Office of the Provost - George Mason University

advertisement
GEORGE MASON UNIVERSITY
Graduate Council NEW Certificate, Concentration, Tack or Degree Program
Coordination/Approval Form
(Please complete this form and attach any related materials. Forward it as an email attachment to
the Secretary of the Graduate Council. A printed copy of the form with signatures should be
brought to the Graduate Council Meeting. If no coordination with other units is requires, simply
indicate “None” on the form.
Title of Program/Certificate, etc.: Master of Science in Computer Forensics
Level (Masters/ Ph.D.):
Please Indicate: ___X___ Program ______ Certificate
Track
_______ Concentration
_____
Description of certificate, concentration or degree program:
Please attach a description of the new certificate or concentration. Attach Course Inventory
Forms for each new or modified course included in the program. For new degree programs,
please attach the SCHEV Program Proposal submission.
SCHEV Program Proposal is attached.
Please list the contact person for this new certificate, concentration, track or program for
incoming students:
Andre Manitius, Chair, ECE Department, amanitiu@gmu.edu, tel. 703-993-1569, fax 703-9931601
Approval from other units:
Please list those units outside of your own who may be affected by this new program. Each of
these units must approve this change prior to its being submitted to the Graduate Council for
approval.
Unit:
Head of Unit’s Signature:
Date:
Unit:
Head of Unit’s Signature:
Date:
Unit:
Head of Unit’s Signature:
Date:
Submitted by: Andre Manitius__________
Email: amanitiu@gmu.edu
Graduate Council approval: __________________________________ Date: _____________
Graduate Council representative: _______________________________ Date: _____________
Provost Office representative: _________________________________ Date: _____________
Version dated April 21, 2008
1
STATE COUNCIL OF HIGHER EDUCATION FOR VIRGINIA
PROGRAM PROPOSAL COVER SHEET
1.
Institution
2. Program action (Check one):
Spin-off proposal
New program proposal
George Mason University
3. Title of proposed program
4. CIP code
43.0106
Computer Forensics
5.
Degree designation
Master of Science
6. Term and year of initiation
Spring 2009
7a. For a proposed spin-off, title and degree designation of existing degree program
7b. CIP code (existing program)
8. Term and year of first graduates Fall 2010
9. Date approved by Board of Visitors
(TBD)
10. For community colleges:
date approved by local board
date approved by State Board for Community Colleges
11. If collaborative or joint program, identify collaborating institution(s) and attach letter(s) of
intent/support from corresponding chief academic officers(s)
12. Location of program within institution (complete for every level, as appropriate).
School(s) or college(s) of
Division(s) of
Volgenau School of Information Technology and Engineering
Electrical and Computer Engineering
Campus (or off-campus site)
Fairfax, VA
Distance Delivery (web-based, satellite, etc.)
Currently Not Applicable but Planned in Future
13. Name, title, telephone number, and e-mail address of person(s) other than the institution’s
chief academic officer who may be contacted by or may be expected to contact Council staff
regarding this program proposal.
Andre Manitius, Professor and Chair, Electrical & Computer Engineering Department
703-993-1594, amanitiu@gmu.edu
Version dated April 21, 2008
2
TABLE OF CONTENTS
PROPOSAL FOR A MASTER OF SCIENCE DEGREE IN COMPUTER FORENSICS
DESCRIPTION OF THE PROPOSED PROGRAM...........................................4
OVERVIEW ................................................................................................................................................................ 4
DESCRIPTION OF THE CURRICULUM……………………………………………………………………………….. 5
ADMISSION CRITERIA ............................................................................................................................................... 7
ADVANCEMENT TO CANDIDACY ...………………………………………………………………………………….7
FACULTY ................................................................................................................................................................... 9
PROGRAM SIZE AND VIABILITY …………………………………………………………………………………… 11
PROGRAM ADMINISTRATION ……………………………………………………………………………………... 12
LEARNING OUTCOMES AND ASSESSMENT………………………………………………………………………... 15
BENCHMARKS OF SUCCESS...................................................................................................................................... 16
EXPANSION OF AN EXISTING PROGRAM................................................................................................................... 17
JUSTIFICATION FOR THE PROPOSED PROGRAM ..................................17
RESPONSE TO CURRENT NEEDS ............................................................................................................................... 17
What is Computer Forensics ……………………………………………………………………………….18
Who Utilizes Computer Forensics …………………………………………………………………………18
Why Computer Forensics? …………………………………………………………………………………18
Impact of the Proposed Masters in Computer Forensics program on the Commonwealth of Virginia ..…..16
Evidence for the Need for Computer Forensics experts …………………………………………………...19
Historical Aspects of the proposed Masters in Computer Forensics program …………………………….19
ANTICIPATED STUDENT DEMAND ……………………………………………………………………………….. 20
No Duplication of other Programs ………………………………………………………………………21
Anticipated Employment Demand ………………………………………………………………….…….22
LETTERS OF SUPPORT ………………………………………………………………………………………...22
PROJECTED RESOURCE NEEDS.................................................................... 23
Growth Options
Low Growth Option ………………………………………………………………………………………24
Medium Growth Option …………………………………………………………………….....…………25
High Growth Option ……………………………………………………………………………………...26
Projected faculty and Resource Needs …………………………………………………………27
Full-time faculty …………………………………………………………………………………………..27
Part-time faculty …… ……………………………………………………………………………………27
Adjunct faculty ……………………………………………………………………………………………27
Graduate assistants …………………………………………………………………………………….…..28
Classified positions ………………………………………………………………………………………..28
Equipment …………………………………………………………………………………………………28
APPENDIX A Brief Course Catalog Descriptions............................................................................................... A-1
APPENDIX B Sample Schedule for M.S. in Computer Forensics Completion ................................................. B-1
APPENDIX C Sample “Mini CV’s” for Faculty ................................................................................................. C-1
APPENDIX D Sample Job Announcement with URL and Date ........................................................................ D-1
APPENDIX E Survey Instrument (and some results) ..............................................................................................3
APPENDIX F Assumptions Used in Developing Resource Projections ................................................................ 30
Version dated April 21, 2008
3
PROPOSAL FOR THE M.S. IN COMPUTER FORENSICS
Presented by the
Department of Electrical and Computer Engineering
George Mason University
Description of the Proposed Program
Overview
The Department of Electrical and Computer Engineering as part of George Mason University’s
Volgenau School of Information Technology and Engineering (ITE) is proposing a Master of
Science in Computer Forensics (CFRS). Computer forensics is the collection (seizure),
processing, and analysis of digital information such that this information (evidence) can be
successfully admitted into a court of law. It is interdisciplinary in its nature with an inclusion of
topics and tools from computer engineering, computer science, information technology, network
engineering, telecommunications, law, and ethics. Although related to information security,
computer forensics is a discipline unto itself. In the last 20 years, computer forensics has
evolved into its own industry. Once primarily focused on supporting criminal prosecutions,
computer forensics now also supports civil prosecutions and the enforcement of the SarbanesOxley Act of 2002 (Pub. L. No. 107-204, 116 Stat. 745).
The proposed M.S. in Computer Forensics will prepare students for careers in industry,
government, and academia by combining academic education with real world practical
techniques. Emphasis is placed in the program on training students to use and apply computer
forensics methods and knowledge in a variety of real life scenarios. Computer forensic
examiners (CFE) work in both the public and private sectors, and the Washington, D.C. area is
home to a large work force of CFEs. These CFEs work for the FBI, DEA, USSS, as well as with
the vast majority of Inspectors General and local police departments. Practically all of the major
accounting and consulting firms employ computer forensic examiners on staff, and there is a
growing cadre of independent consultants that work in this field.
The American Society of Crime Lab Directors (ASCLAD), the governing association in the field
of forensics sciences, requires that all computer forensic examiners possess as a minimum a
bachelors degree with significant course work in math and science, which must be supplemented
by a significant period of hands-on forensics work. The FBI recruits computer forensics
examiners who possess as a minimum a bachelors degree with significant mathematics and
science in the curriculum, and then the FBI puts these recruits through an intensive, in-house
training program. Each recruit is mentored through the training program that consists of at least
five exams and five searches, and the average training program takes a year. Once through this
program, the FBI assigns their recently trained CFEs to a senior partner so that additional, reallife training can take place on actual cases. The reason the FBI, and other organizations, are
willing to recruit at the bachelor level and then commit to expensive in-house training, is that
there are very few academic programs that are designed to produce masters in computer
forensics candidates on which the FBI can draw upon for its recruits. The proposed M.S. in
Computer Forensics will do this as it will provide students with the necessary skills and
knowledge to perform in a variety of computer forensic roles, including forensics examiner, in
addition to providing an advanced degree.
Version dated April 21, 2008
4
The distinctiveness of the George Mason’s Master’s program in Computer Forensics lies in the
curriculum, which has been tailored to strengthen the employment opportunities of students in
non-academic jobs, as well as prepare students who may wish to pursue a doctorate. The
proposed program will incorporate faculty research and teaching interests on a range of
contemporary topical issues. It will also provide students with advanced training in computer
and network digital evidence, intrusion forensics, and legal and ethical issues.
The distinguished M.S. in Computer Forensics program faculty are drawn from several
departments, such as (in alphabetical order) Applied Information Technology, Computer
Science, and Electrical and Computer Engineering. Their specializations include information
security assurance, intrusion detection, network forensics, digital media forensics, operating
systems, network engineering, software design, digital hardware, microelectronic chip forensics,
cryptography, computer analysis of handwriting, cyber crime, digital evidence, and law and
ethics. Many faculty members have experience in industry and government settings, and some
have been expert witnesses in court.
The Department of Electrical and Computer Engineering has been offering in the last few years a
Graduate Certificate in Telecommunications, Forensics, and Security (TFAS) as a concentration
within the M.S. in Telecommunications (TCOM) program. The success of the TFAS certificate
demonstrates a clear demand for a reputable Computer Forensics program at the Master’s level,
offered by a Virginia university.
The M.S. in Computer Forensics will contribute to Commonwealth of Virginia and George
Mason University needs and goals by serving a larger graduate student population in key areas
and offering advanced elective courses in areas of interest to students pursuing advanced degrees
in other George Mason programs. Among those programs are Computer Science, Information
Security Assurance, Electrical Engineering, Computer Engineering, and Telecommunications.
George Mason University’s location in Northern Virginia; the teaching capabilities and capacity
within the Volgenau School of Information Technology and Engineering (VSITE), the ECE
department, and the university as a whole; and the status as a program within the Commonwealth
of Virginia’s university system provides a unique advantage in offering students an excellent and
affordable program that will prepare them to effectively use computer forensics skills and
knowledge in their careers.
Description of the Curriculum
The field of forensics science as applied to digital technologies has evolved over a range of
disciplines in the last two decades. The initial concentration of effort was in protecting the
communications links and storage devices from intrusion, theft, and sabotage. George Mason
University’s School of IT&E developed, within the former Information Systems Department
(now within the Computer Science Department), a broad range of courses and research
concentrations that focuses on security of networks, computers, and data storage facilities. Other
Departments and Schools within George Mason University used their range of faculty talents to
address issues such as ethics and fraud within the framework of accounting, law, and
communications. The Department of Electrical and Computer Engineering, within the School of
IT&E, both through its M.S. in Computer Engineering program and its M.S. in
Telecommunications program, explored topics related to cryptography and network security,
Version dated April 21, 2008
5
network engineering, network forensics, and digital media forensics. The stage was therefore set
to draw upon this existing, wide-ranging interdisciplinary pool of talent when cyber crime started
to become a major issue.
With the apparently increasing vulnerability of digital information, whether in transit or stored,
the likely corruption or theft of digital data was such as to require a new capability: computer
forensics. Clearly, the basis for the development of this new capability was in the field of
computer engineering: a range of digital techniques needs to be mastered by any student seeking
to be a practitioner in this field. However, the ability to trace the theft or corruption of digital
information is not sufficient. The search results must be able to withstand the scrutiny of a court
of law. The engineering knowledge of computer forensics has therefore to be supplemented by a
strong understanding of both ethical and legal issues to ensure that the evidence will hold up
under the strongest scrutiny. The proposed M.S. in Computer Forensics program seeks to blend
an exacting engineering, ethics, and legal issues plan of study to ensure that the graduates are
thoroughly grounded in the skills necessary to work in both commercial and law enforcement
areas, and are equipped to enter into an academic research path or a professional career.
The proposed M.S. in Computer Forensics (CFRS) requires the completion of a minimum of 30
hours of graduate course work with a GPA of 3.000, or higher. The CFRS program is split into
two elements: a Core component of 18 credit hours (15 credit hours plus a mandatory, 3-credit,
capstone course that is taken towards the end of the degree) and an Elective component of 12
credit hours. The CFRS course names are given in Table 1 with the course descriptions given in
detail in appendix A. All courses without the CFRS designation are existing graduate courses
within the university.
Core Component:
The Core component consists of four elements, with each individual course being 3 credit hours:
-
A mandatory introductory course must be taken as the first course, or as one of the first
courses, in the first semester of the student’s M.S. in Computer Forensics degree program.
This course may be either CFRS 500 or ISA 562.
(3 credits)
-
Three Forensics courses (CFRS 660, 661, and 663) that may be taken in any order, but
which should be completed within the first 18 credit hours of the student’s degree program
(total of 9 credits)
-
One Ethics course that may be selected from a pair of Ethics courses (CFRS 760 and 770),
and which may be taken at any point in the program (3 credits); and
-
A Capstone Project Course (CFRS 790) that may not be taken until at least 18 credit hours
have been earned within the CFRS degree program
(3 credits).
Elective (Specialty) Component:
The Elective component consists of a number of specialty topic courses, again each of 3 credit
hours, and students are required to select 4 of these courses. Some students may wish to
broaden their curriculum with a sociology or law course, while others may wish to focus on
information security assurance (ISA) or computer engineering (ECE) courses as part of their
Version dated April 21, 2008
6
preparation for a Ph.D. program. Table 1 includes a detailed plan of the curriculum. Please
refer to Appendix A for detailed course descriptions.
Coursework will progress from core courses to more advanced specialty courses, culminating in
a capstone project course. Both 600 and 700-level core courses are designed to establish a solid
foundation for subsequent work beyond the master’s level. The basic core course CFRS 500 (or
alternatively ISA 562) will be offered every semester, while the other core courses will be
offered each year, probably in alternate semesters, until the CFRS student body builds up to
warrant those courses being given in every semester.
The Specialty courses are designed to provide students with advanced, more specialized,
graduate level studies in the area that they feel will help their career the best, whether it will be
academic or professional. The non-CFRS specialty courses listed in Table 1A number, e.g. ISA
774 Intrusion Detection and INFS 785 Data Mining for Homeland Security, are not necessarily
the only specialty courses that may be taken. It is likely that additional elective courses will be
added as the field of forensics expands, both in breadth and depth. One example could be the
area of Multimedia Forensics, an international conference on which was held in August 2008.
The URL for this conference (http://home.simula.no/~yanzhang/MUSIC/) listed topics in many
forensics areas, including multimedia forensics.
The strong networking element of the CFRS program requires students to have detailed TCP/IP
and Internet Routing knowledge before entering the main CFRS program. If students lack this
background, they should take TCOM 509/529 (IP/Advanced IP) and TCOM 515 (Internet
Routing Lab), or equivalents, prior to CFRS 500. TCOM 509/529 and TCOM 515 are existing
courses offered every fall, spring, and summer as part of the M.S. in Telecommunications degree
program.
It is worth noting that seven (7) courses within the proposed M.S. in Computer Forensics
program are existing courses that are taught in companion programs. Three (3) of these courses
are in the core component and four (4) are in the elective component of the proposed M.S. in
Computer Forensics program. Only five (5) brand new courses need to be developed, and their
detailed content, together with all of the other courses to be taught in the M.S. in Computer
Forensics program, are given in Appendix A to this proposal. The requisite faculty are already
available to teach all of these courses and so no additional funds are requested for new faculty
positions for teaching within the proposed program. However, a Program Director of the M.S. in
Computer Forensics will be appointed as a faculty member in the ECE department to run the
program and an administrative assistant will be appointed in a staff position within the ECE
department to assist in the running of the M.S. in Computer Forensics office. It is intended to fill
these positions by the proposed start of the program in Spring (or Fall) 2009. Depending on the
growth in enrollments, a second faculty position, and maybe a third, is anticipated to be needed
within four or five years. The associated costs of these positions are discussed later in this
proposal.
Appendix B provides sample schedules for the CFRS degree completion for both full-time and
part-time students. Time to completion may involve more or less time depending on student
work load and courses chosen, and on the number of courses offered each semester, which is
concomitant on the number of students who register. Three growth projections are used in
Version dated April 21, 2008
7
developing the plan of study: (i) a low growth option with 20 students admitted each semester;
(ii) a medium growth option with 20 students in the first semester, 30 new students in the second
semester, and then a stable count of 40 new students per semester thereafter; and (iii) a high
growth option with 20, 40, then a stable count of 60 new students per semester. Appendix B
gives more details. It is anticipated that full-time students will graduate in two years or less,
while most part-time students will take between two and four years. These durations match
those of all 30 credit hour masters programs currently offered by George Mason University.
Admission Criteria
Students who hold a B.S. or B.A. degree from an accredited college or university in engineering,
math, science, computer science, business (with a quantitative background), economics, or other
analytical disciplines, or students who have equivalent work experience indicating analytical
aptitude, may apply to the M.S in Computer Forensics. Depending on their background, some
applicants may be required to complete 3 to 6 credits of preliminary course work before they are
allowed to enroll in any of the core courses or specialty courses in the program. The anticipated
courses some students will be required to take as a condition for admittance to the M.S. in
Computer Forensics program are TCOM 509 (Internet Protocols; 1.5 credits), TCOM 529
(Advanced Internet Protocols; 1.5 credits), TCOM 515 (Internet Routing lecture and lab; 3
credits), and TCOM 575 (Quantitative Fundamentals; 3 credits). Other courses: TCOM 509,
529, 515, and 575 may not be taken for credit in the proposed M.S. in Computer Forensics
program. A minimum undergraduate GPA of 3.00 is required for acceptance.
Students may be admitted to the M.S. program, or they may be admitted for non-degree study
within the program, which allows them to take individual courses. Students in the non-degree
program have the option of transferring into the regular program, provided their GPA within the
M.S. in Computer Forensics program is 3.00 or above. Up to 12 credits earned in non-degree
study may be transferred into the regular program, provided each of the courses to be transferred
in was passed with a grade of B, or above. These conditions are the same as those currently
applied to most graduate degrees at George Mason University
Advancement to Candidacy
There is no dissertation or thesis requirement for this program and so all candidates admitted
under regular master’s status to the proposed M.S. in Computer Forensics program are
candidates for the degree. They graduate under the normal conditions that apply to master’s
candidates: completion of the required core courses, including the capstone course; completion
of the elective element of the program; completion of the total of at least 30 credit hours with a
minimum GPA of 3.000, no more than 6 credit hours worth of C grades.
Version dated April 21, 2008
8
Table 1: M.S. in Computer Forensics curriculum (proposed)
Mandatory Core Component
(18 credits from 21 credits)
Course
Title
Either
CFRS 500*
Or
ISA 522
Or
ISA 562
CFRS 660
(Currently TCOM 660)
CFRS 661
(Currently TCOM 661)
CFRS 663
(Currently TCOM 663)
Either
CFRS 760 * ++
Or
CFRS 770 * ++
Intro to Technologies of Value to Forensics
Information Security Essentials
Information Security Theory and Practice
Network Forensics
Credits
3
3
3
3
Digital Media Forensics
3
Operations of Intrusion Detection for Forensics
3
Legal and Ethics in IT
Fraud and Forensics in Accounting
3
3
CFRS 790 * +++
Advanced Computer Forensics
(CFRS Degree Capstone Course)
3
Specialty Courses (12 credits from the courses below)
TCOM 662
Advanced Secure Networking
3
ECE 646
Cryptography and Computer-Network Security
3
ECE 746
Secure Telecommunication Systems
3
ECE 511
Microprocessors
3
CFRS 760 * ++
Legal and Ethics in IT
3
CFRS 770 * ++
Fraud and Forensics in Accounting
3
CFRS 780 *
Special Topics Course
3
INFS 785
Data Mining for Homeland Security
3
ISA 650
Security Policy
3
ISA 652
Security Audit/Compliance Testing
3
ISA 656
Network Security
3
ISA 674
Intrusion Detection
3
ISA 785
Research in Digital Forensics
3
LAW 181
Communications Law
3
SOCI 607
Criminology
3
(*)
(++)
Represents proposed new courses
Both of these courses may be taken but only one may be used in the core component
(+++) CFRS 790 is the Capstone CFRS Course and may only be taken after a total of 18 credit hours have been
completed in the CFRS program, which shall consist of CFRS 500; at least two courses drawn from TCOM 660,
661, and 663; and at least one course from CFRS 760 and 770.
Version dated April 21, 2008
9
Faculty
The M.S. in Computer Forensics will utilize the large and diverse capabilities of the faculty of
the Volgenau School of Information Technology and Engineering (IT&E) where many courses
are currently taught in a variety of master’s level programs with a security or forensics emphasis.
The CS department houses the strong M.S. in Information Security Assurance (ISA) program, in
addition to a broad M.S. in Information Systems (INFS) program that forms a strong element of
the Ph.D. in Information Technology available within the Volgenau School of Information
Technology and Engineering (VSITE). The ECE department has an M.S. in Computer
Engineering program with faculty specializing in cryptography and security of digital devices,
and additional faculty members in areas such as microelectronic chip design for applications in
digital forensics and DNA forensics on a chip. The ECE department also has experience with
offering a Graduate Certificate in Telecommunications, Forensics, and Security (TFAS), a
precursor of the presently proposed Master of Science in Computer Forensics. The Applied
Information Technology (AIT) department has faculty who are experts in research on computer
analysis of handwriting, which adds an extra dimension to computer forensics. Additional
courses may be added to the program at a later date to provide these additional topics to the
students. A number of interdisciplinary programs exist that allow faculty from other schools
within George Mason University to teach within VSITE programs. Examples are the School of
Public Policy and the Law School that offer courses within VSITE programs.
In addition to regular faculty, the Volgenau School of IT&E is fortunate to have a large pool of
experienced adjunct faculty with outstanding computer forensics experience in industry or
federal government, who will be called on to teach within the M.S. in Computer Forensics
program. The use of current working forensics professionals and tenure, or tenure-track, George
Mason University faculty pursuing in-house research will ensure that the course content remains
relevant and the instruction is at the level that both the students and the organizations to be
served by this program demand. The proposed M.S. in Computer Forensics program will be
supported by GMU faculty members with the following collective credentials: information
security, intrusion detection, digital media forensics, network forensics, cryptography, digital
devices security, forensics applications of microelectronics, cyber crime, digital evidence,
telecommunications law, and ethics.
A key element in the proposed M.S. in Computer Forensics program is that it will not be starting
from scratch: the majority of the components necessary for the success of the program already
exist. At the undergraduate level within the Volgenau School of Information Technology and
Engineering (V-SITE), the thriving Bachelors of Science in Information Technology (BSIT)
program already has a very well populated concentration that is a natural precursor to the M.S. in
Computer Forensics area: the Information Security and Networking(ISN) concentration. The
number of students in the BSIT program in 2005 and 2006 academic years who have elected to
concentrate on ISN is shown in Table 2 below. As can be seen in Table 2, in academic year
2005 almost half of the students (377 of 784) elected ISN as their major and the number was
even larger in 2006 (419 of 723). The numbers remained essentially the same in 2007 and the
start of 2008.
Version dated April 21, 2008
10
At the graduate level in V-SITE, there is a Graduate Certificate in Telecommunications
Forensics and Security (TFAS) that is currently offered within the existing M.S. in
Telecommunications (TCOM) program. The TFAS certificate has attracted a significant group
of students who have entered the M.S. in Telecommunications program, with about 10% of the
TCOM students electing to take the TFAS certificate. There are currently about 220 TCOM
students and about 8 of the 80 TCOM students who graduated in each of the last two years
(2005/6 and 2006/7) earned TFAS certificates. Details of the courses and structure of the TFAS
certificate are in given in Table 3 below.
Table 2. BSIT Enrollments by Concentration 2005 and 2006
2005
FT
Freshmen
Other
Freshmen
Sophomores
Juniors
Seniors
TOTAL
ISN
4
10
47
106
210
377
CGW
0
2
7
25
62
96
DBMP
0
0
1
1
2
Undeclared
42
40
94
46
309
87
TOTAL
2006
784
FT
Freshmen
Other
Freshmen
Sophomores
Juniors
Seniors
TOTAL
ISN
20
9
57
113
220
419
CGW
11
7
19
22
48
107
DBMP
6
5
4
10
5
30
Undeclared
11
22
69
22
43
167
TOTAL
723
__________________________________________________________
Table source: http://irr.gmu.edu/off%5Fenrl%5Fconc/
Data extracted and prepared by Anne Marchant September 28th, 2007
Key
ISN = Information Security and Networking
CGW = Computer Graphics and Web
DBMP = Database Management and Programming
Version dated April 21, 2008
11
Table 3. Telecommunications, Forensics, and Security (TFAS)
Graduate Certificate program (existing)
Mandatory Core Courses (9 credits from 15 credits)
TCOM 548/556
Security Issues in Telecom/Cryptography and Network
Security (1.5 credits each; total of 3 credits)
or TCOM 515
Internet Protocol Routing (3 credits)
TCOM 562
Network Security Fundamentals (3 credits)
And either TCOM 660 (*)
Or TCOM 661 (*)
Network Forensics (3 credits)
Digital Media Forensics (3 credits)
Specialty Courses (6 credits from 15 credits)
TCOM 660 (*)
Network Forensics (3 credits)
TCOM 661 (*)
Digital Media Forensics (3 credits)
TCOM 662
Advanced Secure Networking (3 credits)
TCOM 663
Operations of Intrusion Detection for Forensics (3 credits)
ISA 562 (+)
Information systems Security (formerly INFS 762) (3 credits)
(*) TCOM 660 and TCOM 661 cannot be taken twice for credit. If either course is taken in the
core element, it cannot be taken again in the specialty element.
Program Size and Viability
There are around 400 BSIT students graduating each year with an Information Security and
Networking (ISN) concentration from George Mason University. If 20% of this graduating pool
were to go on to graduate school the next year (a conservative estimate) and 20% of these were
attracted into the proposed M.S. in Computer Forensics program (again, a conservative estimate),
there would be 16 prospective incoming students a year, just from the BIS program at George
Mason University. More likely the number would be 3 times larger, giving an intake pool of
more than 50 applicants to draw from. It is also anticipated that the proposed M.S. in Computer
Forensics will attract those students within the M.S. in Telecommunications program who
elected to take the TFAS certificate within their TCOM program. Based on the strong demand
for well qualified applicants in the area of computer forensics in the local, and nationwide, job
market, it is confidently expected that the proposed program will attract at least 100 viable
applicants a year by the end of the second year of the program (growth option (ii) discussed
earlier in this proposal). This confidence is justified by the results of a web-based survey
Version dated April 21, 2008
12
conducted in October 2007. Of the 149 total respondents to the survey, 91% (135 of 149) were
interested in enrolling in the M.S. in Computer Forensics program; 82% (121 of 147) were
currently enrolled at George Mason University; 64% (75 of 117) are currently working full time;
87% (103 of 118) live in Virginia; and 94% (132 of 141) plan to live in their current state for the
next 3 or 4 years. The detailed responses to the Survey Instrument, together with the Survey
Instrument, are shown in Appendix E.
The area of computer forensics is growing rapidly. In February 2008, a three day trade show
was held in Washington, D.C., to showcase the products being developed by companies in
computer forensics. More than 50 companies were represented at the show, which was very well
attended. See http://www.computerforensicshow.com/. The IEEE Signal Processing Magazine
has recently issued a call for papers for a special issue on Digital Forensics that will be published
in March 2009 – well timed for the start of the proposed M.S. in Computer Forensics at George
Mason University. All this supports the assertion that the field of computer forensics is growing
rapidly and that it will require a significant injection of well trained professionals to fill the
positions that will be created. The proposed M.S. in Computer Forensics is designed to produce
such professionals.
Program Administration
The proposed M.S. in Computer Forensics will be administered by the Electrical and Computer
Engineering (ECE) department of the Volgenau School of Information Technology and
Engineering (V-SITE). The M.S. in Telecommunications (TCOM) is one of three master’s
degrees offered within the ECE department (the other two being an M.S. in Electrical
Engineering and an M.S. in Computer Engineering), and the Graduate Certificate TFAS is one of
three advanced certificates offered within the M.S. TCOM program, and one of the total of six
offered by the ECE Department.
It is anticipated that a director of the M.S. in Computer Forensics program will be appointed by
Spring 2009, which is when the first courses are planned to be offered. The director of the M.S.
in Computer Forensics will have a full-time administrative assistant who will assist in the
running of the M.S. in Computer Forensics office. In addition to scheduling the course offerings
and hiring such adjunct faculty as are needed for each semester, the director of the M.S. in
Computer Forensics will engage local organizations who have an interest in computer forensics
in order to explore cooperative ventures, such as an expansion of computer forensics lab
capabilities on the George Mason University campus. As the program grows, the revenues will
not only sustain both the position of the director of the program and his or her assistant, but also
the recruitment of one or two faculty to both teach and conduct research.
The following full-time faculty members of V-SITE are currently identified by the agreement of
the respective departments and approval of the Dean as willing to support this new program by
teaching courses and advising students on potential research directions and career paths. They
are listed by their departments, and the departments are listed alphabetically. Short bios of these
faculty members are shown in Appendix C to this document.
Version dated April 21, 2008
13
Applied Information Technology Department (AIT)
Dr. Donald Gantz (AIT)
– Statistical methods applied to computer analysis of handwriting
Dr. Anne Marchant (AIT)
– Computer Crime, Forensics, Auditing, Ethics
Computer Science Department (CS)
Dr. Daniel Barbara (CS)
– Data Mining and its Applications
Dr. Xuxian Jiang (CS)
– System and Network Security, Virtualization Technology, Distributed
Computing
Dr. Edgar Sibley (CS)
– Information Systems Policy, Organizational Informatics
Dr. Bob Simon (CS)
– Computer Networks, Distributed Multimedia and Real-time Systems,
Computer-Supported Cooperative Work, Performance Modeling and
Simulation, Multimedia Databases and Video-on-Demand Systems
Dr. Angelos Stavrou (CS)
– Large Systems Security and Survivability, Secure Peer-to-Peer and Overlay
Networking, Distributed Systems Reliability, Fairness and Statistical Inference,
and Privacy and Anonymity
Dr. Frank Wang (CS)
– Network Security, Intrusion Source Tracing, Active Intrusion Response
Dr. Duminda Wijesekera (CS)
– Security, Multimedia, Networks, Control and Signaling, Logic
Electrical and Computer Engineering Department (ECE)
Dr. Kris Gaj (ECE)
– Cryptography, computer arithmetic, reconfigurable computing, softwarehardware co-design, and computer-network security.
Dr. Ken Hintz (ECE)
– Syntactic pattern recognition applied to ground penetrating radar images for
landmine detection and classification, information-based real-time sensor
management, X-ray, thermal, and visual, image processing, as well as computer
architectures and algorithms for real time signal processing.
Version dated April 21, 2008
14
Dr. David Hwang (ECE)
– Secure embedded systems, cryptographic hardware for embedded system
security. Digital signal processing architectures (FPGA/ASIC), VLSI digital
systems and circuits.
Dr. Jens-Peter Kaps (ECE)
– Ultra-low-power cryptographic hardware design, computer arithmetic, efficient
cryptographic algorithms, and computer and network security
Dr. Qiliang Li (ECE)
–
Nanoelectronic devices, with potential applications.
Dr. Rao Mulpuri (ECE)
– Large band-gap semiconductor materials, microelectronics devices, material
and device characterization, and chip forensics (supported by DOJ).
The following adjunct faculty members are identified as candidates for instructors in this new
program. They have been teaching courses in the Graduate Certificate of Telecommunications,
Telecommunications, Forensics and Security (TFAS) certificate within the TCOM program over
the past several years:
Special Agent Robert Osgood (FBI)
– Digital media forensics, network forensics, digital evidence, cyber crime.
Special Agent James R. Durie (FBI)
–
Computer forensics and virtual worlds, identification, testing, and validation
of new tools for use in forensic examinations.
Ms. Angela Orebaugh
– Information security, intrusion detection, network forensics. Co-author of
books on intrusion detection and network security.
Dr. Aleksandar Lazarevich
– Information security, digital evidence, computer and network forensics,
advanced network security, basic switching lab.
Dr. Thomas Shackelford
– Information security, digital evidence, computer and network forensics,
advanced network security, basic switching lab
Version dated April 21, 2008
15
Advisory – Steering Committee
In addition to faculty currently active in teaching within the TFAS certificate and the INFS and
ISA programs within the Volgenau school of Information Technology and Engineering, the M.S.
in Computer Forensics will have under an Advisory Committee. The following is the preliminary
composition of the committee. Additional, external members will be invited when the program is
approved.
Dr. Jeremy Allnutt
– Professor in ECE and director of the TCOM program
Telecommunications, Satellite Communications, Digital Communications
Dr. Donald Gantz,
–
Professor in AIT, Chair of the Department of AIT, expert in computer analysis
of handwriting
Dr. Andre Z. Manitius
– Chair of the Electrical and Computer Engineering department.
Applied Mathematics, Digital Signal Processing, Control Systems
Dr. Anne Marchant
– Associate Professor in AIT
Computer Crime, Forensics, Auditing, Ethics
Dr. Bob Simon
– Associate Professor in CS
Computer Networks, Distributed Multimedia and Real-time Systems,
Computer-Supported Cooperative Work, Performance Modeling and
Simulation, Multimedia Databases and Video-on-Demand Systems
The advisory committee will provide advice to the management of the M.S. in Computer
Forensics program and curriculum.
Learning Outcomes and Assessment
Graduates from the M.S. in Computer Forensics will demonstrate superior academic skills in
computer forensics methods and practice. Students will have an understanding of the laws
associated with computer forensics and be able to present digital evidence in a court of law.
They will also be able to successfully seize, image, deconstruct, and analyze digital media,
analyze logs, decipher network traffic, and report this information in a suitable format. They will
be able to implement an intrusion detection system, construct signatures, and apply intrusion
detection in the forensics area. Students will be able to apply their classroom learning in a
variety of computer forensics positions in industry, government, and academia. They will also
demonstrate a foundation for advanced research in the computer forensics field.
As with all academic programs in George Mason University, assessment of student learning in
the proposed M.S. in Computer Forensics will take place at the levels of the student, the course,
Version dated April 21, 2008
16
and the program. Students will be assessed in a number of ways throughout the program.
Scholarly ability will be evaluated through course grading in seminar-style classes. Oral,
written, and analytical skills will be considered in course grading. The capstone class, CFRS
790, will assess the students overall learning with a project that consolidates the various courses
in the curriculum.
Course evaluations are conducted in every course in every term, providing the student’s
perspective on course effectiveness. Overall, the program will be reviewed on the 6-year cycle
typical of programs within the Volgenau school of Information Technology and Engineering.
Program review takes place under the guidance of the Office of institutional Assessment and
requires three semesters to complete. The outcomes of the process are a series of deliverables –
a self-assessment report and academic plan written by program faculty and a report by a review
team external to the program – and changes made to enhance the program. The Department of
Electrical and Computer Engineering is scheduled for review of its programs in 2008-09.
Benchmarks of Success
The program’s goal is to train students to use their computer forensics knowledge and methods
effectively in industry, government, or academic positions. Specific benchmarks for success will
be based upon the program’s ability to attract high-quality applicants, the timely graduation of
qualified students, and job market placement.
Given the success of the Graduate Certificate TFAS in the M.S. in Telecommunications
program, which has been in place for a little over two years, it is anticipated that the Master’s
Program in Computer Forensics will receive academically well-qualified applications for
admission. The quality of applicants will be measured against comparable Master’s programs in
Computer Forensics. Success must also be measured by the ways in which the program affects
career trajectories and job mobility once a student has completed the program.
The projected length of the program for a full-time student is eighteen months to two years. For
part-time students, it is difficult to estimate completion time, but it is approximately two to four
years, depending on the number of classes in which part-time students enroll each semester.
Appendix B provides sample schedules for degree completion for both full and part time students
under one of three growth scenarios.
Follow-up surveys will evaluate the success of graduated students in the job market. It is
expected that for individuals who enter the program from a career position, they will most likely
derive the benefit of promotion upon completion of the Master’s. Individuals who enter the
program from a work position that is not connected closely to computer forensics, it is strongly
expected that gaining the M.S. in Computer Forensics will permit that student to compete very
effectively in the job market for a CFE position. For students who desire to enter academia,
relevant faculty will assist graduates with obtaining entrance into a doctoral program at an
appropriate institution of higher learning. If program benchmarks are not achieved, the program
faculty will examine its marketing and recruiting practices, admissions requirements, curriculum,
instructional methods, advising practices, and course evaluations to determine necessary program
modifications. It is anticipated that as the program continues, higher benchmarks in the areas of
admission requirements and job placement will be developed and applied.
Version dated April 21, 2008
17
Expansion of an Existing Program
The success of the Graduate Certificate in Telecommunications, Forensics and Security (TFAS)
within the M.S. in Telecommunications program offered a stimulus for the development of a
stand-alone M.S. in Computer Forensics degree program. The M.S. in Computer Forensics
degree program is designed to both supersede, and enhance, the present course offerings in
Forensics and Security within the M.S. in Telecommunications program. The modifications are
designed to enhance the rigor of the forensics certificate. The M.S. in Computer Forensics is not
offered in collaboration with external academic institutions. However, the School of IT&E
proposes to collaborate with other programs at George Mason University, notably Sociology,
Law, Computer Science, and Information Systems. Students currently registered for the TFAS
certificate at the time of approval of the M.S. in Computer Forensics will be offered the
opportunity of transferring to the M.S. in Computer Forensics, subject to a review of their
individual progress to date, or to continue within the TFAS certificate program until they
graduate. The M.S. in Computer Forensics will therefore not entail the requirement for
additional teaching resources, but it will require the addition of one faculty position and one staff
position (assistant to the director) at the outset of the program. Other positions would be filled
on an as-required basis. It is strongly anticipated the program will be self-sufficient within two
years and, if the projections of student demand are even half those expected, will generate
sufficient revenues to grow the faculty positions in the short-to-medium term to at least three.
The Graduate Certificate in Telecommunications Forensics and Security (TFAS) is a 15-credit
program (please see Table 3 on page 10) designed to provide students with an in-depth
understanding of forensics and security as they apply both to networks and digital storage media.
The TFAS certificate was developed both in response to student demand and to provide a
specific concentration area within the M.S. in Telecommunications degree program. The TFAS
certificate is the foundation of the proposed Master’s degree in Computer Forensics, with three
TCOM courses within the TFAS degree specifically adapted for the proposed M.S. in Computer
Forensics program. Details of the TFAS certificate can be found earlier in Table 3.
Justification for the Proposed Program
Response to Current Needs
This section provides background information on the proposed program, a description of what is
occurring in the field that warrants the proposed Masters in Computer Forensics program, and
evidence that the Commonwealth of Virginia needs this program to address emerging current
demands. Earlier sections have detailed the emergence of the TFAS certificate in response to
student demand, the success of the TFAS certificate program, and the overwhelmingly positive
responses obtained via the Survey Instrument (see appendix E) of student interest in a Master of
Science in Computer Forensics program. It is anticipated that the work place demands for
skilled computer forensics will only expand in the future, leading to strong growth, and
sustainability, in the proposed program. What follows explains the area of study, which
organizations will employ the graduates, why the area has come into demand, and the impact of
the program on the State of Virginia.
Version dated April 21, 2008
18
What is Computer Forensics?
Computer forensics is the collection (seizure), processing, and analysis of information that has
either been transmitted or stored in digital form in such a way that this information (evidence)
can be successfully admitted into a court of law. Computer forensics is interdisciplinary in
nature with an emphasis on computer science, network engineering, telecommunications, law,
and ethics. There are two main subsets to the field of computer forensics:
(a) Digital media acquisition and analysis; and
(b) Network traffic collection, reconstitution, and analysis.
Although related to information security, computer forensics is a discipline unto itself.
Who Utilizes Computer Forensics?
Law enforcement utilizes computer forensics extensively in the investigation of all types of
crimes that involve the sending or storing of digital information. Computer forensics has been
successfully applied in so-called white collar crime that involves, amongst other things,
computer intrusion, identity theft, and child pornography matters. It has also been used
extensively in the investigation and prosecution of homicides, sexual exploitation, illegal drug
distribution, and just about every other crime that you can think of. The search and seizure of
evidence almost always involves the investigation of digital storage media or digital network
access either as the primary or secondary means for the commission of the suspected crime. The
digital information can range from the SIM cards of cell phones to complex network instructions.
Computer forensics is not for law enforcement alone. The private sector utilizes computer
forensics extensively. In fact, computer forensics is an integral part of civil cases. Organizations
also use computer forensics internally for quality control and investigative matters. With the
advent of the Sarbanes-Oxley Act of 2002 making corporate executives personally responsible
for the financial statements of the company, computer forensics is playing a crucial role in the
identification and presentation of key information that executives need to effectively run and
report operations.1
Why Computer Forensics?
The design and development of digital media or digital networks requires a certain skill set that
is taught in a number of programs, one of which is the current Masters in Telecommunications at
George Mason University. However, when a security breach has occurred in the storage or
transport of digital information, or has been suspected to have occurred, the examination of the
1
www.ijde.org, Patzakis, John, New Accounting Reform Laws Push For Technology-Based Document Retention
Practices, International Journal of Digital Evidence, Spring 2003, Volume 2, Issue 1
Version dated April 21, 2008
19
digital media or digital networks for evidence of wrongdoing cannot be undertaken in a
haphazard manner. For the information uncovered in the examination of digital media or digital
networks to be admissible in a court of law, there are rigorous standards set, which must be
followed exactly. The Master of Science in Computer Forensics program will offer to all those
who take the program the policies, procedures, and techniques that can be applied across a
myriad of situations. Whether it is the seizure of digital media in support of a criminal
prosecution, civil dispute, or internal corporate matter, the tools and techniques that computer
forensics offer are invaluable. These will be taught in the proposed M.S. in Computer Forensics.
Impact of the proposed M.S. in Computer Forensics on the Commonwealth of Virginia
The Commonwealth of Virginia with its propinquity to the federal government, is the home of
computer forensic programs of many federal agencies that include: the Federal Bureau of
Investigation (FBI), Internal Revenue Service (IRS), United States State Department (USSD),
United States Postal Service (USPS), Drug Enforcement Administration (DEA), and Defense
Criminal Investigative Service (DCIS), just to name a few. Across the river in Washington D.C.
you will find the computer forensic programs of the Department of Homeland Defense (DHS)
and the United States Secret Service (USSS). On the state/local horizon, The Virginia State
Police (VSP), the Fairfax County Police (FCP), Arlington County Police (ACP), Prince William
County Police (PWCP), and other departments too numerous to mention have active computer
forensics requirements that necessitate both internal and external programs of instructions for
those employed by those agencies or forces. It is worth noting here that the Regional Computer
Forensics Group holds its annual meeting at George Mason University every summer. Please
visit http://rcfg.org for additional information. The most recent meeting was held from the 6th to
the 10th of August, 2007.
Corporate computer forensic presence in the Commonwealth include: Kroll Inc., MANDIANT,
Deloitte Touch, BearingPoint, Northrop Grumman, and Booz Allen Hamilton, again just to name
few. All of these organizations have both an internal instructional program and a requirement for
more formal external instruction. There was also a recent computer forensics show in
Washington, D.C., where more than 50 companies participated2.
The availability of a high quality Master of Science in Computer Forensics program at George
Mason University will enable local branches of federal agencies, as well as the various
departments and police forces in the State of Virginia, to send their officers and personnel for
training in the formal requirements of digital media and network forensics procedures. The
impact on the State of Virginia is expected to be very positive, both in the development of a
cadre of forensics experts who can assist in crime prevention and prosecution, and in the overall
reputation of the state for fostering such a program.
Evidence for the need for Computer Forensics experts
The Computer Security Institute, with the participation of the San Francisco Federal Bureau of
Investigation’s Computer Intrusion Squad, produces an annual report on computer crime and
2
http://www.computerforensicshow.com/ and http://enewschannels.com/2008/01/16/enc2505_015731.php
Version dated April 21, 2008
20
information security titled: “Computer Crime and Security Survey.” In this survey published
each year for the last 11 years, the rising tide of virus attacks, unauthorized access, and theft of
proprietary information (i.e., intellectual property) account for 74% of financial loss. In the most
recently published (2006) survey, 313 respondents identified over $52 million in losses due to
cyber crime. 50 percent of the survey respondents agreed with the statement “compliance with
the Sarbanes–Oxley Act has raised my organization’s level of interest in information security. 3
There is clearly a current demand for experts in Computer Forensics, both in the commercial and
government (civilian and military) areas, and it is unlikely that this demand will decrease. If
anything, it will grow rapidly over the foreseeable future, as evidenced by the effects of the
Sarbanes–Oxley law. Computer forensics is a strong growth area.
Historical aspects of the proposed Master of Science in Computer Forensics program
The Master of Science in Computer Forensics program is not a spin-off degree program from
another M.S. program. However, the present program proposal had its derivation in a
concentration that is currently available in the Masters in Telecommunications program. This
concentration is the Telecommunications Forensics and Security (TFAS) certificate that is a
concentration requiring 15 credit hours to be taken within the 30-credit M.S. in
Telecommunications program. The proposed M.S. in Computer Forensics program will expand
upon the TFAS certificate, but it will not require the allocation of new teaching resources to
George Mason University. It will, however, require the addition of two new positions: a director
to run the proposed program and an assistant for that director to manage the office. Details of
the existing certificate program (TFAS) have been given earlier. Table 3 showed the courses in
the TFAS certificate and, by reference to Table 1, the ratio of new courses to be developed to
existing can be seen to be less than 50%.
Anticipated Student Demand
This was covered to some extent under “Program Size and Viability” on page 10, and is
expanded on below.
The first group of students who undertook the Graduate Certificate in Telecommunications,
Forensics and Security (TFAS) within their M.S. in Telecommunications degree graduated in
May 2006 with the second group following in May 2007. There were 9 students with TFAS
certificates in both of these graduating classes of about 90 students. The current enrollments in
the TFAS certificate are running at a little above this level (10%), and so it is anticipated that
about a dozen students would graduate each year with their TFAS certificate within their M.S. in
Telecommunications degree. All of the students who graduated were part-time students
employed in the Northern Virginia region, almost all taking 6 credit hours each semester. The
average time to graduation is therefore 30 months for the degree, giving a cadre of about 30
students who are engaged in elements of the TFAS certificate at any one time. It is anticipated
that the emergence of the M.S. in computer forensics degree program will attract more students
3
www.gocsi.com.
Version dated April 21, 2008
21
to the discipline, perhaps 40 to 50 students per semester, with about double this number applying
each year for entry. The majority of the current undergraduate students within the BSIT program
at George Mason University have chosen to take the Information Security and Networking (ISN)
concentration (please see Table 2 on page 8). If historical trends continue, in addition to those
who have currently declared ISN as their major, more than half of the undeclared students will
also elect the ISN concentration, yielding around 100 graduates a year in this concentration.
The Survey Instrument given in Appendix E (pages E-1 and E-2) was posted on the web on
Friday, October 5th, 2007. Within four days, about 150 responses had been logged into the web
site (surveymonkey.com). The survey responses are shown on pages E-4 to E-9 in Appendix E.
The responses were overwhelmingly positive, with about 90% of those responding showing a
strong interest in such a program. If just 20% of those who responded positively were to sign up,
there would be 30 students registering for the program. The vast majority of those who
responded were: undergraduates who are currently in the BSIT program; currently living in
Virginia; preferred to come to the Fairfax campus for the forensics program; and felt it would
enhance their careers.
It is anticipated that the demand for the TFAS certificate within the TCOM program will drop
markedly when the proposed M.S. in Computer Forensics is offered, and an assessment will be
carried out about two years after the M.S. in Computer Forensics has been running to see
whether it is necessary to continue the TFAS certificate. When offered, classroom registration
for GMU’s three computer forensic courses: TCOM 660 (Network Forensics), TCOM 661
(Digital Media Forensics), and TCOM 663 (Intrusion Detection and Forensics), averages 20
students per class per semester, indicating that the demand for these courses is higher than those
who are just focusing on the TFAS certificate. It is very likely that students not in the proposed
masters in computer forensics program, but who are pursuing a different master’s degree in
VSITE, will take one or two courses in the computer forensics program as part of their master’s
program. Most master’s level programs in the VSITE permit students to take up to 6 credit hours
outside of their stated master’s degree to gain additional insights into other career options. These
6 credit hours are usually referred to as “out of area” courses.
No Duplication of the Computer Forensics at other Virginia State Universities
The SCHEV web site giving enrollments in State Universities in Virginia
(http://research.schev.edu/enrollment/programmaticenrollment.asp) was opened and it was found
that there were no graduate programs that offered any of the computer forensics degrees
analogous to the proposed Master of Science in Computer Forensics at George Mason
University. The only Virginia State University offering undergraduate programs in the same
approximate discipline was Virginia Commonwealth College (VCU), which has a Bachelor of
Science and Master of Science in Forensic science (BCHE). Those programs are focused on lab
forensics involving chemical analysis tools but not on computer forensics. VCU graduated 11
students from the BS program in 2003, 19 in 2004, and 29 in 2005. It would appear that the
BCHE program is a strong growth area at VCU, just like a similar undergraduate program (the
Network and Security Concentration in the BSIT program) at George Mason University.
Version dated April 21, 2008
22
As of academic year 2007 – 2008, there are currently no Commonwealth Universities that offer a
Master of Science in Computer Forensics, or similar topic. George Washington University,
based in the District of Columbia, currently offers a Master of Forensic Sciences degree with a
Concentration in High Technology Crime Investigation with approximately 80 students enrolled.
As a result of the lack of computer forensics programs in the Commonwealth of Virginia,
GMU’s program in not duplicative.
Anticipated Employment Demand
As can be seen in the information provided in preceding sections and in Appendix D and G, there
is expected to be a strong, and increasing, demand for graduates of the M.S. in Computer
Forensics program by the large number of federal, state, and local government agencies situated
in Virginia directly involved in the field of computer forensics, as well as private sector
representation. The field of computer forensics is a thriving activity in commercial business
affairs, Virginia State agencies and forces, and federal agencies and forces.
As reported by about.com, a simple search on the text string (key phrase) computer forensics at
Dice, a popular technical job bank, returned 145 jobs and consulting gigs. Monster.com, a
popular job bank that lists jobs of many types, returned 199.4 Please note that, for reasons given
earlier, few of these jobs demand a master’s in computer forensics degree simply because there
are so very few students out there with a master’s degree in the area of forensics. Hardly anyone
would apply!
[NOTE: Employment advertisements must reflect information obtained within six months of
submitting the proposal to SCHEV. SCHEV expects a PDF file of downloaded job
announcements that show the URL and date. Job announcements must show that a degree (at the
appropriate level) is required or preferred. See Appendix B for example. Print announcements
from the Web; do not incorporate them in your document. The Office of the Provost will create
the PDF.]
URL’s to be provided for SCHEV proposal
4
http://jobsearchtech.about.com/od/computerjob13/a/comp_forensics.htm
Version dated April 21, 2008
23
Letters of Support for the Proposed M.S. in Computer Forensics
Letters of support were received from the following individuals.
1. Dr. Lam D. Nguyen
Stroz Friedberg, LLC
Boston, MA 02110
2. Ms. Sandra E. Ring
PikeWerks
Madison, AL 35738
3. Mr. James Durie
Special Agent, FBI
Projected Resource Needs
In developing the Projected Resource Needs, three growth scenarios were reviewed. The first is
called the “Low Growth” option; the second the “Medium Growth” option; and the last the
“High Growth” option. These are shown in charts 1, 2 and 3 on the following pages. It is likely
that the anticipated demand will track the high growth option in the initial student registration,
but that natural attrition will decrease the student count to closer to the medium growth option.
(Almost all graduate programs have a natural attrition rate of about 20% due to students moving
out of the area, students changing program options, and students failing the program – in that
order). The likely student cadre when the program student count stabilizes in the third year will
be around 250, with about 100 graduating each year. [Note: the assumption of an average of 6
credit hours per semester may be slightly low, as some students will be full time, taking 9 credit
hours, or more, a semester. In addition, if the student body does grow to above 200 students, one
or two courses will be offered in the summer, which will bring the average length of a typical
M.S. student’s degree program to 24 months (from 30 months). The 24 month program would
be made up of 6 credits per regular semester and 3 credits in the summer.
Version dated April 21, 2008
24
Low Growth Option
In this growth option, the assumption is that 20 students are admitted in the first semester, 20 in
the second, 20 in the third semester, and in each subsequent semester. Assuming that each
student registers for two courses (6 credits each semester), the program will build to a cadre of
100 students in five semesters. From the fifth semester, 20 students will graduate each semester,
a total of 40 graduates a year. This is shown in Chart 1 below, with the horizontal axis being the
semester (1 is fall 2009, 2 is spring 2010, and so on)
120
100
80
60
40
20
0
1
2
3
4
5
6
7
8
Chart 1
Low Growth option for the M.S. in Computer Forensics
Version dated April 21, 2008
25
Medium Growth Option
In this growth option, the assumption is that 20 students are admitted in the first semester, 30 in
the second, and 40 thereafter. Assuming that each student registers for two courses (6 credits
each semester), the program will build to a cadre of 200 students in seven semesters. In the fifth
semester, 20 students will graduate; 30 will graduate in the sixth semester, and from the seventh
semester, 40 students will graduate each semester. This is shown in Chart 2 below, with the
horizontal axis being the semester (1 is fall 2009, 2 is spring 2010, and so on). Thus in academic
year 2011/12, 50 students will graduate, and 80 students will graduate in each academic year
thereafter.
250
200
150
100
50
0
1
2
3
4
5
6
7
8
Chart 2
Medium Growth option for the M.S. in Computer Forensics
Version dated April 21, 2008
26
High Growth Option
In this growth option, the assumption is that 20 students are admitted in the first semester, 40 in
the second, and 60 thereafter. Assuming that each student registers for two courses (6 credits
each semester), the program will build to a cadre of 300 students in seven semesters. In the fifth
semester, 20 students will graduate; 40 will graduate in the sixth semester and from the seventh
semester, 60 students will graduate each semester. This is shown in Chart 3 below, with the
horizontal axis being the semester (1 is fall 2009, 2 is spring 2010, and so on). Thus in academic
year 2011/12, 60 students will graduate, and 120 students will graduate in each academic year
thereafter.
350
300
250
200
150
100
50
0
1
2
3
4
5
6
7
8
Chart 3
High Growth option for the M.S. in Computer Forensics
Version dated April 21, 2008
27
Using the medium growth option, and assuming 1 FTE = 12 students taking a 3 credit hour
course = 36 credit hours equivalent, the breakdown of student numbers and course hours will be
as follows:
Year 1 – 20 entering in fall semester; 6 credits per semester; 120 credit hours = 3.333 FTE
– 30 entering in spring semester; total of 50 students; 6 credits per student;
300 credit hours = 8.33 FTE;
Total FTE for academic year = 11.667
Year 2 – 40 entering in fall semester; 6 credits per semester; 240 credit hours = 6.667 FTE;
50 students already in program; 6 credits per semester; 300 credit hours = 8.333 FTE;
– 40 entering in spring semester; 6 credits per semester; 240 credit hours = 6.667 FTE;
90 students already in program; 6 credits per semester; 540 credit hours = 15.000 FTE;
Total FTE for academic year = 36.667
Year 3 – 40 entering in fall semester; 6 credits per semester; 240 credit hours = 6.667 FTE;
130 students already in program; 6 cr. per semester; 390 credit hours = 10.833 FTE;
20 students graduate fall 2011 (start of year 3)
– 40 entering in spring semester; 6 credits per semester; 240 credit hours = 6.667 FTE;
net 150 students already in program; 6 cr. per semester; 900 credit hours = 25.000 FTE;
30 students graduate spring 2012 (end of year 3)
Total FTE for academic year = 49.167
Year 4 – 40 entering in fall semester; 6 credits per semester; 240 credit hours = 6.667 FTE;
net 160 already in program; 6 cr. per student; 960 credit hours = 26.667 FTE;
40 students graduate fall 2012 (start of year 4)
– 40 entering in fall semester; 6 credits per semester; 240 credit hours = 6.667 FTE;
net 160 already in program; 6 cr. per student; 960 credit hours = 26.667 FTE;
40 students graduate spring 2013 (end of year 4)
Total FTE count = 66.667
Year 5 - As above, and for each subsequent year.
Version dated April 21, 2008
28
STATE COUNCIL OF HIGHER EDUCATION FOR VIRGINIA
SUMMARY OF PROJECTED ENROLLMENTS IN PROPOSED PROGRAM
Projected enrollment:
A) If the program starts in Spring 2009, it will attract approximately 15 students
B) In subsequent years the program will attract students as shown below. Those numbers
would be added to the initial group of 15.
Year 1
Year 2
Year 3
Year 4
Target Year
2009 - 2010
2010 - 2011
2011 - 2012
2012 - 2013
2013 - 2014
HDCT FTES HDCT FTES HDCT FTES HDCT FTES HDCT FTES GRAD
20 (f)
3.33
50(c)
15 + 130(c) 17.5 + 160(c) 33.33+ As on As on
80
+
+
+
21.67
+
31.67
+
33.33 2012- 2012- students
30(s)
8.33
40(f)
40(f)
40(f)
2013
2013
a year
+
-20(*)
-40(*)
40(s)
+40(s)
+40(s)
-30(*)
-40(*)
Total
50
Total
is
11.67
Total
130
Total
is
36.67
Total
160
Total
is
49.167
Total
200
Total
is
66.67
(*) This is the number of students graduating in that semester
f = fall semester
s = spring semester
c = continuing in program (existing students from prior semester)
Projected Faculty and Resource Needs
As noted on page 12 under the topic “Expansion of an Existing program”, it is not anticipated
that any additional teaching faculty will be required for this program. Sufficient regular and
adjunct professors are already available to take on the teaching assignments anticipated within
this program. However, a program director will need to be in place at the start of program,
together with an office assistant, to run the program.
At some point in the future, as the program expands, it is expected that additional computer lab
resources will be required of a different nature to those currently used within the TFAS program.
These computer lab resources will entail the use of isolated computer nets so that students
undergoing training in forensics methods can conduct investigations that would not be
appropriate for an open network, or one that is connected to the various university networks. It
Version dated April 21, 2008
29
is anticipated that the computer lab will be a cooperative venture within various university
departments (or even schools) and some outside entities who have a strong interest in fostering
computer forensics within their own establishments.
Full-time Faculty
It is anticipated that a new faculty position will be created to support the program. That faculty
member could also become a candidate for the position of Director of the Master in Computer
Forensics (CFRS) program. A support staff position will be needed. That position may be shared
with another current staff position in a related program until the M.S. in Computer Forensics
program becomes fully established. It is not anticipated that the proposed M.S. CFRS program
will require any new regular faculty or staff resources in the initial year or two. Should the
program grow as expected, additional full time faculty may be needed to enhance the teaching
and research components and assist the director in running the program. These requests would
be made through the normal university process at the appropriate time.
Part-time Faculty from Other Academic Units
No part-time faculty from other academic units are anticipated to be used specifically within the
proposed CFRS program. However, it is anticipated that some of the CFRS students will opt to
take elective courses in other academic units that are permitted elective courses within their
CFRS degree. Those courses would be taken as part of that other academic unit’s regular
program (e.g. LAW 181) and so the teaching function would be not within the CFRS unit, but in
the other academic unit’s regular course offerings.
Adjunct Faculty
George Mason University is fortunate to have a relatively large pool of experienced adjunct
faculty who not only regularly teach within George Mason University’s undergraduate and
graduate programs, but who are also experts in their field. The proposed CFRS program will
make use of a number of such topic experts, and experienced teachers. Examples include Mr.
Robert Osgood (FBI Agent), Dr. Alexander Lazarevich, Dr. Tom Shackelford, and Ms. Angela
Orebaugh (VSITE doctoral candidate). Contact has been made with other forensics experts who
have indicated a strong desire to teach in the proposed CFRS program. All of the above adjunct
faculty have taught for a number of years within related graduate programs (in particular the
M.S. in Telecommunications and the TFAS certificate) and so it is anticipated that there will be
good continuity within the teaching element of the program.
Graduate Assistants
It is anticipated that there will be graduate teaching assistants assigned to the proposed CFRS
program should the number of enrolled students rise to the level where such support is granted
by the dean. Typically, a class has to grow to at least 20 registered students before a TA is
assigned to that class to assist the faculty member assigned to teach the class. In the initial stages
of the CFRS program, it is not anticipated that an active research component will be in place, but
Version dated April 21, 2008
30
it is expected that a research element will develop around faculty recruited to teach the forensics
courses. When an active research program develops, research assistants (RAs) will be recruited
to assist in that portion of the program. The TA compensation will be drawn, as is usual, from
the allocation provided by the School. RA compensation would be drawn from the research
contract the faculty member was engaged in.
Classified Positions
It is anticipated that classified support will be required for the proposed CFRS program to assist
the director of that program. For the first year of the CFRS program, a current staff member in
another program may be assigned to handle the CFRS staff position duties in addition to those
already allocated until the CFRS student body builds up. As currently projected, the staff
position that will share the duties is that of the current M.S. in Telecommunications staff
position. If, as expected, the CFRS program grows significantly, then the FTEs generated will
permit the allocation of a full-time staff position to the CFRS program.
Targeted Financial Aid
No financial aid has been specifically targeted for the introduction of the CFRS program.
However, it is likely that there are financial sources in the Washington, DC, area that would be
very interested in being associated with the program and who would look favorably on
supporting expansion of the program, particularly in the area of laboratory resources.
Equipment
For the first year of the proposed CFRS program, no additional equipment are anticipated to be
needed to run the program as currently envisaged. However, it is anticipated that the program
will grow in the complexity of the coursework undertaken, which will probably necessitate the
development of additional computer laboratory resources. These resources would be capable of
being totally separated from any other network on the campus so that advanced forensics search
and research work can be undertaken without putting other networking resources at risk.
Library
No additional library resources will be required to start or run this program. It is anticipated that
the normal library facilities would be used by the CFRS students, but nothing in addition to what
is currently available is expected to be needed.
Telecommunications
Version dated April 21, 2008
31
The telecommunications requirements (telephone, FAX, etc.) will be handled for the first year,
and possibly the second, through the M.S. in Telecommunications budget, and no significant
additional resources are anticipated for this period. Should the CFRS program grow
substantially, as expected, then this aspect will be revisited. Any additional (i.e. new) resources
for the CFRS telecommunications budget under these growth situations would be funded out of
the increased FTEs generated for the university.
Space
Adequate space will be available for this program. Currently, no additional space allocations are
required over those that are currently envisioned in the new building in The Volgenau School of
Information Technology and Engineering (VSITE) that will open in late Spring 2009. That
building has sufficient space to accommodate the program. In addition, the existing Networking
Lab serving the M.S. TCOM program in the Johnson Learning Center (room G10, 1400 sq.ft.) is
equipped with significant network capabilities and computers and is perfectly capable of
accommodating additional lab equipment to serve the growing needs of the M.S. CFRS program.
Other Resources
No other resources are anticipated for the proposed CFRS program, other than those already
identified.
Version dated April 21, 2008
32
PROJECTED RESOURCE NEEDS FOR PROPOSED PROGRAM
Part A: Answer the following questions about general budget information.
ï‚·
ï‚·
ï‚·
ï‚·
ï‚·
Has or will the institution submit an addendum budget request
to cover one-time costs?
Has or will the institution submit an addendum budget request
to cover operating costs?
Will there be any operating budget requests for this program
that would exceed normal operating budget guidelines (for
example, unusual faculty mix, faculty salaries, or resources)?
Will each type of space for the proposed program be within
projected guidelines?
Will a capital outlay request in support of this program be
forthcoming?
Yes
No
x
Yes
No
x
Yes
No
x
Yes
x
Yes
No
No
x
Part B: Fill in the number of FTE positions needed for the program.
Program initiation year
2009 - 2010
Ongoing and
reallocated
Added
(new)
Total expected by
target enrollment year
2012 - 2013
Added*
Total FTE
positions
Full-time faculty
0.00
1.00
1.00
2.00
Part-time faculty [faculty FTE
split with other unit(s)]
0.00
0.00
0.00
0.00
Adjunct faculty
1.00
0.00
1.00
2.00
Graduate assistants
0.00
0.00
2.00
2.00
Classified positions
0.50
0.00
(#)1.00
(#)1.00
TOTAL
1.50
1.00
5.00
7.00
*Added after the program initiation year
# 0.5 position originally from TCOM returned and a new 1.0 position allocated to CFRS
Version dated April 21, 2008
33
Part C: Estimated $$ resources to initiate and operate the program.
Total expected by
target enrollment year
20__ - 20__
Program initiation year
20__ - 20__
Ongoing and
reallocated
Added
(new)
Full-time faculty
salaries
$
fringe benefits
$
Part-time faculty [faculty FTE split with other unit(s)]
salaries
$
fringe benefits
$
Adjunct faculty
salaries
$
fringe benefits
$
Graduate assistants
salaries
$
fringe benefits
$
Classified positions
salaries
$
fringe benefits
$
Total personnel costs
salaries
$
fringe benefits
$
TOTAL personnel costs
$
Equipment
$
Library
$
Telecommunication costs
$
Other costs (specify)
$
TOTAL
$
Total
resources
Added*
$
$
$
$
$
$
$
$
$
$
$
$
$
$
$
$
$
$
$
$
$
$
$
$
$
$
$
$
$
$
$
$
$
$
$
$
$
$
$
$
$
$
$
$
$
$
$
$
$
$
$
$
$
$
*Added after program initiation year
Part D: Certification Statement(s)
The institution will require additional state funding to initiate and sustain this program.
Yes
Signature of Chief Academic Officer
x
No
Signature of Chief Academic Officer
If “no,” please complete Items 1, 2, and 3 below.
Version dated April 21, 2008
34
1. Estimated $$ and funding source to initiate and operate the program.
Funding Source
Reallocation within the
department or school (Note below
Program initiation year
20__- 20__
Target enrollment year
20__ - 20__
the impact this will have within the
school or department.)
Reallocation within the
institution (Note below the impact
this will have within the school or
department.)
Other funding sources
(Please specify and note if these are
currently available or anticipated.)
2. Statement of Impact/Other Funding Sources.
3. Secondary Certification.
If resources are reallocated from another unit to support this proposal, the institution will not
subsequently request additional state funding to restore those resources for their original purpose.
x
Agree
Signature of Chief Academic Officer
Disagree
Signature of Chief Academic Officer
Version dated April 21, 2008
35
APPENDIX A
Course Descriptions
(a) Basic Catalog descriptions
CFRS 500*
Intro to Technologies of Forensics Value
This course will present an overview of technologies of interest to forensics examiners. It will
provide an introduction to operating systems, software, and hardware.
ISA 522
Information Security Essentials
This course introduces basic concepts and techniques in applied information security. The course
covers main concepts in information security, and their applications outside of the traditional
engineering disciplines, such as healthcare, business, law and sociology. The course begins
introducing the student to basic concepts of security including confidentiality, Integrity,
Availability, and current concerns of anonymity, privacy and safety of web-based transactions,
forensics investigations etc. It also covers the main safeguards available in security such as
authentication, authorizations, network security. The course shows how these techniques are
applied to the concerns of business, health care, nursing, sociology and law.
ISA 562
Information Security Theory and Practice
This course is a broad introduction to the theory and practice of information security. It serves as
the first security course for the M.S.-ISA degree and is required as a prerequisite for all
subsequent ISA courses (at the 600 and 700 levels). It also serves as an entry-level course
available to non-ISA students, including M.S.-CS, M.S.-ISE, and M.S.-SWE students.
CFRS 660 (Currently TCOM 660) Network Forensics
This course deals with the collection, preservation, and analysis of network generated digital
evidence such that this evidence can be successfully presented in a court of law (both civil and
criminal). The relevant federal laws will be examined as well as private sector applications. The
capture/intercept of digital evidence, the analysis of audit trails, the recordation of running
processes, and the reporting of such information will be examined.
CFRS 661 (Currently TCOM 661) Digital Media Forensics
This course deals with the collection, preservation, and analysis of digital media such that this
evidence can be successfully presented in a court of law (both civil and criminal). The relevant
federal laws will be examined as well as private sector applications. The seizure, preservation,
and analysis of digital media will be examined in this course.
CFRS 663 (Currently TCOM 663) Operations of Intrusion Detection for Forensics
Introduces students to network and computer intrusion detection and its relation to forensics. It
addresses intrusion detection architecture, system types, packet analysis, and products. It also
presents advanced intrusion detection topics such as intrusion prevention and active response,
decoy systems, alert correlation, data mining, and proactive forensics.
A-1
CFRS 760*
Legal and Ethics in IT
This course will present legal and ethics topics in a forensics context. It will include cyber legal
principles and types of crimes, witness testimony, and forensics report writing.
CFRS 770*
Fraud and Forensics in Accounting
This course will present an overview of fraud discovered in digital accounting systems and the
forensics of such systems.
CFRS 780*
Advanced Topics Course
Advanced topics from recent developments and applications in various areas of computer
forensics are covered in this course. The advanced topics are chosen in such a way that they do
not duplicate existing CFRS courses. Active participation of the students is encouraged in the
form of writing and presenting papers in various research areas of the advanced topic. The
course is designed to enhance the professional engineering community’s understanding of
breakthrough developments in specific areas of computer forensics. Examples of topics are
enterprise hardware systems and RAID, steganography, and cell phone and personal digital
assistant (PDA) forensics.
CFRS 790*
Advanced Computer Forensics
This course will be a capstone course that consolidates training before graduation and results in
the completion of a major applied project. Some class time used for discussion of projects, either
to monitor progress or explore alternative approaches. Readings, class-time discussion of current
trends, difficulties, and new opportunities for industry most relevant to module. Concludes with
presentations of projects.
TCOM 662
Advanced Secure Networking
This course deals with the advanced technologies in network security that can be applied to
enhance enterprise and ISP’s network security. It covers the network perimeter defense concept
and the various components for a complete layered defense system. It examines each component
and its technologies, including TCP/IP protocol vulnerabilities, router access control list (ACL),
dynamic ACL, firewall, network address translation (NAT), virtual private network (VPN),
IPSec tunnels, intrusion detection system (IDS), routing protocol security, denial-of-service
(DOS) attack, DOS detection and mitigation techniques.
ECE 511 Microprocessors
Introduces microprocessor software and hardware architecture. Includes fundamentals of
microprocessor system integration, instruction set design, programming memory interfacing,
input/output, direct memory access, interrupt interfacing, and microprocessor architecture
evolution. Studies Intel family of microprocessors, and reviews other microprocessor families
and design trends.
ECE 646 Cryptography and Computer-Network Security
Topics include need for security services in computer networks, basic concepts of cryptology,
historical ciphers, modern symmetric ciphers, public key cryptography (RSA, elliptic curve
A-2
cryptosystems), efficient hardware and software implementations of cryptographic primitives,
requirements for implementation of cryptographic modules, data integrity and authentication,
digital signature schemes, key exchange and key management, standard protocols for secure
mail, www and electronic payments, security aspects of mobile communications, key escrow
schemes, zero-knowledge identification schemes, Smart cards, quantum cryptography, and
quantum computing.
ECE 746 Secure Telecommunication Systems
Discusses integration of cryptographic algorithms with standard and emerging communication
protocols. Includes issues related to implementation of security services in different kinds of
telecommunication networks and at different layers of network model; and selected
cryptographic algorithms, including Advanced Encryption Standard and Elliptic Curve Crypto
systems. Offers choice of cryptographic algorithm depending on type of network and
implementation medium. Analyzes various means of implementing cryptographic
transformations, including smart cards, desktop computers, routers, accelerator boards, and
stand-alone devices. Criteria of choice between software and hardware implementations of
cryptography.
INFS 785 Data Mining for Homeland Security
Covers analytic techniques for investigative analysis. Topics include small world graphs as way
to model groups and organizations, relational data mining with emphasis in predictive models,
alias discovery techniques, and profiling.
ISA 562 Information Security Theory and Practice
This course is a broad introduction to the theory and practice of information security. It serves as
the first security course for the M.S.-ISA degree and is required as a prerequisite for all
subsequent ISA courses (at the 600 and 700 levels). It also serves as an entry-level course
available to non-ISA students, including M.S.-CS, M.S.-ISE, and M.S.-SWE students.
ISA 650 Security Policy
The course focuses on security policy and its management
for information systems having national and international
connectivity. Issues include legal, international, cultural, and
local factors. Students are expected to participate regularly in
presenting material, in discussion of recent security issues, and by
writing short papers on major current issues.
ISA 652 Security Audit and Compliance Testing
This course presents the fundamental concepts of the IT-security audit and control process that
is being conducted in a plethora of environments, including government, financial industry and
healthcare industry. The goal of this course is to enable the students to structure and perform
audits based on the specifications of Sarbanes-Oxley, HIPAA and FISMA audit programs. The
A-3
course covers all the CISA certification requirements in depth and the students completing the
course are encouraged to attempt the certification exam on their own.
ISA 656 Network Security
This course is an in-depth introduction to the theory and practice of network security. It assumes
basic knowledge of cryptography and its applications in modern network protocols. The course
studies firewalls architectures and virtual private networks and provides deep coverage of widely
used network security protocols such as SSL, TLS, SSH, Kerberos, IPSec, IKE, and LDAP. It
covers countermeasures to distributed denial of service attacks, security of routing protocols and
the Domain Name System, e-mail security and spam countermeasures, wireless security,
multicast security, and trust negotiation.
ISA 674 Intrusion Detection
Studies methodologies, techniques, and tools for monitoring events in computer system or
network, with the objective of preventing and detecting unwanted process activity and
recovering from malicious behavior. Topics include types of threats, host-based and networkbased information sources, vulnerability analysis, denial of service, deploying and managing
intrusion detection systems, passive vs. active responses, and designing recovery solutions.
ISA 785 Digital Forensics Research
Focuses on research-related aspects of digital forensics including open problems in digital
forensics, countermeasures against digital forensics, and fundamental and practical limitations of
current digital forensics techniques. The course also covers currently established techniques and
tools for digital forensics as well as common legal and ethical issues
LAW 181
Communications Law
A treatment of basic telecommunications law, policy, and regulation.
SOCI 607
Criminology
Crime and crime causation. Topics include social basis of law, administration of justice, and
control and prevention of crime.
(b) Detailed Additional New Course Descriptions
These will be developed and submitted for approval through the regular university governance
channels.
A-4
APPENDIX B
Sample Schedules for M.S. in Computer Forensics Completion
(a)Course Offering Pattern
(Only CFRS and ISA 562 course shown; electives will be taken as available in a given semester)
Spring 2009
CFRS 500 and 660, and ISA 562 or ISA 522
Fall 2009:
CFRS 500 and 660, and ISA 562 or ISA 522
Spring 2010:
CFRS 500, 660, 661, 663, and ISA 562 or ISA 522
Fall 2010:
CFRS 500, 660, 661, 663, 760, 770, and ISA 562 or ISA 522
Spring 2011:
CFRS 500, 660, 661, 663, 760, 770, 780,790, and ISA 562 or ISA 522
The sequence is now complete
Note: depending on the student numbers, a summer course (or two) may be offered, in
particular CFRS 500 and ISA 562.
(b)Example of a Full Time Student’s Plan of Study starting in Fall 2009
Fall
Spring
Year 1
CFRS 500 or ISA 562, CFRS 660, CFRS 663
Law 181, SOCI 607, CFRS 661
Fall
Spring
Year 2
TCOM 662,CFRS 760, CFRS 770
CFRS 790
(c)Example of a Part-Time Student’s Plan of Study starting in Fall 2009
Fall
Spring
Fall
Spring
Fall
Spring
B-1
Year 1
CFRS 500 or ISA 562, CFRS 660
Law 181, SOCI 607
Year 2
CFRS 663, CFRS 760
CFRS 661, TCOM 662
Year 3
CFRS 780, CFRS 790
APPENDIX C Sample short bios for Faculty
The full-time faculty members are listed grouped in departments.
The departments are listed in alphabetical order.
This listing is then followed by the list of current adjunct faculty members.
Applied Information Technology faculty (full time)
Dr. Don Gantz earned his MA in 1971 and his Ph.D. in 1974 from the University of Rochester.
He is Professor and Chair of the Applied Information Technology Department. Among his
research interests is identification of images such as those of fingerprints by computer analysis.
His other research interests include mathematical economics, applied statistics, flight test
analysis, computer performance engineering and capacity planning, computer simulation, and
management decision systems. In recent years Dr. Gantz has developed cutting edge IT
methodologies for the quantification and analysis of handwriting and is applying these
methodologies to multi-language document exploitation and biometric identification.
Handwriting derived computer biometric identification can be utilized in forensic document
examination. Forensic document examination by computer combines the identification of
individual handwriting samples based on personal features unique to each writer with a statistical
foundation that will support expert witness testimony in court cases.
Dr. Anne Marchant received her PhD from UC Berkeley in 1990. She is currently an Associate
Professor in the Department of Applied Information Technology teaching IT in the Global
Economy, Information Warfare, and Computer Crime, Forensics, and Auditing. She won a
GMU Teaching Excellence Award in 1999 while she was an instructor in the Computer Science
Dept teaching programming. Prior to coming to George Mason, she was an instructor for the
College of Engineering at UC Berkeley from 1990-1994. Her research interests include UAVs,
computer forensics, as well as technology related ethical and social issues.
Computer Science faculty (full time)
Dr. Daniel Barbara is a professor in CS who earned his Ph.D. at Princeton University in 1985.
He has had industrial experience with Bellcore and Matsushita, as well as experience on the
faculty of Princeton and the Universidad Simon Bolivar, Caracas, Venezuela, before joining the
faculty of George Mason University in 1997, where he is a full professor. His interests are in
data mining and its applications.
Dr. Xuxian Jiang earned his Ph.D. from Purdue University in 2006, and is an assistant professor
in the CS department. His research interests include system and network security, virtualization
technology, distributed computing, with a specific research interest in virtual machines (VMs)
and security.
Dr. Edgar H. Sibley has the permanent position of University Professor and Eminent Scholar
with appointments in both the School of Information Technology and Engineering (Department
of Information and Software Systems Engineering) and The Institute for Public Policy at George
Mason University in Fairfax VA. He earned his ScD degree from MIT in 1967. He has been
C-1
active in all areas of large scale information and general systems design for many major
governmental agencies and business organizations. This has recently included work with the
IRS, Department of Defense, and Department of Energy, as well as joint contract efforts with the
Boeing Corporation, Batelle, and SAIC, and many small businesses in the DC area. He has also
acted as an expert witness for four law firms.
Dr. Robert Simon received his Ph.D. in Computer Science from the University of Pittsburgh in
August 1996. He also has a B.A. in History and Political Science from the University of
Rochester. His research specialization is in the field of distributed systems, networks,
performance modeling and simulation. He teaches courses in networks, mobile and wireless
computing, operating systems, computer architecture and computer security.
Dr. Frank Wang earned his Ph.D. from North Carolina State University in 2004. He is an
assistant professor in the CS department with research interests in network security, intrusion
source tracing, and active intrusion response. He is particularly interested in computer and
network security, with particular reference to network-based intrusion source tracing problem
under various settings. His other areas include intrusion detection and response, botnet, virus
and worm, VoIP security, information hiding, steganography, privacy and anonymity and their
interactions with security.
Dr. Duminda Wijesekera earned two doctorates, one from the University of Minnesota and one
from Cornell. Both doctorates were in computer science and logic. He is an associate professor
in the CS department, although he holds courtesy appointments at the Center for Secure
Information Systems (CSIS) and the Center for Command, Control, Communication and
Intelligence (C4I) at George Mason University, and the Potomac Institute of Policy Studies in
Arlington, VA. During various times, his research interests have been in security, multimedia,
networks, secure signaling (telecom, railway and SCADA), avionics, missile systems, web and
theoretical computer science. Prior to GMU, he was at Honeywell Military Avionics, Army
High Performance Research Center at the University of Minnesota, and the University of
Wisconsin.
Electrical and Computer Engineering faculty (full time)
Dr. Kris Gaj received his the M.Sc. and Ph.D. degrees in Electrical Engineering from Warsaw
University of Technology, Warsaw, Poland. His research interests include cryptography,
computer arithmetic, reconfigurable computing, software-hardware co-design, and computernetwork security.
Dr. David Hwang received the B.S., M.S., and Ph.D. degrees in electrical engineering from the
University of California, Los Angeles (UCLA) in 1997, 2001, and 2005, respectively. His
research interests include secure embedded systems, cryptographic hardware and circuits, digital
signal processing architectures (FPGA/ASIC), and VLSI digital systems and circuits.
Dr. Jens-Peter Kaps earned a Dipl. Ing. at the Fachhochschule München (Munich University of
Applied Sciences) in 1996, an M.Sc. from Worcester Polytechnic Institute in , followed by a
Ph.D. from Worcester Polytechnic Institute in 2006. He is an assistant professor of electrical and
C-2
computer engineering at the Volgenau School of Information Technology at George Mason
University. His research interests include ultra-low-power cryptographic hardware design,
computer arithmetic, efficient cryptographic algorithms, and computer and network security.
Dr. Ken Hintz received his B.S. degree in Electrical Engineering from Purdue University, West
Lafayette, Indiana in 1967 and his M.S. and Ph.D. degrees in Electrical Engineering from the
University of Virginia in 1979 and 1981 respectively. Since 1987 he has been an Associate
Professor in the Department of Electrical and Computer Engineering at George Mason
University. He designed and established the Bachelor and Masters in Computer Engineering
Degree Programs at GMU which were approved by SCHEV in June 1998 and 1999,
respectively. Before joining GMU, Dr. Hintz was with the Naval Surface Warfare Center,
Dahlgren, VA, working in electronic warfare and radar signal processing where he designed and
built the AN/ULQ-16, variations of which are still in production. Prior to working at NSWC, Dr.
Hintz was with the U. S. Navy as a designated Naval Aviator stationed for 3 years in Rota, Spain
flying Electronic Warfare Reconnaissance with Fleet Air Reconnaissance Squadron Two (VQ2). During that time be became designated Electronic Warfare Aircraft Commander (EWAC) in
both the EC-121 and EP-3E aircraft. He holds seven patents, is a Senior Member of IEEE, a
member of SPIE, and is lead author on a book on Microcontrollers. His current research interest
is in syntactic pattern recognition applied to ground penetrating radar images for landmine
detection and classification. His other research interests are in information-based real-time
sensor management, X-ray, thermal, and visual, image processing, as well as computer
architectures and algorithms for real time signal and image processing.
Dr. Qiliang Li Received the B.S. and M.S. degrees in physics from Nanjing University,
Nanjing, China, in 1996 and 1999 respectively. He received the Ph.D. in electrical and computer
engineering from North Carolina State University in 2004. Dr. Li joined GMU in Fall 2007 as
an Assistant Professor of Electrical and Computer Engineering and a Virginia Microelectronics
Consortium Professor. He is an expert in nano-devices, with potential applications to forensics.
Dr. Rao Mulpuri received the Bachelor of Technology in electronics and communications
engineering from Jawaharlal Nehru Technological University (Kakinada, India) in 1977. In
1979, he received the Master of Technology degree in material science from the Indian Institute
of Technology (Bombay) and in 1983 received the M.S. degree in electrical engineering from
Oregon State University, followed by the Ph.D. degree in electrical engineering from Oregon
State University in 1985. Dr. Mulpuri's present areas of research interest are large bandgap
semiconductor (SiC, GaN, etc) materials, and devices (ion-implantation doping, ohmic contacts,
device fabrication, material and device characterization). Recently he led a research project on
micro-chip forensics. He joined GMU in September 1984, and became a Professor of Electrical
and Computer Engineering in September 1993.
Dr. Andre Z. Manitius received his Ph.D. degree from the Polytechnical University of Warsaw,
Warsaw, Poland in 1968. From 1968 to 1972 he held a junior faculty position with the Institute
of Automatics of the Polytechnical University of Warsaw. In 1972 and 1973 he was a Visiting
Associate Professor with the Center for Control Sciences at the University of Minnesota. He
subsequently joined the Mathematical Research Center at the University of Montreal, Quebec,
Canada, where he was an Associate and then Full Research Professor until 1981. From 1981 to
C-3
1988 he was a Professor in the Mathematical Sciences Department of the Rensselaer Polytechnic
Institute (RPI) in Troy, New York. While on leave from RPI, he served as Program Director for
Applied Mathematics (1986-1987) and Deputy Director, Division of Mathematical Sciences
(1987-88) at the National Science Foundation in Washington, D.C. He joined George Mason
University in September 1988 as Professor of Electrical and Computer Engineering. Dr.
Manitius’ research interests include mathematical aspects of control theory, including control of
distributed parameter and delay systems, optimal control, optimization, numerical and
computational methods in dynamical systems and control systems. He has published over 70
papers in his fields of interest, and held various editorial positions with several professional
journals. In 1991 he received American Mathematical Society's Citation for Public Service
related to his earlier work at the NSF.
Dr. Jeremy Allnutt earned his B.Sc. and Ph.D. in electrical engineering from the University of
Salford, UK, in 1966 and 1970, respectively. From 1970 to 1977 he was at the Appleton
Laboratory in Slough, England, where he ran propagation experiments with the US satellite
ATS-6 and the European satellites SIRIO and OTS. In 1977 he moved to BNR, now Nortel, in
Ottawa, Canada, and worked on satellite and rural communications projects before joining the
International Telecommunications Satellite Organization (INTELSAT) in Washington, DC, in
1979. Dr. Allnutt spent 15 years at INTELSAT in various departments. During this period he
ran experimental programs in Europe, Asia, Africa, North and South America, Australia, and
New Zealand, finishing as Chief, Communications Research Section. Dr. Allnutt spent one year
as Professor of Telecommunications Systems at the University of York, England, and then joined
the Northern Virginia Center of Virginia Tech in 1986, where he later ran the masters program in
ECE as well as being on the team that designed and set up the Masters in Information
Technology program. In August of 2000 he moved to George Mason University with dual
appointments: Director of the new Masters in Telecommunications program
(http://telecom.gmu.edu/) and Professor in the ECE department. Dr. Allnutt has published 100
papers in conferences and journals and written one book, most in his special field: radiowave
propagation. He is a Fellow of the UK IEE (now called IET) and a Fellow of the US IEEE.
Part time faculty (Adjunct professors)
Special Agent Bob Osgood is currently Chief of Digital Media exploitation for the FBI’s
Counterterrorism Division. He has over 20 years of experience in the fields of computer
forensics and Cyber crime. SA Osgood has an M.S. in Network Engineering, is a Cisco
engineer, A+ and Net + certified. SA Osgood currently teaches Digital Media Forensics and
Network Forensics in the GMU TFAS program.
Special Agent James R. Durie is currently Field Operations Program Manager for the FBI’s
Computer Analysis Response Team (CART). He has over 20 years of experience in law
enforcement and forensics including seven years a FBI Computer Forensic Examiner. Mr. Durie
has a BS in Police Science and Law Enforcement and a Juris Doctorate. He is A+ certified and
is an Encase Certified Examiner (EnCE). Mr. Durie currently teaches Computer Forensics for
New Agents at the FBI Academy and lectures around the world on Computer Forensics and
related topics. He also testifies across the country on Adam Walsh Act discovery issues. He has
C-4
testified in over 100 hearings and trials as a lead investigator or an expert witness. Mr. Durie
developed dual processor computers as a computer forensic platform with forensic network
support. He also experimented with Distributed Network Analysis networks for password
identification. He is researching computer forensics and virtual worlds and coordinates the
identification, testing, and validation of new tools for use in forensic examinations for the FBI's
computer forensics program.
Ms. Angela Orebaugh is an internationally recognized security technologist, scientist, and
author, with over 15 years of experience. Ms. Orebaugh is a Guest Researcher for the National
Institute of Standards and Technology (NIST), where she leads several security initiatives
including the authoring of security special publications, the National Vulnerability Database
(NVD), and electronic voting. At GMU she developed and taught the Intrusion Detection
curriculum, a core requirement of the TFAS program. Her current research interests include
peer-reviewed publications in the areas of intrusion detection and prevention, data mining,
attacker profiling, user behavior analysis, and network forensics. Ms. Orebaugh has a broad
spectrum of professional experience in information security, with hands-on expertise in security
architecture design and analysis, perimeter defense, vulnerability assessment and penetration
testing, forensics, intrusion detection and prevention, and incident handling and response. Ms.
Orebaugh is the author of several books on information security, and is currently scheduled to
defend her Ph.D. dissertation in spring 2008.
Dr. Aleksandar Lazarevich is a Senior Computer/Electronics Engineer with the Defense
Information Systems Agency. He is the operations managers and the Test Evaluation lead for
the DoD PKI program. He is an adjunct Professor with George Mason University and Masters
Degree program chair for the University of Fairfax. He has been the IT College Campus Chair
and the Area Chair for Networking and Operating Systems at the Northern Virginia campus of
University of Phoenix for two years and the IT department chair at WIU for four years. He has
over 33 years experience of Federal Civil Service in the field of Information Systems security
engineering and computer forensics. He holds the rank of Senior Member of the Institute of
Electrical and Electronics Engineers. He completed a PhD in Information Technology with an
emphasis in Information Assurance and computer forensics at George Mason University. His
research has been in the area of artificial intelligence modeling of evidence assessment. He
primarily teaches information security and computer forensic classes. He has represented the
U.S. Government in international forums for over three decades and has received recognition for
his expertise from numerous nations. Dr. Lazarevich was responsible for major information
system programs for such organizations as the White House Communications Agency, Executive
Office of the President and the Deputy Under Secretary of Defense for Logistics. He was elected
to the 2001 International Who’s Who of Information Technology.
Dr. Thomas Shackelford has been working with computers and software design since 1986,
where his primary focus was with database administration, data management, and data analysis.
From here his career has taken him through various programming and network engineering
disciplines from main frames through client server environments. He currently works as the
Information Assurance Manager overseeing security design and implementation for a major
financial system. He received his Bachelors of Science Degree in Computer Science from
Chapman University, a Master of Science Degree in Information Systems Engineering from
C-5
Western International University, and a Doctorate in Philosophy degree in Information
Technology with a special emphasis in computer security from George Mason University. His
Dissertation topic was “The Use of Advanced Data Mining Techniques to Develop Measures of
Document Relevance”. The purpose of the papers was to study how document relevance could
be used to track insider threat in a networked environment. Dr. Shackelford’s interests are in
Network engineering, Computer Security, Data Mining, Text Categorization, Insider Threat
Detection, and Data Forensics.
C-6
APPENDIX D Sample Job Announcements with URL and Date
Most advanced computer forensics positions are listed on the web site of the leading computer
forensics association, the International High Technology Crime Investigation Association (with
the acronym HTCIA, rather than IHTCIA) - http://www.htcia.org/cgi-bin/chapters.cgi
There are 41 chapters currently affiliated with the HTCIA, some international (Brazil, Canada,
UK) but most in the USA. The chapter that covers Virginia is the “Mid-Atlantic Chapter”
(http://www.htcia.org/cgi-bin/chapters.cgi?idChapter=7)
All chapters have job postings that are for the area covered by the chapter. On the Mid-Atlantic
chapter’s web site, there were 18 positions advertised, the oldest dating from May 8th, 2007 and
the most recent October 4th, 2007. The positions range from what could be considered to be
entry level positions (Computer Forensics Specialist – Washington, DC) to senior level positions
(Senior Electronic Data Examiner, Falls Church, VA). Both positions are given below, extracted
on October 8th, 2007.
Employment Opportunity – Computer Forensic Specialist (Washington, D.C.)
(No pdf; the advertisement was extracted in Word format from the web listing
http://www.htcia.org/cgi-bin/chapters.cgi?idChapter=7 selecting the listing with the above title
on October 8th, 2007)
The High Technology Investigative Unit (HTIU) within the Child Exploitation and Obscenity
Section (CEOS) of the U.S. Department of Justice initiates investigations and conducts forensic
analysis on computer evidence in federal cases involving child exploitation and obscenity
crimes. It works closely with federal law enforcement agencies such as the FBI, Immigration
and Customs Enforcement (ICE), Secret Service, and the Postal Inspection Service; as well as
federal prosecutors all across the country. The mission of the HTIU is simple: Provide the most
accurate, up-to-date expertise on computer forensic matters and assist law enforcement in
bringing criminals who peddle in child exploitation and obscenity to justice.
The HTIU goes far beyond the bits and bytes of standard computer forensic examinations. HTIU
specialists are routinely asked to assist in national operations involving child exploitation over
the internet, special investigative initiatives, and research and develop new investigative tools
and techniques. In addition, HTIU specialists may be asked to assist in drafting proposed
legislation, developing and delivering training for law enforcement agencies, and testify as
experts in federal court. HTIU specialists frequently travel to various field offices to assist in the
prosecution of some of the worst criminal offenders.
The HTIU is expanding and currently has a need for qualified computer forensic investigators.
Candidates should have extensive knowledge in computer forensics and computer investigations,
Internet technologies, and an educational background in CS or similar degree. Previous
programming and applications development experience as well as experience in *nix OSs are
highly desirable.
D-1
Salary range is $46,041 to $103,220.
For how to apply, see Vacancy No. 07-CRM-KS-049 at www.usajobs.gov
For additional information about this position, please contact Shannon.Perkins@usdoj.gov
Senior Electronic Data Examiner, Falls Church, VA
(http://www.htcia.org/classified/sedfe.pdf October 8th, 2007)
Capital Legal Solutions is a highly innovative electronic service provider headquartered in Falls
Church, VA, part of the metro DC area region. Founded in 2002, we have rapidly expanded from a
vision to equip the legal community with cost effective, technology driven litigation support to an
industry leading electronic discovery provider.
Currently we are seeking a qualified SENIOR ELECTRONIC DATA FORENSICS EXAMINER.
The ideal candidate will have:
Superior management and client relationship skills
Experience overseeing fully defensible preservation of electronic data (including by HD image
acquisition) within large corporations
The ability to forensically harvest data from a wide variety of sources and storage media
Extensive background in preparing written reports
General networking and strong hardware knowledge are necessities
Be familiar with providing expert testimony
ENCASE certification and familiarity with FTK and LINUX is a plus.
Compensation will be highly competitive and based upon experience, training and educational
background.
To apply for this position, please send your resume to:
Robert Eisenberg
Vice President—E-Discovery Consulting
CAPITAL LEGAL SOLUTIONS, LLC
150 S. WASHINGTON ST.
SUITE 500
FALLS CHURCH, VA 22046
Tel: 703-226-1544
Fax: 703-226-1550
Email: reisenberg@capitallegals.com
For more information about our company and this position, please visit our website at
www.capitallegals.com .
D-2
APPENDIX E Survey Instrument
George Mason University is developing a Master’s in Computer Forensics program for implementation
beginning in Spring 2009. The proposed M.S. in Computer Forensics will prepare students for careers in
industry, government, and academia by combining academic education with real world practical techniques.
Emphasis is placed in the program on training students to use and apply computer forensics methods and
knowledge in a variety of real life scenarios. Computer forensic examiners (CFE) work in both the public and
private sectors, and the Washington, D. C. area is home to a large work force of CFEs. These CFEs work for
the FBI, DEA, USSS, as well as with the vast majority of Inspectors General and local police departments.
Practically all of the major accounting and consulting firms employ computer forensic examiners on staff, and
there is a growing cadre of independent consultants that work in this field. The American Society of Crime Lab
Directors (ASCLAD), the governing association in the field forensics sciences, requires that all computer
forensic examiners possess a bachelors degree with significant course work in math and science.
As a result of successfully completing this program, students should have the necessary skills and knowledge to
perform in a variety of computer forensic roles, including forensics examiner, and the ability to earn an
advanced degree.
We have prepared the survey below to gauge interest in the program. Your answers to the following questions
will be used in summary form only. No personally-identifiable information will be released. Please feel free to
contact Dr. Jeremy Allnutt at jallnutt@gmu.edu if you would like more information about the proposed
program.
Thank you.
3
Yes
1. Would you be interested in enrolling in a program like this?
(If no, then skip to question 3.)
2. If yes, would you prefer to attend the program on a full-time or part-time basis?
Fulltime
No
Parttime
Not
sure
3. Have you ever applied to an institution offering a similar program? If so, which program, at which school?
Yes
No
4. Are you currently attending George Mason University?
If so, in what program:
Yes
No
5. FOR STUDENTS CURRENTLY IN MASON PROGRAM.S. AT THE SAME LEVEL:
If this program had been available when you initially applied to Mason, would you have applied for
admission to it?
Yes
No
6. FOR STUDENTS CURRENTLY IN MASON PROGRAM.S. AT THE SAME LEVEL: Are you currently
enrolled, or are thinking of enrolling in, a certificate as part of your master’s degree? If you answered yes,
could you please put down the name or acronym of the certificate (e.g. TFAS, ANPT, and WIRE).
Yes
No
Yes
No
Yes
No
Certificate program:……………………………………………….
7. FOR STUDENTS WHO LEFT MASON TO PURSUE EDUCATION ELSEWHERE:
If this program had been available when you completed your current program, would you have applied for
admission?
8. FOR STUDENTS WHO LEFT MASON BUT HAVE NOT PURSUED FURTHER EDUCATION: If this
program had been available when you completed your current program, would you have applied for
admission?
9. FOR STUDENTS WHO ANSWERED “Yes” TO QUESTIONS 5, 7, OR, 8, COULD YOU PLEASE
TELL US WHAT YOUR PRINCIPAL BACKGROUND IS IN TERM.S. OF YOUR CURRENT JOB OR
INTEREST (Please check the most appropriate area below)
(a) IT …………. ……….
(b) Legal …………..………..
(c) ADJ ….....…………….
(d) Accounting …………
(e) Law enforcement ……….
(f) Teacher ……………….
(g) Other ……………… (Please explain below)
10. FOR STUDENTS WHO ANSWERED “Yes” TO QUESTIONS 5, 7, OR, 8, COULD YOU PLEASE
TELL US WHAT PART OF COMPUTER FORENSICS INTERESTS YOU THE MOST (Please check the
appropriate area bellow)
(a) Hardware Forensics ……………….
(b) Software Forensics ……………….
(c) Network Forensics .………………..
(d) Search and Seizure ……………….
(e) Trap and Trace …………………….
(f) Law and Ethics as related to
Computer Forensics ………………
(g) Other (Please explain bellow)
4
11. In which state do you currently live?
Virginia
Maryland
…………………………………………………………………..
DC
Other
12. Do you plan to live in this state or country for the next three or four years?
Yes
No
13. Are you currently employed? (If not, then skip to 17.)
Yes
No
If you answered “Other”, which state or country (if not the USA) do you live in?
14. If you are employed, please identify the state in which you work.
If you answered “Other”, could you please tell us where you currently work
…………………………………….
15. If you are employed, are you employed full-time or part-time?
16. If you are employed, would the proposed program help you in your work?
17. Please feel free to provide below any additional comments about the proposed program
5
Virginia
Maryland
DC
Other
Fulltime
Yes
Parttime
No
Responses on October 8th, 2007 to the web-based questionnaire
The Questionnaire became “live” on Friday, October 5th, 2007. The responses below were taken over the
Columbus Day weekend.
Q1. Would you be interested in enrolling in a program like this?
answer options
Yes
No
Response
Percent
90.6%
10.1%
answered
question
skipped
question
Response Count
135
15
149
0
Q2. Would you prefer to attend the program on a full-time or part-time basis?
answer options
Full-time
Part-time
Not sure
Response
Percent
28.0%
60.6%
11.4%
answered
question
skipped
question
Response Count
37
80
15
132
17
Q3. Which campus of George Mason would you prefer:
answer options
Fairfax
Prince William
Loudon
Response
Percent
73.5%
24.2%
2.3%
answered
question
skipped
question
Response Count
97
32
3
132
17
Q4. Which type of classes do you prefer:
answer options
Distance Education (online)
Traditional Lecture (face-to-face)
A combination of both distance and
traditional.
Response
Percent
3.0%
44.4%
Response Count
4
59
52.6%
answered
question
skipped
question
70
133
16
Q5. Have you ever applied to an institution offering a similar program?
answer options
6
Response
Response Count
Yes
No
Percent
1.4%
98.6%
answered
question
skipped
question
2
145
147
2
Q6. If so, which program, at which school?
answer options
Program
School
Response
Percent
100.0%
100.0%
answered
question
skipped
question
Response
Count
4
4
4
145
Q7. Are you currently attending George Mason University?
answer options
No
Yes
Response
Percent
17.7%
82.3%
(Please
specify
program)
answered
question
skipped
question
Response
Count
26
121
Response
Percent
65.4%
34.6%
answered
question
skipped
question
Response
Count
17
9
110
147
2
Q8. Are you a former GMU student?
answer options
Yes
No
26
123
Q9. FOR STUDENTS WHO LEFT MASON TO PURSUE EDUCATION ELSEWHERE:
If this program had been available when you
completed your current program would you have
applied for admission?
answer options
Yes
No
7
Response
Percent
80.0%
20.0%
Response
Count
4
1
answered
question
skipped
question
5
144
Q10. FOR STUDENTS WHO LEFT MASON BUT HAVE NOT PURSUED FURTHER EDUCATION: If this
program had been available when you completed your current program, would you have applied for
admission?
Response
Percent
70.0%
30.0%
answered
question
skipped
question
answer options
Yes
No
Response
Count
7
3
10
139
Q11. FOR STUDENTS CURRENTLY IN MASON PROGRAM.S. AT THE SAME LEVEL:
If this program had been available when
you initially applied to Mason would you
have applied for admission to it?"
answer options
Yes
No
Response
Percent
74.4%
25.6%
answered
question
skipped
question
Response
Count
61
21
82
67
Q12. FOR STUDENTS CURRENTLY IN MASON PROGRAM.S. AT THE SAME LEVEL: Are you currently
enrolled, or are thinking of enrolling in, a certificate as part of your master’s degree?
answer options
Yes
No
Response
Percent
49.4%
50.6%
answered
question
skipped
question
Response
Count
39
40
79
70
Q13. Please enter the name or acronym of the certificate (e.g. TFAS, ANPT, and WIRE).
Response Count
answered question
skipped question
22
22
127
Q14. Please tell us what your principal background is in terms of your current job or interest:
answer options
IT
Legal
8
Response
Percent
94.7%
0.0%
Response
Count
125
0
Law Enforcement
Administration of Justice
Accounting
Teacher
3.8%
0.8%
0.0%
0.8%
Other
(please
specify)
answered
question
skipped
question
5
1
0
1
15
132
17
Q15. Please tell us what part of computer forensics interests you the most:
answer options
Hardware
Forensics
Software
Forensics
Network
Forensics
Search and
Seizure
Law and Ethics
Trap and Trace
Response Percent
Response Count
19.0%
26
22.6%
31
38.7%
53
6.6%
6.6%
6.6%
Other (please
specify)
answered question
skipped question
9
9
9
2
137
12
Q16. In which state do you currently live?
answer options
DC
Maryland
Virginia
Response Percent
0.7%
0.0%
99.3%
Other (please
specify)
answered question
skipped question
Response Count
1
0
140
0
141
8
Q17. Do you plan to live in this state or country for the next three or four years?
answer options
Yes
No
Response Percent
93.6%
6.4%
answered question
skipped question
Response Count
132
9
141
8
Q18. Are you currently employed?
answer options
Yes
No
9
Response Percent
83.0%
17.0%
answered question
skipped question
Response Count
117
24
141
8
Q19. Please identify the state in which you work:
answer
options
DC
Maryland
Virginia
Response
Percent
8.5%
4.2%
87.3%
Other (please
specify)
answered
question
skipped question
Response Count
10
5
103
0
118
31
Q20. Are you employed full-time or part-time?
answer
options
Full-time
Part-time
Response
Percent
64.1%
35.9%
answered
question
skipped question
Response Count
75
42
117
32
Q21. Would the proposed program help you in your work?
answer
options
Yes
No
Response
Percent
65.8%
34.2%
answered
question
skipped question
Response Count
77
40
117
32
Q22. Please feel free to provide below any additional comments about the proposed program:
Response Count
30
answered
question
skipped
question
10
30
119
APPENDIX F
Assumptions Used in Developing Resource Projections
Faculty FTE
Undergraduate:
Graduate:
Adjunct:
GTA:
18 student FTE = 1 faculty FTE
12 student FTE = 1 faculty FTE
8 3-credit courses/year = 1 faculty FTE
4 3-credit courses/year = 1 full-time GTA = 0.5 FTE
Salary
Full professor:
Assistant professor:
Adjunct:
GTA:
GRA:
Pres. Scholar GRA:
$90,000
$60,000
$1,070/credit (undergraduate)
$1,150/credit (graduate)
1 FTE = 8 classes * 3 credits/class * adjunct rate
$22,000 ($10,000 stipend + $12,000 tuition)
$24,000 ($12,000 stipend + $12,000 tuition)
$30,000 ($18,000 stipend + $12,000 tuition)
Fringe benefits
Full-time faculty:
Adjunct:
Classified:
Admin faculty:
GTA:
.2765
.0765
.3541
.2825
0
Equipment
New full-time faculty and staff get a computer:
New full-time faculty and staff get a desk and chair:
Telecommunications
New faculty and staff get a telephone:
Annual charges:
11
$750
$240
$2,000
$3,000
Download