Abstract
This paper discusses the importance of computer forensics to both business and law enforcement environments and describes the passage along the path from act of crime to the court. It highlights the need for computer forensic training and education and gives an overview of the computer forensic course taught in a Masters degree at Curtin University.
Chapter PDF
References
Armstrong, I. (August 2002) Now in Session. The Judiciary and the Digital World,SC Info Security Magazine. p19.
Barbin,D. and Patzakis,J.(2002) Computer Forensics Emerges as an Integral Component of an Enterprise Information Assurance Program,Information Systems Control Journal, Volume 3, p25.
Bologna,G.J.and Lindquist,R.J.(1995)Fraud Auditing and Forensic Accounting (Second Edition),John Wiley &Sons, Inc., New York.
Furnell, S. (2002).. Cybercrime: Vandalizing the Information Society, Addison-Wesley, London
Hatcher,T.(2001). Survey: Costs of Computer Security Breaches Soar CNN.com, Available on-line at (12 March 2001)http://www.cnn.com/2001/TECH/internet/3/12/csi.fbi.hacking.report/index.html
Icove, D., Seger, K. and VonStorch, W. (1995) Computer Crime. A Crimefighter’s Handbook, O’Reilly & Associates, Inc, Sebastopol CA.
Kruse,W. G. and Heiser, J. G. (2001) Computer Forensics. Incident Response Essentials, Addison-Wesley, Boston.
Powers, R. (2002) Computer Security Issues & Trends: 2002 CSI/FBI Computer Crime and Security Survey,Computer Security Institute. Available on-line at:(9 November 2002)http://www.gocsi.com
Vatis. (2000). Statement of the Director, National Infrastructure Protection Center, Federal Bureau of Investigation on Cybercrime before the Senate Judiciary Committee Criminal Justice Oversight subcommittee and House Judiciary Committee, Crime Subcommittee, Washington, D.C. February 29, 2000. Available on-line at.(14 December 2001 ) http://www.usdoj.gov/criminal/cybercrime/vatis.htm
Vatis, Michael. A. (June 2002). Law Enforcement Tools and Technologies for Investigating Cyber Attacks. A National Needs Assessment. Institute for Security Technology Studies, at Dartmouth College, Hanover, NH.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2003 Springer Science+Business Media New York
About this paper
Cite this paper
Armstrong, C.J. (2003). Mastering Computer Forensics. In: Irvine, C., Armstrong, H. (eds) Security Education and Critical Infrastructures. WISE 2003. IFIP Advances in Information and Communication Technology, vol 125. Springer, New York, NY. https://doi.org/10.1007/978-0-387-35694-5_14
Download citation
DOI: https://doi.org/10.1007/978-0-387-35694-5_14
Published:
Publisher Name: Springer, New York, NY
Print ISBN: 978-1-4757-6491-8
Online ISBN: 978-0-387-35694-5
eBook Packages: Springer Book Archive