16.01.2015 Views

CS2013-final-report

CS2013-final-report

CS2013-final-report

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Learning outcomes:<br />

1. Describe the concept of privacy including personally private information, potential violations of privacy<br />

due to security mechanisms, and describe how privacy protection mechanisms run in conflict with security<br />

mechanisms. [Familiarity]<br />

2. Describe how an attacker can infer a secret by interacting with a database. [Familiarity]<br />

3. Explain how to set a data backup policy or password refresh policy. [Familiarity]<br />

4. Discuss how to set a breach disclosure policy. [Familiarity]<br />

5. Describe the consequences of data retention policies. [Familiarity]<br />

6. Identify the risks of relying on outsourced manufacturing. [Familiarity]<br />

7. Identify the risks and benefits of outsourcing to the cloud. [Familiarity]<br />

IAS/Digital Forensics<br />

[Elective]<br />

Topics:<br />

• Basic Principles and methodologies for digital forensics<br />

• Design systems with forensic needs in mind<br />

• Rules of Evidence – general concepts and differences between jurisdictions and Chain of Custody<br />

• Search and Seizure of evidence: legal and procedural requirements<br />

• Digital Evidence methods and standards<br />

• Techniques and standards for Preservation of Data<br />

• Legal and Reporting Issues including working as an expert witness<br />

• OS/File System Forensics<br />

• Application Forensics<br />

• Web Forensics<br />

• Network Forensics<br />

• Mobile Device Forensics<br />

• Computer/network/system attacks<br />

• Attack detection and investigation<br />

• Anti-forensics<br />

Learning outcomes:<br />

1. Describe what a digital investigation is, the sources of digital evidence, and the limitations of forensics.<br />

[Familiarity]<br />

2. Explain how to design software to support forensics. [Familiarity]<br />

3. Describe the legal requirements for use of seized data. [Familiarity]<br />

4. Describe the process of evidence seizure from the time when the requirement was identified to the<br />

disposition of the data. [Familiarity]<br />

5. Describe how data collection is accomplished and the proper storage of the original and forensics copy.<br />

[Familiarity]<br />

6. Conduct data collection on a hard drive. [Usage]<br />

7. Describe a person’s responsibility and liability while testifying as a forensics examiner. [Familiarity]<br />

8. Recover data based on a given search term from an imaged system. [Usage]<br />

9. Reconstruct application history from application artifacts. [Usage]<br />

10. Reconstruct web browsing history from web artifacts. [Usage]<br />

11. Capture and interpret network traffic. [Usage]<br />

12. Discuss the challenges associated with mobile device forensics. [Familiarity]<br />

13. Inspect a system (network, computer, or application) for the presence of malware or malicious activity.<br />

[Usage]<br />

14. Apply forensics tools to investigate security breaches. [Usage]<br />

15. Identify anti-forensic methods. [Familiarity]<br />

- 110 -

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!