Abstract
Current network forensics education lacks a systematic view of how real-world cybercrimes are committed and how real-world cases are investigated. In this paper, we fill these gaps. We explicitly define three basic crime strategies as computer assisted strategy, computer focused strategy and non-cyber strategy (traditional crime strategy) and model a real world cyber crime case as a sequence of crimes using these three basic crime strategies. We explicitly define two basic investigation strategies as computerized techniques and traditional operations. These models allow satisfactory explanation of a case that may involve a number of basic types of crimes and investigations. We have also built a real-world case database system for digital forensics education. Our preliminary survey confirms the usefulness of these models and case database system helping students understand cyber crimes and investigations.
Open Access License Notice:
This article is © its author(s) and licensed under the Creative Commons Attribution 4.0 International License (CC BY 4.0), regardless of any copyright or pricing statements appearing in the PDF. The PDF reflects formatting used for the print edition and not the current open access licensing policy.