27.06.2013 Views

6th European Conference - Academic Conferences

6th European Conference - Academic Conferences

6th European Conference - Academic Conferences

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Vincent Garramone and Daniel Likarish<br />

Forensics Topics Totals<br />

Network Forensics [3] [6] [11] [13] 4<br />

Incident Response [11] [12] [15] 3<br />

Live System Forensics [1] [3] [15] 3<br />

Malware Detection [3] [11] [12] 3<br />

Password Cracking [2] [5] [13] 3<br />

Registry Analysis [3] [6] [13] 3<br />

Hardware Identification [2] [6] 2<br />

Tool Development [3] [11] 2<br />

Web Browser Forensics [6] [13] 2<br />

Baselining [3] 1<br />

Application Analysis [6] 1<br />

Data Reconstruction [6] 1<br />

Forensic Planning 1<br />

Key Loggers [3] 1<br />

Dead System Forensics [15] 1<br />

Packet Analysis [6] 1<br />

Password Auditing [3] 1<br />

RFID Forensics [6] 1<br />

Tool Validation [11] 1<br />

Web Services [6] 1<br />

Evidence Collection and Handling [5] 1<br />

Key Authors Year Country Subject<br />

[1] Bem, D. and Huebner, E. 2008 Australia Curriculum<br />

[2] Berghel, H. 2003 USA Definition<br />

[3] Crowley, E. 2007 USA Curriculum (corporate)<br />

[5] Figg, W. and Zhou, Z. 2007 USA Curriculum<br />

[6] Francia, G. A. 2006 USA Curriculum<br />

[11] Troell, L., Pan, Y., and Stackpole, B. 2003 USA Curriculum<br />

[12] Troell, L., Pan, Y., and Stackpole, B. 2004 USA Curriculum<br />

[13] Wassenaar, D., Woo, D., and Wu, P. 2009 USA Curriculum<br />

[15] Yen, P., Yang, C., and Ahn, T. 2009 Taiwan Process<br />

7. Appendix 2: MSIA 682, Network Forensics course topics and activities<br />

mapped to PRISM forensics vocabulary<br />

Course Topic Activity Description<br />

Introduction to Security<br />

Monitoring<br />

Intro Security packet data<br />

structure based on the<br />

TCP/IP model<br />

81<br />

Example of a granular<br />

Lab Activity<br />

Identify the following<br />

packet structures by<br />

explaining what each<br />

packet is, what ports,<br />

protocols or codes<br />

each one uses using<br />

the static packet<br />

captures<br />

PRISM Forensics<br />

vocabulary<br />

Network forensics

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!