INSTITUTE OF FORENSIC SCIENCE GUJARAT FORENSIC SCIENCES UNIVERSITY IFS-GFSU CERTIFIED ELECTRONIC EVIDENCE EXAMINER EEE
|
|
|
- Avis Baldwin
- 10 years ago
- Views:
Transcription
1 INSTITUTE OF FORENSIC SCIENCE GUJARAT FORENSIC SCIENCES UNIVERSITY IFS-GFSU CERTIFIED ELECTRONIC EVIDENCE EXAMINER EEE
2 IFS$GFSUCertification#18001 ElectronicEvidenceExaminer AnIFS(GFSUCertifiedElectronicEvidenceExaminer isequippedwithspecializedknowledgeandskillsin collecting,examining,analyzingandreportingof electronicevidenceandcybertrails. DATESFOR2014EXAMS The exam for the IFS(GFSU Certification #18001ElectronicEvidenceExaminerwill be conductedonthefollowingdatesin2014: Sunday19 th January,2014 Sunday20 th April,2014 Sunday20 th July,2014 Sunday19 th October,2014 Registration for the exam closes 30 days priortotheexamdate. SUMMARYOFEXAMINFORMATION ExamDuration:3hours PassingMarks:70% One(timeregistrationfees:Rs1,000 ExamFees:Rs4,500forstudents ExamFees:Rs10,000forothers ABOUTIFS$GFSU This certification is provided by Institute of Forensic Science, Gujarat Forensic Sciences University (IFS(GFSU). The Government of Gujarat, under the flagship of the Home Department of the Government of Gujarat, has established GFSU. GFSU is the only university across the world, dedicated to Forensic&InvestigativeScience. ABOUTTHISDOCUMENT Thisdocumentisissuedinpursuanceofthe IFS(GFSUCertificationPolicy. This document is issued as a guide to candidates pursuing an IFS(GFSU certification. IFS(GFSU does not make any representationsorwarrantiesthattheuseof this document will assure candidates of passinganyifs(gfsucertification. 2013InstituteofForensicScience,Gujarat Forensic Sciences University. All rights reserved. GujaratForensicSciencesUniversity DFSHeadQuarters,Sector18(A, NearPoliceBhavan, Gandhinagar(382007, Gujarat(India 1
3 QuickGuidetoEarning&maintainingyourIFS$GFSUcertification ObtainPRN Applyfor Exam Preparefor Exam Passthe exam Earnthe certiaication EarnCEUs Obtainyourone(timePermanentRegistrationNumber. 1 2 Applyfortheexamination. PreparefortheexambystudyingthereferencematerialcomprisingtheIFS(GFSU 3 CommonBodyofKnowledgeforElectronicEvidenceExamination(CBOK(EEE). 4 Appearforthecertificationexamandobtain70%ineachsection. 5 Earnyourcertification.EarntherighttouseEEE.GetupgradedtoEEE+after6years. 6 Earn120ContinuingEducationUnits(CEUs)every3yearsandsubmitproofofthesame. 2
4 TableofContents A.BenefitsofIFS$GFSUCertifications...4 A1.Benefitstoindividuals...4 A2.Benefitstoorganizations...5 B.AbouttheCertification...6 B1.AboutElectronicEvidenceExamination...6 B2.Requiredcompetence...6 B3.Abilities...6 B4.Prerequisites...6 B5.CodeofProfessionalEthics...7 B6.Criteriaforinitialcertification...7 B7.Criteriaforrenewalofcertification...7 B8.Groundsforsuspendingandwithdrawingcertification...7 B9.ExamOverview...8 B10.Developmentoftheexam...8 B11.SubjectMatterExperts...8 B12.Typeofquestions...10 B13.PreparationfortheExam...10 B14.CommonBodyofKnowledgeforElectronicEvidenceExamination(CBOKEEE)...10 B15.AdministrationoftheExam...10 AdmissionPass...10 Entrytotheexamcentre...11 SpecialArrangements...11 Whattocarryintotheexamcentre...11 WhatNOTtocarryintotheexamcentre...11 Malpracticeorcheating...11 B16.Fees...11 B17.ExamDuration...12 B18.PassingScore...12 B19.Dates...12 B20.OverviewofExaminationSyllabus...12 B21.DetailedExaminationSyllabus...12 C.TheIFS$GFSUContinuousEducationProgram...18 D.AboutGFSU...19 E.ApplicationFormforPermanentRegistrationNumberforIFS$GFSU CertificationPrograms
5 A.BenefitsofIFS/GFSUCertifications A1.Benefitstoindividuals Achieveahigherposition,raise,and promotionfaster 1 Becomemoreemployable 2 Affirmyourprofessionalexpertise 3 Increasejobsecurity Demonstratethatyoupossess essentialdomainknowledge Boostrelevancebystayingcurrent intheprofessionwithcontinuing educationrequirements. Advanceyourcareerpotentialdue torecognitionasacertified professional Recognitionofprofessional competencebyprofessionalpeers andmanagement Increaseyourvalueandincome Keepupwithever(changing standardsandtechnologies Validateyourknowledge Differentiateyourselffromyour peers Boostyourconfidence 1Salary surveys show that the majority of hiring managers consider certifications a factor in hiring decisions, and that obtaining relevant certifications oftenleadstoasalaryincrease. 2According to an IDC white paper, "63% of hiring managers believe certified individuals are more productivethantheirnon(certifiedcounterparts." 3Your employer, clients, employees and peers will recognizeyourgfsucredentialasanindicationofthe skills and knowledge you ve gained through certification. Showthatyouknowthemost currentprinciplesandpracticesof yourfield Personalsatisfactionof accomplishingamilestoneinyour career Standoutagainstotherapplicantsin atoughjobmarket. Getpreparedforgreateron(the(job responsibilities Potentiallyearnhigherincomefor beingformallyrecognizedasa certifiedprofessional DemonstrateYourCommitment Buildandenhanceyourcredibility Build&ShowcaseYourSkills Becomemoremarketablewhenyou competefortoppositions Raiseyourprestigeamongyour staffandyourpeers Improveoverallperformance, removeuncertaintyandwiden marketopportunities Ensureyouarecontinually improvingandrefiningyour activities Becomepartofaprofessional network Enjoybettercareerflexibility Berecognizedasbeing knowledgeableandskilled Openthedoorsofopportunity; enhanceyourcareer 4
6 A2.Benefitstoorganizations Benchmark With GFSU certifications, your organization will have a benchmark to compensate, measure and evaluate employees skills for roles within the organization. GFSU certifications also provide a recognized benchmark of skills that can be aligned to organisationalskillsframeworks. Consistency WithGFSUcertifications,yourteamsaretrainedtoconsistentskilllevels. Staffmotivation The regular assessment process will improve staff responsibility, commitment and motivationandensurecompetentemployees. IncreasedProductivity GFSU certified professionals are typically more productive and work to consistent standards. Assurance GFSUcertificationsassurethatthecertifiedprofessionalhastheknowledgeandskills neededtoperformtheallottedtasks. Performance$relatedpay GainingGFSUcertificationscanbealignedtoperformance(relatedpay. Customersatisfaction GFSU certifications can ensure greater customer satisfaction (internal and external customers). Employeesatisfaction GFSU certifications provide professional development, advancement and recognition opportunitiesforstaff.thiscanalsoleadtolowerstaffturnover. Higherquality GFSUcertificationsleadtomorereliable,higherqualityresultsproducedwithincreased efficiencyandconsistencybyprofessionalswhouseindustrystandardtechniques. Cultureoflearning GFSU certifications empower a culture of learning and improvement that increases returnoninvestment. Increasedcredibility GFSU certifications demonstrate to customers, competitors, suppliers, staff and investorsthatyouuseindustry(standardpractices. Stakeholdersatisfaction GFSU certifications demonstrate to your stakeholders that your business is run effectively. 5
7 B.AbouttheCertification B1.AboutElectronicEvidenceExamination An Electronic Evidence Examiner (EEE) is skilled in collecting, examining, analyzing and reportingofelectronicevidenceandcybertrails.morespecifically,aneee: 1. Performsforensicanalysisofdigitalinformationusingstandardcomputerforensics& evidencehandlingtechniques. 2. Uses forensically sound procedures to identify network computer intrusion evidence andidentifiesperpetrators. 3. Employsforensictoolsandtechniquestoidentifyandexaminemaliciousfiles. 4. Employsforensictoolsandtechniquestocrackfileandsystempasswords. 5. Detects steganography and recovers deleted, fragmented and corrupted data from digitalmediaofalltypes. 6. Observesproperevidencecustodyandcontrolprocedures. 7. Documents procedures and findings in a manner suitable for courtroom presentation andpreparescomprehensivewrittennotesandreports. Thiselectronicevidencemaybefoundincomputers,laptops,servers,cellphones,tablets,pen drives,digitalcameras,cds,dvds,computernetworks,theinternetetc. Electronic evidence can be hidden in pictures (steganography), encrypted files, password protectedfiles,deletedfiles,formattedharddisks,deleted s,chattranscriptsetc. Electronicevidencecanrelatetoonlinebankingfrauds,onlinesharetradingfraud,sourcecode theft, credit card fraud, tax evasion, virus attacks, cyber sabotage, phishing attacks, hijacking, denial of service, hacking, divorce cases, murder cases, organized crime, terrorist operations,defamation,pornography,extortion,smugglingetc. B2.Requiredcompetence Toearnthiscertification,candidatesmusttakethecertificationexamandobtainaminimumof 70%marks. B3.Abilities Candidate svision,hearing,mobilityandotherabilitiesmustbesuchthatwouldpermithimto workefficientlyinelectronicevidenceexaminationinanorganizationalenvironment. B4.Prerequisites ThecandidatemustbeagraduateinanystreamfromarecognizedUniversity. 6
8 B5.CodeofProfessionalEthics AllIFS(GFSUcertifiedprofessionalsshould: 1. Encourageimplementationofmeasuresforcontrolofcorporatecrime. 2. Performdutiestothebestoftheirknowledge,skillsandcapabilities. 3. Maintainhighstandardsofmoralcharacter. 4. Preserve the privacy and confidentiality of information obtained in the course of professionalassignments,subjecttoregulatoryrequirements. 5. Ensurecompliancewithregulatoryandlegalframework. Failure to comply with this Code of Professional Ethics may result in suspension and subsequentwithdrawalofcertification. B6.Criteriaforinitialcertification 1. Demonstrating mastery of IFS(GFSU Common Body of Knowledge for Electronic Evidence Examination by successfully taking the certification exam with a score of at least70%. 2. Being a graduate in any stream from a recognized University. Students pursuing graduationmayappearforthecertificationexamandonsuccessfullypassingtheexam willbeissuedaprovisionalcertificate.suchapplicantswillbecertifiedonsubmitting proofofgraduation. 3. AcceptingtheIFS(GFSUCodeofProfessionalEthics. B7.Criteriaforrenewalofcertification 1. Earn120CEUs(ContinuingEducationUnits)every3years. 2. SubmitdocumentaryevidenceinrespectofCEUsearned. 3. SubmitadministrativefeeofRs.2,000plusapplicabletaxes(every3years). 4. CompliancewithIFS(GFSUCodeofProfessionalEthics. B8.Groundsforsuspendingandwithdrawingcertification The Certification Management Committee, Institute of Forensic Science, Gujarat Forensic Sciences University (IFS(GFSU) may suspend and withdraw a certification for any of the followingreasons: 1. ViolationofthetermsofanyundertakingmadetoIFS(GFSU. 2. FailuretoobtaintherequiredCEUs(ContinuingEducationUnits)every3years. 3. Failuretosubmitdocumentaryevidenceevery3yearsofCEUsearnedalongwiththe applicableadministrativefee. 4. ViolatinganyprovisionoftheIFS(GFSUCodeofProfessionalEthics. 5. ProvidinganyfalseinformationtoIFS(GFSU. 7
9 B9.ExamOverview TheElectronicEvidenceExaminer(EEE)certificationfromInstituteofForensicScience,Gujarat ForensicSciencesUniversity(IFS(GFSU)provesspecialistlevelexpertiseinelectronicevidence examination. B10.Developmentoftheexam The Certification Management Committee of IFS(GFSU is responsible for operational policies and procedures, implementation of the policies and procedures, resources for certification activities (personnel, outsourcing, premises, including examination sites, equipment and resources for carrying out certification activities), assessment activities, decisions on certification,includingthegranting,maintaining,recertifying,expanding,reducing,suspending or withdrawing of the certification, contractual arrangements. The Certification Development Committee of IFS(GFSU is responsible for development and maintenance of the certification schemes.subjectmatterexpertscomeunderthecertificationdevelopmentcommittee. B11.SubjectMatterExperts Subject Matter Experts for certification programs conducted by Institute of Forensic Science, GujaratForensicSciencesUniversityadviseinthedevelopmentandreviewofthecertification scheme 4. The Subject Matter Experts for IFS7GFSU Certification #18001 Electronic Evidence Examinerare(inalphabeticalorder): DebasisNayak,DirectorAsianSchoolofCyberLaws DebasisNayakisDirectorandco(founderofAsianSchoolofCyberLaws.Heisalsothemanaging partner, Techjuris Law Consultants. He has also been involved in the activity of framing draft rules and regulations under the Information Technology Act, 2000 for the Department of InformationTechnology,GovernmentofIndia. He is a visiting faculty on cyber law and cyber crime investigation at the National Police Academy,Hyderabad.HehastaughtcyberlawatnumerouseducationalinstitutionsacrossIndia. He has trained various law enforcement agencies in cyber crime investigation including personnelfromgovernmentsofmalaysiaandmauritius.hisotherareasofinterestincludethe legalregimeregulatingonlinegaming,copyrightissuesrelatingtosoftware,implementationof publickeyinfrastructureandcyberforensics.heisaconsultanttocorporateorganizations,law enforcementagenciesandgovernmentsontheseissues. JimmyMate,AssistantManager,EY With over 7 years of experience in Forensic Technology, he currently holds the position of Assistant Manager with a Big4. His expertise covers Digital Forensic Data Analysis, Computer Forensics,FraudInvestigationsalongwithevaluatingdesign&operatingefficienciesofinternal controlsattheentity&processlevelandidentifyingareasofimprovement&costsavings. He has addressed various sectors like Cement Manufacturing, Apparels & Footwear, Pharmaceutical, Information Technology, Automotive, Micro Finance, Consumer Electronic manufacturing,media&entertainment,hospitality,business&technologyservices,insurance 4Thisincludescriteriaforinitialcertificationandrecertification;curriculumforcertificationexaminationsandtests; assessment methods for initial certification and recertification; surveillance methods and criteria (if applicable); criteria for suspending and withdrawing certification; criteria for changing the scope or level of certification (if applicable);submittingquestionsforinclusioninthecertificationexaminationsandtests(optional). 8
10 andsteelmanufacturing.hehasalsoworkedondesigning&executionoftrainingmodulesinthe areaofforensictechnologyforgovernmentorganizations&corporates. RVittalRajFCA,CISA,CGEIT,CISM,CRISC,CISSP,CIA,CFE Hehas25+yearsofexperienceindirecting,managingprojectsinInformationSecurity,ISAudit, ITGovernance. RamGopalSoni,AssociateVP$SecurityConsulting,ControlCaseInternationalPvt.Ltd. Ram Gopal Soni is an Information Security Graduate with strong cognition and industry experienceininformationsecurityimplementation,assessment,auditandinformationsecurity Management. He is working as QSA / Associate VP ( Security Consulting with ControlCase International Pvt. Ltd and is currently focused on Information Security Compliance Audit and Certification including PCI(DSS, PA(DSS and Computer Forensics, Fraud Investigation and Risk Assessment. He is also involved in execution and management of Technical Risk Assessment includingapplicationsecurity,penetrationtestingandbusinessdevelopmentactivities. RavindranathPatil,AssociateDirector,RiskConsulting,KPMG He is a former IPS officer having over 9 years of experience in cyber and fraud investigation pertaining to industries such as Infrastructure, Liquor, FMCG, Telecommunication, IT, Engineering Goods, Automobile and Micro Finance. He has worked as an Assistant Director GeneralofForeignTrade,MinistryofCommerce,GovernmentofIndia.Heisavisitingfacultyon cybercrimeinvestigationatnationalpoliceacademy,nationalacademyofdirecttaxesandthe Centre for Police Research. He is a research fellow of Centre for Police Research on Mobile Technology. SethuSRaman,VicePresident&ChiefRiskOfficer,MphasiSanHPCompany SethuSRamanisanex(defenceofficerpresentlyworkingastheChiefRiskOfficerwithanMNC IT services company. He is a senior risk management professional with a strong academic background(mba,bal[law],crma,cpp,cbcp,cisa,cissp)and21yearsofversatileexperience inmanagingriskinits manifoldmanifestation especiallyinbankinganditindustries. S.P.Srivastava,formerDirectorGeneralofUPPoliceandformerJointDirectorofCentralBureau ofinvestigation(cbi) Shri S. P. Srivastava is a retired Director General of Police, Uttar Pradesh and former Joint Director(Delhi,Mumbai),CentralBureauofInvestigation(CBI).Duringhisillustriouscareerin the Indian Police Service, he has held the following posts: Director General, U.P. Police Head Quarters, JointDirector(Delhi,Mumbai),CentralBureauof Investigation, Govt. of India, Crime Branch, U.P., Criminal Investigation Department / Intelligence Department, Chief Security Commissioner(NER,CR),IndianRailways,JointManager(Vigilance)/RegionalManager,Food CorporationofIndia,SuperintendentofPolice,StateVigilanceEstablishment. He has developed an IT tool for investigation of disproportionate asset cases enabling law enforcementagenciestolaunchsuccessfulprosecutionagainstcorruptaccusedpersons.hehas alsodevelopedanin(housetoolforscientificallocationofbudgettofieldunitsenablingoptimal utilizationandmaximumyield(uppolicehasannualbudgetaryoutlayofapprox.6000croresand approximately2lakhpolicepersonnel). WhileworkinginCBI,NewDelhi,hehelpedsolveahighprofileandsensitivemurdercasewith thehelpofscientifictoolsandutmostregardtohumanrights.accusedpersonswerefoundguilty by the trial court and severe punishment awarded, making it a landmark investigation. While workingincbi,mumbaialargeamountofblackmoney(oneofthelargest)wasunearthedfroma seniorgovernmentofficial,whichbecamealandmarkhaulofhardcashstashedinthehouse. 9
11 HehasbeenengagedactivelyindevelopmentofITtoolstocombatcybercrimeandanintegrated application for holistic police functioning. His educational qualifications include B.Sc. (Physics, Chemistry Mathematics), BCA, M.Sc. Physics (Electronics). He is a published author and has writtenmanyarticlesoncontemporarytopicsincludingcorruptioninnationaldailynewspapers. SzabolcsHallai,CISO,CISA,CISM,CITRM,C CISO Szabolcssprimarygoalasanauditorand/orconsultantistoreconciletheeverlastingdilemma of an IT/ITSEC being a business based function inside of a non(it core business entity. By becoming a skilled expert of both worlds ( business and information technology he tries to discovercontrolandsystemerrorsandtohelpthemcorrectthebestpossibleway.workingasa team player he never lost his individual skills. Experienced in governmental / multinational / equity / financials / banking environments, multitasking, with high communication skills on senior level and with end(users. Specialities: Expertise on the field of IT Auditing, QA and Consultancy,RiskManagement,PolicyCompliance,ISO27001/17799/BS7799,ITIL,COBIT,AML, MiFID,GeneralInternalAudit,Duediligence,ITSecurity,Legislationcompliance,ITgovernance B12.Typeofquestions TheexaminationwillconsistprimarilyofCaseStudyBased(Problem(Based)questions.These questions consist of a practical problem followed by several options. Candidates must apply theirknowledgeandskillstochoosethemostappropriateoption.ifs(gfsucertificationsuse thistypeofquestionsastheyallowcandidatestodemonstratetheirpracticalunderstandingof thetopicratherthanrequiringthemtomemoriseinformation.suchquestionsfocusontestinga candidate s skill development, require thinking and do not focus on purely theoretical knowledge. B13.PreparationfortheExam CaseStudyBased(Problem(Based)questionsrequirecandidatestostudythereferencematerial thoroughly and ensure understanding of how the information can be applied in real(life practical situations. On registering for the certification exam, you will be provided comprehensivereferencematerialandtheifs(gfsuguidetothecommonbodyofknowledge forelectronicevidenceexamination(cbok(eee)inelectronicform. B14.CommonBodyofKnowledgeforElectronicEvidenceExamination(CBOK/EEE) The IFS(GFSU Common Body of Knowledge for Electronic Evidence Examination (CBOK(EEE) establishesabaselineforthebodyofknowledgeforelectronicevidenceexamination.cbok( EEE is a comprehensive description of the sum of knowledge and professional practices and techniquesthataregenerallyacceptedwithintheelectronicevidenceexaminationprofession. CBOKEEE is not static and will be constantly evolving as the field of Electronic Evidence Examinationdevelops. B15.AdministrationoftheExam AdmissionPass Approximatelyoneweekpriortotheexamdate,registeredcandidateswillbe ed an electronic Admission Pass containing the date, time and exact venue of the examination.youmustcarryaprintoutofthisadmissionpassalongwithagovernment issuedphoto(identitycard(e.g.pancard,driverslicense,passport,etc.). 10
12 Entrytotheexamcentre Registeredcandidatesmustentertheexamcentre30minutespriortothestartofthe exam.anycandidatewhoislatewillbedeniedentrytotheexamcentreandwillnotbe permittedtotaketheexam.theexamfeespaidbysuchacandidatewillbeforfeited. SpecialArrangements Nofoodordrinkispermittedattheexamcentre.Anexceptioncanbemadeincaseof medicalreasonsprovidedtheregisteredcandidateshowsadoctor scertificatetothis effect. Whattocarryintotheexamcentre Suitable pencils, eraser, sharpener, a printout of your Admission Pass and a valid Governmentissuedphoto(identitycard. WhatNOTtocarryintotheexamcentre Anyreferencematerials,paper,books,calculator,cell(phone,laptop,tablet,etc.Donot carryanyfoodordrinksunlessyouhaveadoctor scertificateprovingtheneedforit. Malpracticeorcheating The following activities will constitute malpractice and may result in the candidate beingdebarredfromallfutureexamsaswellasprosecutedunderthelaw: 1. carryinganyreferencematerialintotheexamcentre; 2. attemptingtotaketheexamforanotherperson; 3. usinganyreferencematerial; 4. assistinganothercandidateinattemptingtheexam; 5. usinganycommunicationdevice; 6. leavingorenteringtheexamcentrewithoutauthorizationfromtheexaminer; 7. carryingthequestionbookletoranswersheetsoutsidetheexamcentre; 8. disturbingtheothercandidatesduringtheexamination; B16.Fees Ff Particulars Fee One(timePermanentRegistrationFee 1,000 ExamFees(Forstudentspursuinggraduation) 4,500 ExamFees(Forothers) 10,000 Note: 1. Incasearegistrantfailsthecertificationexam,he/shewillberequiredtopay50%of thecurrentexamfeesforsubsequentattempts. 2. Nofeerefundswillbemadetoanyregistrant. 3. On registering for a certification, the registrant shall be provided the list of recommendedreferencematerial. 4. Nocontactlecturesorclassesshallbeprovided. 11
13 B17.ExamDuration Thecertificationexamhasalengthof3hours. B18.PassingScore Topass,acandidatemustobtainaminimumof70%ineachofthesectionsoftheexam. B19.Dates Examdate Sunday19 th January,2014 Sunday20 th April,2014 Sunday20 th July,2014 Sunday19 th October,2014 Registrationcloseson 19 th December, th March, th June, th September,2014 B20.OverviewofExaminationSyllabus Thisexaminationisdividedintothefollowingsections: 1. PerformingTheForensicProcess 2. FileForensics 3. OperatingSystemsForensics 4. NetworkForensics 5. ApplicationForensics 6. InternetForensics 7. MobileForensics 8. PracticalForensics 9. Legal&DocumentationIssues B21.DetailedExaminationSyllabus 1. PERFORMINGTHEFORENSICPROCESS 1.1 DataCollection,Examination,Analysis&Reporting 1.2 BestPractices&InternationalStandards SWGDEModelStandardOperationProceduresforComputerForensics ENFSIGuidelinesforBestPracticeintheForensicExaminationofDigitalTechnology CIGIEQualityStandardsforDigitalForensics GoodPracticeGuideforComputer(BasedElectronicEvidencebyAssociationofChief PoliceOfficers(ACPO),UK BestPracticesForSeizingElectronicEvidencebytheUnitedStatesSecretService InvestigationsInvolvingtheInternetandComputerNetworksbytheUSDepartment ofjustice CyberCrimeInvestigationManualbyAsianSchoolofCyberLaws ISO/IEC27037:2012[Informationtechnology(Securitytechniques(Guidelinesfor identification,collection,acquisitionandpreservationofdigitalevidence] 12
14 1.2.9 InternationalStandardISO/TR15801:2009(Documentmanagement(Information storedelectronically(recommendationsfortrustworthinessandreliability ISO/IECTR18044:2004Informationtechnology(Securitytechniques(Information securityincidentmanagement RelevantNISTRecommendations&Guidelines 2. FILEFORENSICS 2.1 FileBasics FileStorageMedia Filesystems(FAT16,FAT32,NTFS,HPFS,ext2fs,ext3fs,ReiserFS,HFS,HFSPlus,UFS, CDFS,UDF,ISO9660,Joliet OtherDataonMedia(DeletedFiles,SlackSpace,FreeSpace,AlternateDataStreams 2.2 CollectingFiles CopyingFilesfromMedia LogicalBackup,BitstreamImaging DataFileIntegrity writeblocker,hash,messagedigest FileModification,Access,andCreationTimes,Metadata TechnicalIssues wiping,demagnetizing,hiddendata 2.3 ExaminingFiles LocatingtheFiles hexeditors,slackrecoverytools ExtractingtheData fileheaders,filesignatures,encryption(symmetric,asymmetric Cryptography,Fileencryption,Diskencryption,Fulldiskencryption),SSL, encryption),steganography,digitalwatermarks,keyloggers,passwords UsingaForensicToolkit fileviewers,uncompressingfiles,graphicallydisplaying directorystructures,identifyingknownfiles,performingstringsearchesandpattern matches,accessingfilemetadata Analysis 3. OPERATINGSYSTEMSFORENSICS 3.1 OSBasics Non(VolatileData Configurationfiles(usersandgroups,passwordfiles,scheduled jobs),logs(systemevents,auditrecords,applicationevents,commandhistory,recently accessedfiles),applicationfiles,datafiles,swapfiles,dumpfiles,hibernationfiles, Temporaryfiles,InterruptRequestLine,Hotkeys VolatileData Slackspace,Freespace,Networkconfiguration(NICdrivers,IP addresses,virtualprivatenetworks),networkconnections,runningprocesses,open files,loginsession,operatingsystemtime 3.2 CollectingOSData CollectingVolatileOSData(Contentsofmemory,Networkconfiguration,Network connections,runningprocesses,openfiles,loginsessions,operatingsystemtime CollectingNon(VolatileOSData Usersandgroups,Passwords,Networkshares,Logs TechnicalIssueswithCollectingData OSaccess(biometricbasedauthentication, autorunfeature),logmodification,harddriveswithflashmemory,keyremapping,os data 3.3 ExaminingandAnalyzingOSData 13
15 3.4 WindowsForensics WindowsDisks,FilesandPartitions WindowsBootSequence ForensicIssues(Recyclebinforensics,hiberfil.sys,logsfiles,pagingfiles,thumbs.db files,registryanalysis 3.5 LinuxForensics Linuxdisks,partitionsandthefilesystem TheLinuxbootsequence Linuxcommands ForensicIssues(Includedforensictools,Determiningthestructureofthedisk, Creatingaforensicimageofthesuspectdisk,Mountingarestoredimage,Mounting theimageusingtheloopbackdevice,filehash,makingalistofallfiles,makingalistof filetypes,viewingfiles,searchingunallocatedandslackspacefortext,handlinglarge disks,preparingadiskforthesuspectimage,obtainingdiskinformation,dd,splitting filesandimages,compressiononthefly,datacarving,carvingpartitions,determining thesubjectdiskfilesystemstructure 3.6 MacForensics Filesystems,operatingsystems,datafiles Bootprocess Technologies(Bonjour,FileVault,Spotlight,DiskArbitration,Activate/Deactivate DiskArbitration,TargetDiskMode,TargetDiskModeProcedure ForensicIssues ImagingatargetMacintosh,Diskstructure,FilevaultandMacOSX security,diskutility&dmgfiles,spotlight,userhomedirectorystructure,user LibraryFolder,Applications,.MacandRelatedEvidence,iChat,andInstantMessaging Applications,MacOSXLogFiles,MacOSX plist Files,SleepandSafeSleep,Apple BootKeyCombos 4. NETWORKFORENSICS 4.1 TCP/IPBasics ApplicationLayer DNS,HTTP,SMTP,FTP,SNMP TransportLayer TCP,UDP,packetsandpayload,DHCP, InternetProtocolLayer ICMP,IGMP,IPv6,ESP HardwareLayer Ethernet,Routersandfirewalls,EtherTypevalue SignificanceofTCP/IPlayersinNetworkForensics 4.2 NetworkTrafficDataSources FirewallsandRouters Privateaddresses,Publicaddresses,Proxies,NAT,VPN PacketSniffersandProtocolAnalyzers(Promiscuousmode,Capturefiles IntrusionDetectionSystems NetworkIDs,HostIDs,IDSsensors,Bufferoverflow RemoteAccess RemoteAccessServers,VPNGateways,Modemservers,Packet filtering SecurityEventManagementSoftware NetworkForensicAnalysisTools OtherSources DHCPservers,Networkmonitoringsoftware,ISPrecords,client/ serverapplications,hosts networkconfigurationsandconnections 4.3 CollectingNetworkTrafficData LegalConsiderations TechnicalIssues Datastorage,Encryptedtraffic(IPSEC,SSH,SSL),Servicesrunning onunexpectedports,alternateaccesspoints,monitoringfailures 14
16 4.4 ExaminingandAnalyzingNetworkTrafficData IdentifyinganEventofInterest ExaminingDataSources DataSourceValue(IDSsignatures,IDSsoftware,SEMsoftware,NFATsoftware (trafficreconstructionandvisualization),firewalls,routers,proxyservers&remote accessservers,dhcpservers,packetsniffers,networkmonitoring,isprecords. Examination&AnalysisTools blindsearch,covertchannels,visualizationtools DrawingConclusions AttackerIdentification spoofedipaddresses,manysourceipaddresses,validityofip address(anonymizers),whois,dnsrecords,tracking&tracing s,analyzing serverlogs, 5. APPLICATIONFORENSICS 5.1 ApplicationComponents Configurationsettings Configurationfile,run7timeoptions,batchfiles,addedto sourcecode Authentication Externalauthentication,Proprietaryauthentication,Pass7through authentication,host/userenvironment Logs Event,Audit,Error,Installation,Debugging Data Genericdataformats,Proprietarydataformats,Databases,Temporaryfiles, Datafiletemplates,Sampledatafiles,Documents SupportingFiles Documentation,Links,Graphics ApplicationArchitecture Local,Client/server,Peer7to7peer 5.2 TypesofApplications E(mail POP3,IMAP WebUsage InteractiveCommunications Groupchat(InternetRelayChat),InstantMessaging Applications,AudioandVideo(VOIP,H.323,SessionInitiationProtocol) FileSharing Client/server(NFS,AFP,SMB,SFTP),Peer7to7peer DocumentUsage Wordprocessors,Spreadsheet,Presentation,PersonalDatabase software SecurityApplications DataConcealmentTools Systemclean7uptools 5.3 CollectingApplicationData Filesystems,VolatileOSdata,Networktraffic 5.4 ExaminingandAnalyzingApplicationData 6. INTERNETFORENSICS 6.1 FacebookForensics FacebookProtocolFormat ForensicsonCommonFacebookActivities FacebookForensicsinVirtualEnvironment FacebookForensicsinMobileDevices 6.2 BrowserForensics InternetExplorerForensics FirefoxForensics ChromeForensics 15
17 6.2.4 SafariForensics OperaForensics 6.3 ForensicsWebServices 7. MOBILEFORENSICS 7.1 ipad&iphoneforensics 7.2 BlackberryForensics 7.3 AndroidForensics 7.4 WindowsMobileForensics 7.5 SymbianForensics 8. PRACTICALFORENSICS 8.1 SoftwareToolsforForensics CloudForensics(InternetEvidenceFinder DeletedFileRecovery Autopsy,BelkasoftEvidenceCenter,ILooKIX,P2Commander, TheSleuthKit,X7WaysForensics DiskImaging(ParabenForensicReplicator,ILookIXimager,MacQuisition,X7Ways Forensics,X7WaysImager Parsing(Aid4Mail,BelkasoftEvidenceCenter,BlackLight,ParabenE7mail Examiner,InternetEvidenceFinder,ParabenNetworkE7mailExaminer GraphicalForensics(LiveView HashAnalysis(Autopsy,MareswareHash InstantMessenger BlackLight,InternetEvidenceFinder MediaSanitization/DriveRe(use(X7WaysForensics/WinHex MemoryCaptureandAnalysis(BelkasoftLiveRAMCapturer,MacMemoryReader, WindowsMemoryReader,ILookIXimager,InternetEvidenceFinder,MacQuisition MobileDeviceAcquisitionandAnalysis(ElcomsoftBlackberryBackupExplorer, ElcomsoftiOSForensicToolkit,Lantern3,iXam,SIMiFOR,XAMN,XRY P2PAnalysis(BelkasoftEvidenceCenter,eMuleReader,InternetEvidenceFinder,P2P Marshal SocialMedia(BelkasoftFacebookProfileSaver,InternetEvidenceFinder SoftwareWriteBlock(SAFEBlockVista/2008,SAFEBlockWin7/2008R2,SAFEBlock XP/2003,SoftBlock Steganalysis(SteganographyAnalyzerArtifactScanner(StegAlyzerAS), SteganographyAnalyzerFieldScanner(StegAlyzerFS),SteganographyAnalyzerReal7 TimeScanner(StegAlyzerRTS),SteganographyAnalyzerSignatureScanner (StegAlyzerSS) StringSearch(Autopsy,BlackLight,dtSearch,X7WaysForensics WebBrowserForensics(BlackLight,InternetEvidenceFinder WindowsRegistryAnalysis(BlackLight,RegistryRecon 8.2 PasswordBreaking Passwareproductline Elcomsoftproductline 9. LEGAL&DOCUMENTATIONISSUES 9.1 InformationTechnologyAct 9.2 IndianPenalCode 16
18 9.3 CodeofCriminalProcedure 9.4 IndianEvidenceAct 9.5 DocumentationIssues FirstInformationReport,PropertySearch&SeizureForm,Final Form/Report,Relevantchecklists,Relevantreports 17
19 C.TheIFS/GFSUContinuousEducationProgram The IFS(GFSU Continuous Education Program (CEP) is designed to keep your expertise and skillsupdated.youarerequiredtoobtain120ceus(continuingeducationunits)every3years tomaintainyourgfsucertification. Youarerequiredtosubmitdocumentaryevidenceevery3yearsofCEUsearnedbyyou.Enclose administrativefeeofrs2,000plustaxesalongwiththedocumentaryevidenceofceus. # Activity 1 Teaching,training orinstructingina relevantfield 2 Deliveringan Industry Presentationina relevantfield 3 Participationina GFSUapproved IndustryEvent, Seminar,Workshop orconference CEUsearned 3CEUsperhourofactual teaching,trainingor instructing 3CEUsperhourofactual presentation 1CEUforeachhour spentinarelevant session 4 WorkExperience 1CEUforeachmonthina relevantprofile 5 Publishingofa relevant professionalarticle, WhitePaperor Book 6 Activemembership ofagfsuapproved relevantcommittee /Board/Chapter/ Association 4CEUsperarticleor whitepaper; 20CEUsperpublished book 0.25CEUforeachmonth ofmembership Documentary Evidence to be submitted 1.Descriptionofcontent covered 2.Deliverydate(s) 3.Numberofattendees 1.Descriptionofcontent covered 2.Deliverydate(s) 3.Numberofattendees 4.Copyofpresentation 1.Thetypeofactivityattended (event,seminar,workshopor conference) 2.Descriptionoftheactivity 3.DateofActivity 4.Proofofcompletionprovided byactivityhost(where applicable) Followingdetailsonemployer letterhead: 1.Currentjobtitle 2.Briefdescriptionofwork profile 3.Durationinthisjob(startand enddates) 4.Confirmationbyemployer thatthecandidateismeeting theexpectations 5.Signatureofthecandidates supervisor Descriptionofthecontent covered Linktoorcopyofthepublished work 1.Committee/Board/Chapter /Associationdetails 2.Proofofmembership 3.Timeframeofactive membership Maximum CEUs in a 3 yearperiod 42CEUs 42CEUs 42CEUs 36CEUs 42CEUs 9CEUs 18
20 D.AboutGFSU ThiscertificationisprovidedbyInstituteof ForensicScience,GujaratForensicSciences University(GFSU). GFSU is established by the Government of Gujarat, under the flagship of the Home Department(GovernmentofGujarat. The GFSU is a highly specialized higher education institution that came into existencethroughanact:no.17,passedby the Gujarat State Legislative Assembly, datedthe30thofseptember2008. The University runs in parallel association with the Directorate of Forensic Science (DFS) ( Gujarat State, to provide hands(on training. DFS ( Gujarat State is a state(of(the(art; NABL accredited; ISO(IEC 17025:2005 certified laboratory, maintaining international standards in terms of infrastructure and facilities for Computer Forensics, Narco(analysis and Polygraph Examination, Brain Electrical Oscillation SignatureProfiling. ItalsohasSuspectDetectionSystem(SDS), Audio Video Tape Authentication System, VoiceSpectrograph,SpeechLab,Integrated Ballistics Identification System, Computerized Petroleum Testing Facilities, FullyAutomatedAlcoholEstimationSystem (GC(HS)FT(Raman,LC(MS,GC(MS,FT(IRfor Narcotic/Explosive/Poisons Analysis, ComputerizedPhotographicImageAnalysis System, Video Spectral Comparator for Document Examination, Accredited Cow( meat testing mobile laboratories, Accredited Mobile Investigation Vans, Ballistics Data Acquisition System (Computerizedfiringrange)andAutomated FingerprintIdentificationSystem. GFSU is the only university across the world, dedicated to Forensic & InvestigativeScience. TheGFSUhasanultramoderncampus,near the DFS premises, on a government allocatedlandof50,000squaremeters. The University is headed by its Director General Dr. J. M. Vyas (M.Sc., Ph.D., LL.B.). Dr.MohinderSinghDahiya(M.Sc.,Ph.D.)is the Director for the Institute of Forensic Science, Gujarat Forensic Sciences University. Shri Mehul K. Dave is the first Registrar of the Gujarat Forensic Sciences University. Theuniversityhasbeengrantedrecognition by the University Grants Commission wide its letter no. F.9(7/2011 (CPP(I/PU) dated 16 th May
21 E.ApplicationFormforPermanent RegistrationNumberforIFS/GFSU CertificationPrograms To, Director, InstituteofForensicScience, GujaratForensicSciencesUniversity, Gandhinagar I am desirous of appearing for IFS(GFSU (Institute of Forensic Science, Gujarat Forensic Sciences University) certifications and therefore request for allotment of Permanent Registration Number. My personalinformationisasunder: Pleasepasteyourrecent A. NAME First Middle Last B. DATEOFBIRTH C.OCCUPATION DayMonthYear D. GENDER FemaleMale E. ADDRESSFORCOMMUNICATION Apartment/HouseNumber&theNameoftheBuilding Street/Road/Boulevard Town/City State Country PINCode/ZIP Address passportsizecolour photographinthisbox. DONOTSTAPLE (Incaseyouareastudent,mentiondetailssuchas College,course,yearetc.) Cell/Mobilenumber Phonenumber(withISD/STDcode) 20
22 F.FEEDETAILS BankDraftnumber Dated forrs.1,000(non(refundable) BankName Branch Favoring:"TheRegistrar,GujaratForensicSciencesUniversity PayableatGandhinagar,Gujarat G.ADDITIONALQUALIFICATIONS(IFANY) H.DOCUMENTS Pleaseencloseself$signedphotocopiesofthefollowingdocuments: 1.Proofofidentity:(anyone) Drivinglicense Passport PANCard CollegeIDcard 2.Proofofeducationalqualification(anyone) Marksheet Degree Other(plspecify) I.ADDITIONALINFORMATION HaveyoueverbeenconvictedofacognizableoffenceoraCourtMartialinmilitaryservice? Ifyes,providedetails. Haveyoueverhadaprofessionallicense,certification,membershiporregistrationrevoked? Ifyes,providedetails. The Application Form, duly completed, is submitted along with the relevant fee and supporting documents. All the information provided is true to the best of my knowledge and belief. Please acknowledgereceiptofthesameandconfirmmyregistration. Regards, (Applicant ssignature) Date 21
23 UNDERTAKING 1. IFS(GFSUmay,atitssolediscretion,makeinquiryofpersonsordocumentsdirectlyorindirectly referenced in this application to verify the accuracy and completeness of the information provided by me. I agree to cooperate in any such investigation by IFS(GFSU regarding the informationihaveprovided. 2. I understand that my non(cooperation in such investigation or my providing any information thatisfraudulent,misleadingorfalsemayresultintherefusalofifs(gfsutoissueacredential tome.itmayalsoleadtomybeingbarredfromeverholdingaifs(gfsucredential. 3. IundertaketoinformIFS(GFSU,withoutdelay,ofmattersthatcanaffectmycapabilitytofulfil the certification requirements. I shall comply with the relevant provisions of the certification scheme. 4. Iundertakenottoreleaseconfidentialexaminationmaterialsorparticipateinfraudulenttest( takingpractices. 5. Iagreetocomplywiththecertificationrequirementsandtosupplyanyinformationneededfor theassessment. 6. In the event of suspension of my certification, I shall refrain from further promotion of the certificationwhileitissuspended.intheeventofwithdrawalofmycertification,ishallrefrain fromuseofallreferencestoacertifiedstatus. 7. Ishallmakeclaimsregardingcertificationonlywithrespecttothescopeforwhichcertification hasbeengranted. 8. IshallnotusethecertificationinsuchamannerastobringIFS(GFSUintodisrepute,andshallnot to make any statement regarding the certification, which IFS(GFSU considers misleading or unauthorized. 9. IshalldiscontinuetheuseofallclaimstocertificationthatcontainanyreferencetoIFS(GFSUor certificationuponsuspensionorwithdrawalofcertification,andtoreturnanycertificatesissued byifs(gfsu. 10. Ishallnotusethecertificateinamisleadingmanner. 11. I understand that any action arising out of any application, examination, certification, etc. conductedbyifs(gfsuissubjecttothecourtsofgandhinagar,gujarat,india. Ihavereadandunderstoodthestatementsaboveandagreetobelegallyboundbythem. Regards, (Signature) Date Submitthefilled$inapplicationform,bankdraftanddocumentsto: Dr.MSDahiya, Director,InstituteofForensicScience, GujaratForensicSciencesUniversity, DFSHeadQuarters,Sector18(A NearPoliceBhavan,Gandhinagar( Gujarat(India Phone:(079)
INSTITUTE OF FORENSIC SCIENCE GUJARAT FORENSIC SCIENCES UNIVERSITY ONLINE CERTIFICATE DIPLOMA IN CYBER SECURITY
INSTITUTE OF FORENSIC SCIENCE GUJARAT FORENSIC SCIENCES UNIVERSITY ONLINE CERTIFICATE DIPLOMA IN CYBER SECURITY CS OnlineCertificateDiplomain CyberSecurity DATESFOR2013>14BATCHES Batch:CS>1 Starts:1 st
INSTITUTE OF FORENSIC SCIENCE GUJARAT FORENSIC SCIENCES UNIVERSITY ONLINE CERTIFICATE DIPLOMA IN COMPUTER FORENSICS
INSTITUTE OF FORENSIC SCIENCE GUJARAT FORENSIC SCIENCES UNIVERSITY ONLINE CERTIFICATE DIPLOMA IN COMPUTER FORENSICS CF OnlineCertificateDiplomain ComputerForensics DATESFOR2013=14BATCHES Batch:CF=1 Starts:1
INSTITUTE OF FORENSIC SCIENCE GUJARAT FORENSIC SCIENCES UNIVERSITY ONLINE CERTIFICATE DIPLOMA IN CYBER CRIME INVESTIGATION CCI
INSTITUTE OF FORENSIC SCIENCE GUJARAT FORENSIC SCIENCES UNIVERSITY ONLINE CERTIFICATE DIPLOMA IN CYBER CRIME INVESTIGATION CCI OnlineCertificateDiplomain CyberCrimeInvestigation DATESFOR2013A14BATCHES
INSTITUTE OF FORENSIC SCIENCE GUJARAT FORENSIC SCIENCES UNIVERSITY IFS-GFSU CERTIFIED INFORMATION SECURITY PROFESSIONAL ISP
INSTITUTE OF FORENSIC SCIENCE GUJARAT FORENSIC SCIENCES UNIVERSITY IFS-GFSU CERTIFIED INFORMATION SECURITY PROFESSIONAL ISP IFS$GFSUCertification#14001 InformationSecurityProfessional An#objective#of#the#Indian#National#Cyber#Security#Policy#
South Australia Police POSITION INFORMATION DOCUMENT
South Australia Police POSITION INFORMATION DOCUMENT Stream : Administrative Services Career Group : Financial Related Discipline : Financial Services Classification : ASO-7 Service : Crime Service Position
South Australia Police POSITION INFORMATION DOCUMENT
South Australia Police POSITION INFORMATION DOCUMENT Stream : Administrative Services Career Group : Financial Related Discipline : Financial Services Classification : ASO-6 Service : Crime Service Position
EC-Council Ethical Hacking and Countermeasures
EC-Council Ethical Hacking and Countermeasures Description This class will immerse the students into an interactive environment where they will be shown how to scan, test, hack and secure their own systems.
Industry Oriented Training and Capacity Building Program on Cyber Crimes, Ethical hacking, Cyber Security, Forensics and Cyber Laws
Industry Oriented Training and Capacity Building Program on Cyber Crimes, Ethical hacking, Cyber Security, Forensics and Cyber Laws IEEE Gujarat Section In association with CLS- Cyberra Legal Services
EXAM PREPARATION GUIDE
EXAM PREPARATION GUIDE PECB Certified ISO/IEC 27001 Lead Auditor The objective of the Certified ISO/IEC 27001 Lead Auditor examination is to ensure that the candidate has the knowledge and the skills to
Managing Cyber Risk through Insurance
Managing Cyber Risk through Insurance Eric Lowenstein Aon Risk Solutions This presentation has been prepared for the Actuaries Institute 2015 ASTIN and AFIR/ERM Colloquium. The Institute Council wishes
NSW Government Digital Information Security Policy
NSW Government Digital Information Security Policy Version: 2.0 Date: April 2015 CONTENTS PART 1 PRELIMINARY... 3 1.1 Scope... 3 1.2 Application... 3 1.3 Objectives... 3 PART 2 POLICY STATEMENT... 4 Core
Chapter 7 Securing Information Systems
1 Chapter 7 Securing Information Systems LEARNING TRACK 3: COMPUTER FORENSICS For thirty years, a serial murderer known as the BTK killer (standing for bind, torture, and kill) remained at large in Wichita,
Nettitude Ltd. (FHEQ) level 7] MSc Postgraduate Diploma Postgraduate Certificate. British Computer Society (BCS) Master s Degree in Computing
Faculty of Engineering and Informatics Programme Specification Programme title: MSc Cyber Security Academic Year: 2015/16 Degree Awarding Body: Partner(s), delivery organisation or support provider (if
Certified Cyber Security Analyst VS-1160
VS-1160 Certified Cyber Security Analyst Certification Code VS-1160 Vskills certification for Cyber Security Analyst assesses the candidate as per the company s need for cyber security and forensics. The
Legal Framework to Combat Cyber Crimes in the Region: Qatar as a Model. Judge Dr. Ehab Elsonbaty Cyber Crime expert ehabelsonbaty@hotmail.
Legal Framework to Combat Cyber Crimes in the Region: Qatar as a Model Judge Dr. Ehab Elsonbaty Cyber Crime expert [email protected] Why should we care about CYBER CRIME & CYBER SECURITY? Clarification
FINAL May 2005. Guideline on Security Systems for Safeguarding Customer Information
FINAL May 2005 Guideline on Security Systems for Safeguarding Customer Information Table of Contents 1 Introduction 1 1.1 Purpose of Guideline 1 2 Definitions 2 3 Internal Controls and Procedures 2 3.1
Document Reference APMG 15/015
Information technology service management Requirements for bodies providing audit and certification of IT service management systems under the APMG Certification Scheme Document Reference APMG 15/015 Introduction
Scientific Working Group on Digital Evidence (SWGDE)
Scientific Working Group on Digital Evidence (SWGDE) Position on the National Research Council Report to Congress Strengthening Forensic Science in the United States: A Path Forward In the National Research
Voluntary Certification Scheme for Traditional Health Practitioner
ANNEX-3 Voluntary Certification Scheme for Traditional Health Practitioner 0. Introduction 0.1 This document defines the criteria to be followed by the bodies certifying persons against specific requirements,
INDUSTRIAL VISIT (DIRECTORATE OF FORENSIC SCIENCE AND BISAG, GANDHINAGAR) REPORT
INDUSTRIAL VISIT (DIRECTORATE OF FORENSIC SCIENCE AND BISAG, GANDHINAGAR) REPORT Class: 5 th Information Technology Engineering Date : 12-10-11 Contact Person Name (DFS): Mr. R.M.Gunna (Deputy Registrar)
CHECKLIST ISO/IEC 17021:2011 Conformity Assessment Requirements for Bodies Providing Audit and Certification of Management Systems
Date(s) of Evaluation: CHECKLIST ISO/IEC 17021:2011 Conformity Assessment Requirements for Bodies Providing Audit and Certification of Management Systems Assessor(s) & Observer(s): Organization: Area/Field
Law Enforcement Analyst Certification Standards
DEPARTMENT OF JUSTICE Global Justice Information Sharing Initiative United States Department of Justice Law Enforcement Analyst Certification Standards Based on the Law Enforcement Analytic Standards About
TEMPLE UNIVERSITY POLICIES AND PROCEDURES MANUAL
TEMPLE UNIVERSITY POLICIES AND PROCEDURES MANUAL Title: Computer and Network Security Policy Policy Number: 04.72.12 Effective Date: November 4, 2003 Issuing Authority: Office of the Vice President for
Cyber Security, Cyber Crimes and Cyber Laws
Continuing Education Programme on Cyber Security, Cyber Crimes and Cyber Laws Name of the Proposer: Anil K. Roy and Manik Lal Das Other Instructors: arranged by CLS, Ahmedabad Course Objectives: Information
Digital Forensics: The aftermath of hacking attacks. AHK Committee Meeting April 19 th, 2015 Eng. Jamal Abdulhaq Logos Networking FZ LLC
Digital Forensics: The aftermath of hacking attacks AHK Committee Meeting April 19 th, 2015 Eng. Jamal Abdulhaq Logos Networking FZ LLC Topics Digital Forensics: Brief introduction Case Studies Case I:
BDO NORDIC. Investigation, fraud prevention and computer forensics. You can guess. You can assume. Or you can know. And knowing is always better.
BDO NORDIC Investigation, fraud prevention and computer forensics You can guess. You can assume. Or you can know. And knowing is always better. CONTENT OUR SERVICES 3 Investigation - Identifying the facts
DIGITAL FORENSICS SPECIALIZATION IN BACHELOR OF SCIENCE IN COMPUTING SCIENCE PROGRAM
DIGITAL FORENSICS SPECIALIZATION IN BACHELOR OF SCIENCE IN COMPUTING SCIENCE PROGRAM Proposed Program Title: Bachelor of Science in Computing Science- Specialization in Digital Forensics Specialization
Westpac Merchant. A guide to meeting the new Payment Card Industry Security Standards
Westpac Merchant A guide to meeting the new Payment Card Industry Security Standards Contents Introduction 01 What is PCIDSS? 02 Why does it concern you? 02 What benefits will you receive from PCIDSS?
Chapter 15. Conducting Investigations and Report Writing
Chapter 15 Conducting Investigations and Report Writing 1 Learning Objectives Understand the circumstances that may necessitate an internal investigation. Identify who should be part of a fraud examination
Computer Hacking Forensic Investigator v8
CÔNG TY CỔ PHẦN TRƯỜNG CNTT TÂN ĐỨC TAN DUC INFORMATION TECHNOLOGY SCHOOL JSC LEARN MORE WITH LESS! Computer Hacking Forensic Investigator v8 Course Description: EC-Council releases the most advanced Computer
Regulations for certification of quality management systems
Regulations for certification of quality management systems 00 24/04/2013 Annulla e sostituisce il documento Regulations for certification of quality management systems in rev. 14 SG DIR AD Rev. Data Descrizione
Professional Ethics for Computer Science. Lecture 2: Ethics for IT Professionals and IT Users
Professional Ethics for Computer Science Lecture 2: Ethics for IT Professionals and IT Users Klaus Mueller Computer Science Department Stony Brook University Objectives What key characteristics distinguish
Whitepaper on AuthShield Two Factor Authentication with ERP Applications
Whitepaper on AuthShield Two Factor Authentication with ERP Applications By INNEFU Labs Pvt. Ltd Table of Contents 1. Overview... 3 2. Threats to account passwords... 4 2.1 Social Engineering or Password
(Instructor-led; 3 Days)
Information Security Manager: Architecture, Planning, and Governance (Instructor-led; 3 Days) Module I. Information Security Governance A. Introduction to Information Security Governance B. Overview of
CISM ITEM DEVELOPMENT GUIDE
CISM ITEM DEVELOPMENT GUIDE TABLE OF CONTENTS CISM ITEM DEVELOPMENT GUIDE Content Page Purpose of the CISM Item Development Guide 2 CISM Exam Structure 2 Item Writing Campaigns 2 Why Participate as a CISM
University of Pennsylvania Handbook for Faculty and Academic Administrators 2015 Version
University of Pennsylvania Handbook for Faculty and Academic Administrators 2015 Version V.D. Closed Circuit Television Monitoring and Recording of Public Areas for Safety and Security Purposes (Source:
Access Control Policy
Version 3.0 This policy maybe updated at anytime (without notice) to ensure changes to the HSE s organisation structure and/or business practices are properly reflected in the policy. Please ensure you
Surveillance Equipment
University of North Dakota Loss Control Committee Standard Practice 240 Surveillance Equipment Effective 12/2005 Revised 10/07 I. Purpose The purpose of this standard practice is to regulate the use of
Industry Oriented Training and Capacity Building Program on Cyber Crimes, Cyber Security, Forensics and Cyber Laws
Industry Oriented Training and Capacity Building Program on Cyber Crimes, Cyber Security, Forensics and Cyber Laws IEEE Gujarat Section In association with CLS- Cyberra Legal Services announces Training
Newcastle University Information Security Procedures Version 3
Newcastle University Information Security Procedures Version 3 A Information Security Procedures 2 B Business Continuity 3 C Compliance 4 D Outsourcing and Third Party Access 5 E Personnel 6 F Operations
Third Party Security Requirements Policy
Overview This policy sets out the requirements expected of third parties to effectively protect BBC information. Audience Owner Contacts This policy applies to all third parties and staff, including contractors,
e-discovery Forensics Incident Response
e-discovery Forensics Incident Response NetSecurity Corporation 21351 Gentry Drive Suite 230 Dulles, VA 20166 VA DCJS # 11-5605 Phone: 703.444.9009 Toll Free: 1.866.664.6986 Web: www.netsecurity.com Email:
CONTENT. King Hussein Faculty of Computing Sciences
CONTENT About Mission, Vision & Goals Computing Sciences Faculty Computing Sciences Resources Bachelors Degree Programs B. Sc. Program in Computer Science B. Sc. Program in Software Engineering B. Sc.
Certified Cyber Security Analyst VS-1160
VS-1160 Certified Cyber Security Analyst Certification Code VS-1160 Vskills certification for Cyber Security Analyst assesses the candidate as per the company s need for cyber security and forensics. The
Cyber Security and Information Assurance Controls Prevention and Reaction NOVEMBER 2013
Cyber Security and Information Assurance Controls Prevention and Reaction 1 About Enterprise Risk Management Capabilities Cyber Security Risk Management Information Assurance Strategic Governance Regulatory
Accounting and Auditing Careers, Jobs, Training and Employment Information
www.careersinghana.com Email : [email protected] Tel: +233 245649846 Accounting and Auditing Careers, Jobs, Training and Employment Information Accounting Career Overview A bachelor's degree is the
Faculty of Economic and Management Sciences
Faculty of Economic and Management Sciences The Unit for Forensic Accounting In The Department of Auditing POSTGRADUATE DIPLOMA IN INVESTIGATIVE AND FORENSIC ACCOUNTING (Web-supported) This programme will
MIT s Information Security Program for Protecting Personal Information Requiring Notification. (Revision date: 2/26/10)
MIT s Information Security Program for Protecting Personal Information Requiring Notification (Revision date: 2/26/10) Table of Contents 1. Program Summary... 3 2. Definitions... 4 2.1 Identity Theft...
MEDICAL UNIVERSITY OF SOUTH CAROLINA DEPARTMENT OF PUBLIC SAFETY
MEDICAL UNIVERSITY OF SOUTH CAROLINA DEPARTMENT OF PUBLIC SAFETY SUBJECT: Training EFFECTIVE DATE: 1 January 1999 PAGE 1 OF 14 REVIEW DATE: 30 November 2015 APPROVED: CHANGE DATE: 20 May 2013 THE POLICIES
Information Security Management System Policy
Information Security Management System Policy Public Version 3.3 Issued Document Name Owner P079A ISMS Security Policy Information Security Security Policies, Standards and Procedures emanate from the
Monitoring and Logging Policy. Document Status. Security Classification. Level 1 - PUBLIC. Version 1.0. Approval. Review By June 2012
Monitoring and Logging Policy Document Status Security Classification Version 1.0 Level 1 - PUBLIC Status DRAFT Approval Life 3 Years Review By June 2012 Owner Secure Research Database Analyst Change History
Masters in Applied Cyber Security Upskilling Existing Employees
Masters in Applied Cyber Security Upskilling Existing Employees Origination The Masters in Applied Cyber Security (MACS) emerged from discussions at the Steering Group of ICT Ireland Skillnet where companies
Information, Network & Cyber Security
School COMSC Information, Network & Cyber Security Information security officers are faced with strategic decisions on a daily basis, and are required to make informed decisions on the security options
National Home Inspector Certification Council. Policy & Procedures Manual
National Home Inspector Certification Council Policy & Procedures Manual INTRODUCTION The National Home Inspector Certification Council (NHICC) accreditation is an objective and reliable verification.
Information Security Management System Information Security Policy
Management System Policy Version: 3.4 Issued Document Name: Owner: P079A - ISMS Security Policy Classification: Public Security Policies, Standards and Procedures emanate from the Policy which has been
EXAMINATION INFORMATION FOR PROSPECTIVE TEXAS CPA APPLICANTS
EXAMINATION INFORMATION FOR PROSPECTIVE TEXAS CPA APPLICANTS This brochure contains current information relative to applying for the Uniform CPA Examination under the jurisdiction of the Texas State Board
10- Assume you open your credit card bill and see several large unauthorized charges unfortunately you may have been the victim of (identity theft)
1- A (firewall) is a computer program that permits a user on the internal network to access the internet but severely restricts transmissions from the outside 2- A (system failure) is the prolonged malfunction
Information Technology Audit & Forensic Techniques. CMA Amit Kumar
Information Technology Audit & Forensic Techniques CMA Amit Kumar 1 Amit Kumar & Co. (Cost Accountants) A perfect blend of Tax, Audit & Advisory services Information Technology Audit & Forensic Techniques
CERTIFIED PUBLIC ACCOUNTANT (CPA)
CERTIFIED PUBLIC ACCOUNTANT (CPA) Certified Public Accountant (CPA) is the highest accounting qualification in the United States of America. One has to pass the Uniform CPA Examination conducted by the
Contact: Henry Torres, (870) 972-3033
Information & Technology Services Management & Security Principles & Procedures Executive Summary Contact: Henry Torres, (870) 972-3033 Background: The Security Task Force began a review of all procedures
The FBI and the Internet
The FBI and the Internet Special Agent Robert Flaim Federal Bureau of Investigation Presentation Goals To give you a better understanding of: The FBI Cyber Division, its priorities, and its mission The
Faculty of Economic and Management Sciences
Faculty of Economic and Management Sciences The Unit for Forensic Accounting In The Department of Auditing MPHIL FRAUD RISK MANAGEMENT (Web-supported) Managing the risks of fraud in organisations Fraud
State of West Virginia Office of Technology Policy: Information Security Audit Program Issued by the CTO
Policy: Information Security Audit Program Issued by the CTO Policy No: WVOT-PO1008 Issue Date: 08.01.09 Revised: Page 1 of 12 1.0 PURPOSE The West Virginia Office of Technology (WVOT) will maintain an
SAFE HARBOR PRIVACY NOTICE EFFECTIVE: July 1, 2005 AMENDED: July 15, 2014
SAFE HARBOR PRIVACY NOTICE EFFECTIVE: July 1, 2005 AMENDED: July 15, 2014 This Notice sets forth the principles followed by United Technologies Corporation and its operating companies, subsidiaries, divisions
Information Security Program CHARTER
State of Louisiana Information Security Program CHARTER Date Published: 12, 09, 2015 Contents Executive Sponsors... 3 Program Owner... 3 Introduction... 4 Statewide Information Security Strategy... 4 Information
Information Security Basic Concepts
Information Security Basic Concepts 1 What is security in general Security is about protecting assets from damage or harm Focuses on all types of assets Example: your body, possessions, the environment,
micros MICROS Systems, Inc. Enterprise Information Security Policy (MEIP) August, 2013 Revision 8.0 MICROS Systems, Inc. Version 8.
micros MICROS Systems, Inc. Enterprise Information Security Policy (MEIP) Revision 8.0 August, 2013 1 Table of Contents Overview /Standards: I. Information Security Policy/Standards Preface...5 I.1 Purpose....5
Certified Information Systems Auditor (CISA)
Certified Information Systems Auditor (CISA) Course Introduction Course Introduction Module 01 - The Process of Auditing Information Systems Lesson 1: Management of the Audit Function Organization of the
http://www.bls.gov/oco/ocos001.htm Accountants and Auditors
http://www.bls.gov/oco/ocos001.htm Accountants and Auditors * Nature of the Work * Training, Other Qualifications, and Advancement * Employment * Job Outlook * Projections Data * Earnings * OES Data *
Information Security Specialist Training on the Basis of ISO/IEC 27002
Information Security Specialist Training on the Basis of ISO/IEC 27002 Natalia Miloslavskaya, Alexander Tolstoy Moscow Engineering Physics Institute (State University), Russia, {milmur, ait}@mephi.edu
https://agency.governmentjobs.com/dakota/job_bulletin.cfm?jobid=1017820
Page 1 of 5 DAKOTA COUNTY Employee Relations Administration Center, 1590 Highway 55 Hastings, MN 55033-2372 651.438.4435 http://www.dakotacounty.us INVITES APPLICATIONS FOR THE POSITION OF: Electronic
Bellevue University Cybersecurity Programs & Courses
Undergraduate Course List Core Courses: CYBR 250 Introduction to Cyber Threats, Technologies and Security CIS 311 Network Security CIS 312 Securing Access Control CIS 411 Assessments and Audits CYBR 320
COMMUNITY ASSOCIATIONS INSTITUTE PROFESSIONAL MANAGER CODE OF ETHICS
The Manager Shall: COMMUNITY ASSOCIATIONS INSTITUTE PROFESSIONAL MANAGER CODE OF ETHICS 1. Comply with current bylaws, standards and practices as may be established from time to time by CAI subject to
Sensitive Incident Investigations. Digital Risk Management. Forensics Testing.
Sensitive Incident Investigations. Digital Risk Management. Forensics Testing. 2009 Innovation Award Winner Austin Chamber of Commerce 2010 Innovation Award Finalist Austin Chamber of Commerce Only private
information security and its Describe what drives the need for information security.
Computer Information Systems (Forensics Classes) Objectives for Course Challenges CIS 200 Intro to Info Security: Includes managerial and Describe information security and its critical role in business.
Domain 1 The Process of Auditing Information Systems
Certified Information Systems Auditor (CISA ) Certification Course Description Our 5-day ISACA Certified Information Systems Auditor (CISA) training course equips information professionals with the knowledge
How To Get A Computer Hacking Program
CHFI v8(computer Hacking Forensics Investigator) Course Description & Overview Overview CHFIv8 Course Description EC-Council releases the brand new Version 8 of the Computer Hacking Forensics Investigator
CERTIFICATION Through
CERTIFICATION Through PORTFOLIO general handbook ANCC CErTIFICATIoN general TESTINg AND renewal handbook 1 EFFECTIVE DATE: August 6, 2013 ANCC 2012. ALL rightsreser VED. CONTENTS ABOUT THIS HANDBOOK...3
Programme Specification: MSc Audit Management and Consultancy
Programme Specification: MSc Audit Management and Consultancy NOTE: This specification provides a concise summary of the main features of the course and the learning outcomes that a typical student might
JOINT EXPLANATORY STATEMENT TO ACCOMPANY THE CYBERSECURITY ACT OF 2015
JOINT EXPLANATORY STATEMENT TO ACCOMPANY THE CYBERSECURITY ACT OF 2015 The following consists of the joint explanatory statement to accompany the Cybersecurity Act of 2015. This joint explanatory statement
Computer Crime & Security Survey
4 th Japan & US Computer Crime & Security Survey Katsuya Uchida Professor, Ph. D. Institute of Information Security [email protected] Graduate School of Information Security 1 Respondents by Number of
Unit 3 Cyber security
2016 Suite Cambridge TECHNICALS LEVEL 3 IT Unit 3 Cyber security Y/507/5001 Guided learning hours: 60 Version 1 September 2015 ocr.org.uk/it LEVEL 3 UNIT 3: Cyber security Y/507/5001 Guided learning hours:
Automated Regional Justice Information System (ARJIS) Acceptable Use Policy for Facial Recognition
Automated Regional Justice Information System (ARJIS) Acceptable Use Policy for Facial Recognition Revised: 02/13/2015 A. STATEMENT OF PURPOSE The purpose of this document is to outline the responsibilities
Gaming System Monitoring and Analysis Effort
for the Gaming System Monitoring and Analysis Effort DHS/S&T/PIA-025 October 11, 2012 Contact Point Douglas Maughan DHS S&T Cyber Security Division 202-254-6145 Reviewing Official Jonathan R. Cantor Acting
Catalyst Consulting & Events (CCE) takes seriously its commitment to preserve the privacy of the personal information that we collect.
PRIVACY POLICY 1. Introduction Catalyst Consulting & Events (CCE) takes seriously its commitment to preserve the privacy of the personal information that we collect. We will only collect information that
Service Schedule for CLOUD SERVICES
Service Schedule for CLOUD SERVICES This Service Schedule is effective for Cloud Services provided on or after 1 September 2013. Terms and Conditions applicable to Cloud Services provided prior to this
How To Defend Yourself Against Cyber Attacks
Overview of Cyber Security: Our daily life, economic vitality, and national security depend on a stable, safe, and resilient cyberspace. We rely on this vast array of networks to communicate and travel,
CERTIFIED SECURITY PROJECT MANAGER
YOUR PASSPORT TO SUCCESS, RECOGNITION AND EXCELLENCE... CERTIFIED SECURITY PROJECT MANAGER www.securitylearningnetwork.com What is CSPM? The Certified Security Project Manager (CSPM) Program promotes the
How to Protect Intellectual Property While Offshore Outsourcing?
WHITE PAPER [Type text] How to Protect Intellectual Property While Offshore Outsourcing? In an era of increasing data theft, it is important for organizations to ensure that the Intellectual Property related
IAC 7/2/08 Nursing Board[655] Ch 2, p.1. CHAPTER 2 NURSING EDUCATION PROGRAMS [Prior to 8/26/87, Nursing Board[590] Ch 2]
IAC 7/2/08 Nursing Board[655] Ch 2, p.1 CHAPTER 2 NURSING EDUCATION PROGRAMS [Prior to 8/26/87, Nursing Board[590] Ch 2] 655 2.1(152) Definitions. Approval means recognition status given to nursing education
IT General Controls Domain COBIT Domain Control Objective Control Activity Test Plan Test of Controls Results
Acquire or develop application systems software Controls provide reasonable assurance that application and system software is acquired or developed that effectively supports financial reporting requirements.
Cyber Warfare. Global Economic Crime Survey. Causes of Cyber Attacks. David Childers, CEO Compli Vivek Krishnamurthy, Foley Hoag LLP. Why Cybercrime?
Cyber Warfare David Childers, CEO Compli Vivek Krishnamurthy, Foley Hoag LLP Global Economic Crime Survey Cyber crime is the fastest growing economic crime up more than 2300% since 2009 1 in 10 companies
Franchise Data Compromise Trends and Cardholder. December, 2010
Franchise Data Compromise Trends and Cardholder Security Best Practices December, 2010 Franchise Data Security Agenda Cardholder Data Compromise Overview Breach Commonalities Hacking Techniques Franchisee
