Academic Trends in Digital Forensics

Download
File
eForensics Magazine 2018 07 Academic Trends in Digital Forensics UPDATED.pdf

Dear Readers,

We couldn’t be happier to announce the newest issue of eForensics Magazine - Academic Trends in Digital Forensics. It is devoted to universities that offer digital forensics courses, and, what’s important - this issue is FREE to download!

For this publication, we invited digital forensics and cybersecurity lecturers, students, and those, who have recently graduated from uni. The issue contains many interesting publications on recent academic research.

Diane Gan (in cooperation with David Gresty), who’s a professor at University of Greenwich, has written an article about using edutaiment to train the next generation of forensics investigators, and her 3 students have provided forensic case studies on which they worked during their university course. These case studies relate to murder, terrorism and drug dealing investigations. Diane’s article and works of her students could be extremely useful for other universities looking to implement new teaching methods in DFIR programs.

We’re also proud to present a piece of Tamunoibiton Adoki’s master’s research project regarding Forensic Analysis of Web Browsers in Private mode - never before published, anywhere! Moreover, we have for you articles about steganography in forensic investigations, DMA attacks for Memory Acquisition, detecting and combating phishing, and it’s still not everything in this issue table of contents. Just download this issue for free and check it yourself!

We would like to thank all authors - lecturers, students, and graduates, as well as our betatesters and proofreaders, for participating in this project. Without you this edition would not be created, and everybody knows how important is to educate digital forensics experts - we’re glad to be a part of it.

Dear Readers, last but not least - feel free to share your feedback about this issue with us.

Regards,

Dominika Zdrodowska

and the eForensics Magazine Editorial Team

This magazine is free to download, just register as a free user and enjoy your reading! 


TABLE OF CONTENTS


Using Edutaiment to Train the Next Generation of Forensics Investigations

by Diane Gan & David Gresty

The process of teaching students to become the forensics investigators of the future has certain challenges for academia. The main challenges are how to provide students with realistic cases that will engage and challenge them, facilitate learning and are academically appropriate. We have achieved this at the University of Greenwich by introducing a novel approach to the forensic coursework in the final year module, which uses an edutainment (education + entertainment) approach. This works on the basis that if students are enjoying a subject, they will learn more effectively.

Drug dealing case

by Student from University of Greenwich

Our crime for this exercise was ‘drug dealing’, which is very loose terminology for crime due to the diversity in which it can be employed. Drug dealing can stem from a street dealer all the way to a cartel as well as commonly involving other avenues of crime. However, we have strictly stuck to drug dealing without diverging into other aspects of crime and concocted a story revolving around a drug distributing team that is continuing to grow in size. The investigation revolves around a USB drive recovered during the arrest of the two individuals suspected of being the heads of the network. Their arrest was the result of police investigation into the network’s operation and the successful charging of one of the conspirators who subsequently named them. Despite this, they did not resist when arrested and during the search of their home no evidence could be found linking them to drug dealing activities.

Terrorism case

by Student from University of Greenwich

This case is originally triggered from the concern of neighbours following frequent suspicious visits to a property. As described in the case biography, this has led to the arrest of an individual, named Geoff Baker, under suspicion of terrorism. The evidence seized was a simple USB storage drive, with full information of this device provided in the biography to aid the chain of custody.

Murder case

by Student from University of Greenwich

We have been assigned the ‘Murder’ case for this coursework. “Create a biography for the case – Write an overview of the crime and how this person/persons were arrested. You should also include the details of all equipment seized for the forensics investigators, with dates and times. It should also include the names of any criminals and associates. These names must also be present in the evidence to facilitate a search using forensics tools. Details of the arrest should also be included.”

DMA Attacks for Memory Acquisition using FireWire

by Raina Zakir

The FireWire interface, as standardized by the IEEE 1394, is one of the easy ways of getting Direct Memory Access (DMA) on a target system. This article discusses a way to use the FireWire interface to perform a live memory forensics on a target system using a tool called Inception, which enables execution of invasive and non-invasive memory hacks on a live target. In the latter part, some limitations are discussed for the attack.

Detecting and Combating Phishing

by Matthew Kafami

Chances are you have seen phishing emails; you may have even been the victim of one. You know, the email claiming to be from your bank warning you that your account may have been compromised and requesting you verify your identity by providing your username, password, and answers to your security questions. Additionally, this email will more than likely contain a link to a webpage that looks identical to the site you are familiar with, with a similar layout, choice of text and font, and accurate logos. Do not enter your information. In fact, don’t even click on the link provided in the email without first performing the steps that follow.

Are Digital Forensics Investigators under-estimating the Importance of Steganography within Criminal Investigations?

by Rachael Medhurst

Steganography is often referred to in the Digital Forensic industry as a science or art. Steganography has been used for many years to enable people to hide data from unauthorised viewers. This process works by the user hiding information inside another file, message, image or video.

Introduction to IoT: Forensics Challenges

by Kevin Rice

The internet of things is becoming more popular and very sophisticated. Like many new emerging technologies, the internet of things is required to have digital forensics completed on the device should the device become involved or infected with malware or other illegal activities. In this article we will discuss the technology of the internet of things and how this can relate to digital forensics.  

Intro to data breaches and why get into IT field

by Kevin Moore

Information security and its management are of grave importance to each and every one of us. Young or old, richer or poorer, as consumers we all are at risk for identity theft or theft of private information. Information is critically important to employees, employers, companies, and governments across the globe.

Forensic Analysis of Web Browsers in Private mode

by Tamunoibiton Adoki

The importance of the privacy of personal data in the modern era is one of great concern. Users are becoming aware of their digital footprint and are taking precautions to keep their data from prying eyes. There is an attempt to reduce the footprint created online across websites visited and locally on the user’s personal devices while also attempting to make personal data inaccessible by unauthorised people.


Download
File
eForensics Magazine 2018 07 Academic Trends in Digital Forensics UPDATED.pdf

December 13, 2018

Leave a Reply

avatar

This site uses Akismet to reduce spam. Learn how your comment data is processed.

  Subscribe  
Notify of
© HAKIN9 MEDIA SP. Z O.O. SP. K. 2013