Digital Forensics and Informatics: Tool Design for Undergraduate Research
[1]
Brant Parrish, Department of Informatics, Indiana University SE, New Albany, Indiana, USA.
[2]
Jessica Bruner, Department of Informatics, Indiana University SE, New Albany, Indiana, USA.
[3]
Matthew Hill, Department of Informatics, Indiana University SE, New Albany, Indiana, USA.
[4]
Micah Schuchardt, Department of Informatics, Indiana University SE, New Albany, Indiana, USA.
[5]
Ted Moso, Department of Informatics, Indiana University SE, New Albany, Indiana, USA.
[6]
Sridhar Ramachandran, Department of Informatics, Indiana University SE, New Albany, Indiana, USA.
This paper is intended for educators, prospective informatics students, current informatics students, and anyone interested in building a Digital Forensics Tool – a Digital Forensics Workstation (DFW) for hands-on research. Although building a Digital Forensics Workstation may seem daunting, it has been built with the student researcher in mind so that anyone interested may take part in a Digital Forensics Investigation using real tools that solve everyday crimes. This paper aims to reveal the backstory to the decisions made involving a custom built computer, software choices, use of software, a set of twelve weeks of lesson plans, and a custom built website to detail the information. Central to the project is the Digital Forensics Workstation that will engage students in real life scenarios to discover what digital forensics is. The work is presented so that it can be easily adopted by interested student clubs, instructors and high school teachers.
Digital Forensics Workstation, Informatics, Kali Linux, Digital Forensics Investigation, Data Analysis
[1]
A. Dilijonaite. “Digital Forensic Readiness”. In A. Årnes (Ed.), Digital Forensics. An Academic Introduction: Preprint, 2017.
[2]
A. O. Flaglien. “The Digital Forensics Process”. In A. Årnes (Ed.), Digital Forensics. An Academic Introduction: Preprint, 2017.
[3]
B. Carrier, "Defining digital forensic examination and analysis tools using abstraction layers," International Journal of digital evidence, vol. 1, pp. 1-12, 2003.
[4]
E. Casey. “Differentiating the phases of digital investigations”. Digital Investigation, 19, A1-A3, 2016.
[5]
I. M. Sunde. "Cybercrime Law". In A. Årnes (Ed.), Digital Forensics. An Academic Introduction: Preprint, 2017.
[6]
J. Dykstra. "Essential cybersecurity science: build, test, and evaluate secure systems". O'Reilly Media, Inc., 2015.
[7]
J-N. Hilgert, M. Lambertz, and D. Plohmann. "Extending The Sleuth Kit and its underlying model for pooled storage file system forensic analysis". Digital Investigation Volume 22, Supplement, Pages S76-S85, August 2017.
[8]
J. Sammons. "Digital Forensics: Threatscape and Best Practices." Syngress Publishing, 2015.
[9]
M. Pollitt, "Computer forensics: An approach to evidence in cyberspace," in Proceedings of the National Information Systems Security Conference, 1995, pp. 487-491.
[10]
M. Reith, C. Carr, and G. Gunsch, "An examination of digital forensic models," International Journal of Digital Evidence, vol. 1, pp. 1-12, 2002.
[11]
R. Kaur and A. Kaur, "Digital forensics," International Journal of Computer Applications, vol. 50, pp. 5-9, 2012.
[12]
V. Roussev. “Digital Forensic Science: Issues, Methods, and Challenges. Synthesis Lectures on Information Security, Privacy, & Trust”. Morgan & Claypool Publishers, 2016.