCOUNTING)
FACULTY OF ACCOUNTANCY (FPK) PROGRAMMES OFFERED 1. MBA (Accounting) - Coursework 2. MBA (Professional Accounting) - Coursework 3. MBA (E-commerce) - Coursework 4. MSc (International Accounting) - Coursework
More informationIdentifying Cyber Risks and How they Impact Your Business
10 December, 2014 Identifying Cyber Risks and How they Impact Your Business David Bateman, Partner, K&L Gates, Seattle Sasi-Kanth Mallela, Special Counsel, K&L Gates, London Copyright 2013 by K&L Gates
More informationISO 27001 Information Security Management Services (Lot 4)
ISO 27001 Information Security Management Services (Lot 4) CONTENTS 1. WHY LEICESTERSHIRE HEALTH INFORMATICS SERVICE?... 3 2. LHIS TECHNICAL ASSURANCE SERVICES... 3 3. SERVICE OVERVIEW... 4 4. EXPERIENCE...
More informationGEMSAS Grade Point Average calculations
GEMSAS Grade Point Average calculations For the purposes of selection of graduate-entry applicants into Australian medical schools belonging to the GAMSAT Consortium, the following guidelines have been
More informationEducation Capability. Major Sporting Events
Australian Education And Training Capability Major Sporting Events Contents Australian education and training in events 3 HIGHER EDUCAtion 4 Edith Cowan University 4 Griffith University 4 James Cook University
More informationCyber Crime and Digital Forensics in Japan
Cyber Crime and Digital Forensics in Japan Tetsutaro UEHARA Academic Center for Computing and Media Studies, Kyoto University uehara@media.kyoto-u.ac.jp Table of Contents Introduction: Motivation and Background
More informationCOLORADO STATE UNIVERSITY, GLOBAL CAMPUS NEW DEGREE PROGRAMS
Page 1 of 5 TOPIC: PREPARED BY: COLORADO STATE UNIVERSITY, GLOBAL CAMPUS NEW DEGREE PROGRAMS MARGOT PLOTZ I. SUMMARY This agenda items requests approval of seven new degree programs at Colorado State University,
More informationComputer Forensics Workshop for Undergraduate Students
Computer Forensics Workshop for Undergraduate Students Derek Bem and Ewa Huebner School of Computing and Mathematics University of Western Sydney Penrith Campus, Locked bag 1797, Penrith South DC NSW 1797,
More informationCYBERSECURITY IN FINANCIAL SERVICES POINT OF VIEW CHALLENGE 1 REGULATORY COMPLIANCE ACROSS GEOGRAPHIES
POINT OF VIEW CYBERSECURITY IN FINANCIAL SERVICES Financial services institutions are globally challenged to keep pace with changing and covert cybersecurity threats while relying on traditional response
More informationJune 2008 Report No. 08-037. An Audit Report on The Texas Education Agency s Oversight of Alternative Teacher Certification Programs
John Keel, CPA State Auditor An Audit Report on The Texas Education Agency s Oversight of Alternative Teacher Certification Programs Report No. 08-037 An Audit Report on The Texas Education Agency s Oversight
More informationCriminal Justice Technology course (Note a) 3 2220:100. Criminal Justice Technology course (Note a) 3 2220:100
BS Political Science / Criminal Justice 370010BST (Track 2) Attention students who were admitted to this program prior to Fall 2015, please refer to the curriculum guide found on page 6. The curriculum
More informationSufficiency of Windows Event log as Evidence in Digital Forensics
Sufficiency of Windows Event log as Evidence in Digital Forensics Nurdeen M. Ibrahim & A. Al-Nemrat, Hamid Jahankhani, R. Bashroush University of East London School of Computing, IT and Engineering, UK
More informationRUSSELL IMPLEMENTATION SERVICES INC.
RUSSELL IMPLEMENTATION SERVICES INC. Part of Russell Investments 1301 Second Avenue, 18 th Floor Seattle, WA 98101 206-505-7877 WWW.RUSSELL.COM March 19, 2015 The following Brochure Supplements provide
More informationSchool of Physical and Geographical Sciences
School of Physical and Geographical s 1 About Keele Dual or Single Honours Programs Study TWO subjects Beautiful, safe campus Strong sense of community Low cost of living Student Life union, societies,
More informationLONDON METROPOLITAN UNIVERSITY Course Specification template
LONDON METROPOLITAN UNIVERSITY Course Specification template The University s course specification template has been developed to fulfil three main functions; it shall act: as a source of information for
More informationAustralia Australia & H.K. New Zealand
THE OPEN UNIVERSITY OF HONG KONG ADVANCED STANDING OFFICE Total Credit Value of Qualifications Approved by Academic Board/Senate Australia Australia & H.K. New Zealand Australia, Australia & H.K., New
More informationRUSSELL INVESTMENT MANAGEMENT COMPANY
RUSSELL INVESTMENT MANAGEMENT COMPANY Part of Russell Investments 1301 Second Avenue, 18 th Floor Seattle, WA 98101 206-505-7877 WWW.RUSSELL.COM March 19, 2015 The following Brochure Supplements provide
More informationDIPLOMA IN DIPL FORENSIC ACCOUNTING
DIPLOMA IN FORENSIC ACCOUNTING Web: www.bolc.co.uk Email: admissions@bolc.co.uk Course Introduction: With the increasing level of prosecution for financial fraud, the demand for forensic accountants has
More informationNORTH CAROLINA COMMUNITY COLLEGE SYSTEM H. Martin Lancaster, President
NORTH CAROLINA COMMUNITY COLLEGE SYSTEM H. Martin Lancaster, President February 7, 2008 RESPONSE DEADLINE: February 28, 2008 MEMORANDUM TO: FROM: SUBJECT: Chief Academic Officers Delores A. Parker, Vice
More informationIn an age where so many businesses and systems are reliant on computer systems,
Cyber Security Laws and Policy Implications of these Laws In an age where so many businesses and systems are reliant on computer systems, there is a large incentive for maintaining the security of their
More informationSTUDYING FIRST YEAR FORENSIC COMPUTING: MANAGING THE STUDENT EXPERIENCE
STUDYING FIRST YEAR FORENSIC COMPUTING: MANAGING THE STUDENT EXPERIENCE David W Salt University of Derby School of Computing Derby d.w.salt@derby.ac.uk Harjinder Singh Lallie University of Derby School
More informationPOLICING SUITE GUIDE SCHOOL OF LAW, CRIMINAL JUSTICE AND COMPUTING
POLICING SUITE GUIDE SCHOOL OF LAW, CRIMINAL JUSTICE AND COMPUTING POLICING SUITE 01 POLICING... 06 02 POLICING (CRIME SCIENCE)... 08 03 POLICING (CRIMINAL INVESTIGATION)... 10 04 POLICING (CRIMINAL PSYCHOLOGY)...
More informationIT Security Management 100 Success Secrets
IT Security Management 100 Success Secrets 100 Most Asked Questions: The Missing IT Security Management Control, Plan, Implementation, Evaluation and Maintenance Guide Lance Batten IT Security Management
More informationSENATE STANDING COMMITTEE ON LEGAL AND CONSTITUTIONAL AFFAIRS AUSTRALIAN FEDERAL POLICE. Question No. 100
SENATE STANDING COMMITTEE ON LEGAL AND CONSTITUTIONAL AFFAIRS AUSTRALIAN FEDERAL POLICE Question No. 100 Senator McKenzie asked the following question at the hearing on 24 May 2012: a) How do you define
More informationMSc Forensic Psychology. Programme Specification Faculty of Education, Law and Social Sciences May 2010
MSc Forensic Psychology Programme Specification Faculty of Education, Law and Social Sciences May 2010 Programme Specification: MSc Forensic Psychology NOTE: This specification provides a concise summary
More informationNsw Policing Studies Criminal Law Handbook
Nsw Policing Studies Criminal Law Handbook Children and criminal law - children and police - Young Offenders Act Court (NSW) - criminal records - care and protection of children and young people. CSU's
More informationE. DOCTOR OF THEOLOGY (ThD) AWARD SUMMARY. Qualifications for Admission to Candidature
E. DOCTOR OF THEOLOGY (ThD) AWARD SUMMARY Qualifications for Admission to Candidature Duration Structure English Proficiency A person may apply for admission to the ThD if he or she has obtained or is
More informationPromoting a cyber security culture and demand compliance with minimum security standards;
Input by Dr. S.C. Cwele Minister of State Security, Republic of South Africa Cyber Security Meeting, Johannesburg 27 March 2014 I would like to thank the Wits School of Governance for inviting us to contribute
More informationUSF Graduate Catalog 2015 2016 SECTION 18. http://www.grad.usf.edu/
SECTION 18 COLLEGE OF GRADUATE STUDIES (ADMINISTERED BY THE OFFICE OF GRADUATE STUDIES) 616 Section 18 College of Graduate Studies Changes to Note The following curricular changes for the Office of Graduate
More informationCyber Security Strategy
NEW ZEALAND S Cyber Security Strategy 2015 A secure, resilient and prosperous online New Zealand Ministerial Foreword The internet and technology have become a fundamental element in our lives. We use
More informationRUSSELL REAL ESTATE ADVISERS, INC.
RUSSELL REAL ESTATE ADVISERS, INC. Part of Russell Investments 1301 Second Avenue, 18 th Floor Seattle, WA 98101 206-505-7877 WWW.RUSSELL.COM March 19, 2015 The following Brochure Supplements provide information
More informationThe Arab Society for Forensic Sciences and Forensic Medicine (ASFSFM): Bringing together regional and international expertise
Arab Journal of Forensic Sciences and Forensic Medicine 2014; Volume 1 Issue (0), 17-21 17 Naif Arab University for Security Sciences Arab Journal of Forensic Sciences and Forensic Medicine www.nauss.edu.sa
More informationGUIDELINES ISSUED BY THE VALUERS REGISTRATION BOARD THE PROCESS FOR EVALUATING THE EQUIVALENCE OF
Appendix 1 GUIDELINES ISSUED BY THE VALUERS REGISTRATION BOARD ON THE PROCESS FOR EVALUATING THE EQUIVALENCE OF NEW ZEALAND QUALIFICATIONS OTHER THAN VALUERS REGISTRATION BOARD ACCREDITED DEGREES AND INTERNATIONAL
More informationUSF Graduate Catalog 2014 2015 SECTION 23. http://www.grad.usf.edu/
SECTION 23 COLLEGE OF GRADUATE STUDIES (ADMINISTERED BY THE OFFICE OF GRADUATE STUDIES) 616 Section 23 College of Graduate Studies Changes to Note The following curricular changes for the Office of Graduate
More informationCybersecurity in Nepal
Cybersecurity in Nepal Presenter: Ambika Shrestha Chitrakar PhD candidate at Gjøvik University College Representing Nepal Linkedin: https://no.linkedin.com/in/ambikash IFIP TC3 ISES (Information Security
More informationTWINNING DEGREE PROGRAMMES TWINNING DEGREE PROGRAMMES 1
TWINNING DEGREE PROGRAMMES W o r l d C l a s s D e g r e e s, T r u l y A s i a n V a l u e s TWINNING DEGREE PROGRAMMES 1 Edition 1/2010 MALAYSIA An Excellent Destination for Pursuing Higher Education
More informationREVISED GRID FOR MICRO LEVEL APPROACH
Cover sheet Country: Sector: Level: United Kingdom Bank EQF Level: 6 IT NQF Level: 6 Institution (private/state): Name of the study program : Duration (in years/months): University (state) BSc Computer
More informationDeveloping an Innovative Baccalaureate Program in Computer Forensics
Developing an Innovative Baccalaureate Program in Computer Forensics Jigang Liu Department of Information and Computer Sciences Metropolitan State University St. Paul, Minnesota 55106 jigang.liu@metrostate.edu
More informationBackground. Executive Summary
Background The Interdisciplinary Research Centre in Cyber Security at the University of Kent in Canterbury recently launched a second online survey 1 in order to get a better picture of the prevalence
More informationThis course has specialisations available in financial planning and banking
Education provider Course Duration Prerequisite Available majors Course description Charles Sturt University Master of Applied Finance 2 years full- time or equivalent part- time study CQUniversity Australia
More informationSpeaker: Ms Stephanie Chan, Psychologist, MSc in Forensic Psychology. Director: Dr A Majeed B A Khander, concurrently Deputy Director of Police
Home Team Behavioural Sciences Centre (HTBSC) Speaker: Ms Stephanie Chan, Psychologist, MSc in Forensic Psychology Guests: Penelope, Jane HTBSC Director: Dr A Majeed B A Khander, concurrently Deputy Director
More informationCURRICULUM VITAE. David T. Gallant (USAF Retired) President, Gallant Computer Investigative Services, LLC
CURRICULUM VITAE David T. Gallant (USAF Retired) President, Gallant Computer Investigative Services, LLC EDUCATION: Bachelor of Science, University of the State of New York, Albany, NY, 1995 AA, Criminal
More informationCYBER LIABILITY RISKS SEMINAR Programme overview. THURSDAY 1 OCTOBER 2015 8.30am 1.00pm Green Park Conference Centre, Reading
CYBER LIABILITY RISKS SEMINAR Programme overview THURSDAY 1 OCTOBER 2015 8.30am 1.00pm Green Park Conference Centre, Reading JLT Specialty (JLT) would like to invite you to a highly informative technical
More informationDiploma in Forensic Accounting (Level 4) Course Structure & Contents
Brentwood Open Learning College Diploma in Forensic Accounting (Level 4) Course Structure & Contents Diploma in Forensic Accounting Course Structure & Contents Page 1 Unit 1 Introduction Forensic Accounting
More informationCONNECTING WITH CONFIDENCE: OPTIMISING AUSTRALIA S DIGITAL FUTURE. AIIA Response
CONNECTING WITH CONFIDENCE: OPTIMISING AUSTRALIA S DIGITAL FUTURE AIIA Response 14 November 2011 INTRODUCTION The Australian Information Industry Association (AIIA) is the peak national body representing
More informationMaster of Policing, Intelligence and Counter Terrorism - 2010
Master of Policing, Intelligence and Counter Terrorism - 2010 Provided by POSTGRADUATE Master of Policing, Intelligence and Counter Terrorism About this course Terrorism has become a reality on the international
More informationCybercrime Law (and the Problems of Police Enforcement)
Cybercrime Law (and the Problems of Police Enforcement) Denis Edgar-Nevill Chair, BCS Cybercrime Forensics SG Head of Department of Computing Canterbury Christ Church University COMPUTING LAW INFORMATICS
More informationCybersecurity Educational Standards
Cybersecurity Educational Standards Stephen Cooper, Stanford University Elizabeth Hawthorne, Union County College Lance C. Pérez, University of Nebraska - Lincoln Susanne Wetzel, Stevens Institute of Technology
More informationSRO-EA s Cyber security Initiatives in Eastern Africa
UNECA Sub Regional Office For Esatern Africa SRO-EA 2010 EAIGF 11-13 August 2010, Kampala, Uganda SRO-EA s Cyber security Initiatives in Eastern Africa Mr Mactar SECK United Nations ECA SRO- EA Key Categories
More informationSecurity & privacy in the cloud; an easy road?
Security & privacy in the cloud; an easy road? A journey to the trusted cloud Martin Vliem CISSP, CISA National Security Officer Microsoft The Netherlands mvliem@microsoft.com THE SHIFT O L D W O R L D
More informationE-SECURITY REVIEW 2008 DISCUSSION PAPER FOR PUBLIC CONSULTATION
1. Introduction E-SECURITY REVIEW 2008 DISCUSSION PAPER FOR PUBLIC CONSULTATION Australia s national security and economic and social well-being rely upon the use and availability of a range of Information
More informationWe pride ourselves on delivering a timely, professional and effective witness protection service
Protecting witnesses The CMC is committed to providing an effective witness protection service. We have maintained a 100 per cent success rate in keeping witnesses safe. We pride ourselves on delivering
More informationFeature. How to Maximize Evidential Weight of Electronically Stored Information Recommendations of BS 10008
Feature Haris Hamidovic, CIA, ISMS IA, ITIL, IT Project+, is chief information security officer at Microcredit Foundation EKI Sarajevo, Bosnia and Herzegovina. Prior to his current assignment, Hamidovic
More information