11.01.2017 Views

A Technical History of the SEI

ihQTwP

ihQTwP

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

design <strong>of</strong> s<strong>of</strong>tware-intensive systems; most universities even <strong>of</strong>fer a course in s<strong>of</strong>tware architecture.<br />

Specifically, <strong>the</strong> <strong>SEI</strong><br />

<br />

<br />

<br />

<br />

<br />

<br />

was active in addressing s<strong>of</strong>tware architecture as a discipline before it became widely recognized<br />

as a s<strong>of</strong>tware engineering topic<br />

developed reference architectures for specific applications, such as flight simulators and user<br />

interfaces<br />

developed a feature-oriented domain analysis technique that served as <strong>the</strong> basis for a plethora<br />

<strong>of</strong> domain analysis tools available today<br />

developed methods to give engineers a methodology for identifying and analyzing important<br />

s<strong>of</strong>tware architecture decisions<br />

focused on <strong>the</strong> importance <strong>of</strong> quality attributes as an architectural driver and developed a<br />

method for addressing non-functional quality attributes as part <strong>of</strong> <strong>the</strong> s<strong>of</strong>tware architecture<br />

produced guidelines for developing a s<strong>of</strong>tware product line and supporting practices that have<br />

been used successfully by <strong>the</strong> DoD and industry organizations to gain significant improvements<br />

in <strong>the</strong>ir ability to evolve s<strong>of</strong>tware across multiple platforms<br />

Computer Forensics<br />

Thirty years ago, <strong>the</strong> word forensics was not used in conjunction with computers, and <strong>the</strong> notion<br />

that one could extract forensic information from a computer was not considered outside <strong>the</strong> research<br />

community. Today, law enforcement is able to conduct sophisticated forensic analysis on<br />

computers used in criminal activity, learn new techniques in a virtual environment, and collaborate<br />

with one ano<strong>the</strong>r in that virtual environment.<br />

Specifically, <strong>the</strong> <strong>SEI</strong><br />

<br />

<br />

<br />

<br />

<br />

<br />

used its expertise in vulnerability analysis and network intrusion detection to provide support<br />

to computer forensics analysts in several government agencies<br />

developed techniques and supporting tools and training to help computer forensics analysts<br />

address high-pr<strong>of</strong>ile intrusions and identity <strong>the</strong>ft, and investigate computer crime<br />

provided training for government computer forensics analysts to enable <strong>the</strong>m to stay current<br />

with <strong>the</strong> latest tools and methods used by cybercriminals<br />

developed forensic technology from which evidence is admissible in federal court computer<br />

crime cases<br />

developed a state-<strong>of</strong>-<strong>the</strong> art environment that enables geographically dispersed analysts to access<br />

to tools and computing resources and, thus, to cooperate on cases<br />

defined a master’s-level curriculum in digital forensics that has been implemented at Carnegie<br />

Mellon University’s Information Networking Institute<br />

CMU/<strong>SEI</strong>-2016-SR-027 | SOFTWARE ENGINEERING INSTITUTE | CARNEGIE MELLON UNIVERSITY 298<br />

Distribution Statement A: Approved for Public Release; Distribution is Unlimited.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!