INSTITUTE OF FORENSIC SCIENCE GUJARAT FORENSIC SCIENCES UNIVERSITY IFS-GFSU CERTIFIED ELECTRONIC EVIDENCE EXAMINER EEE

Size: px
Start display at page:

Download "INSTITUTE OF FORENSIC SCIENCE GUJARAT FORENSIC SCIENCES UNIVERSITY IFS-GFSU CERTIFIED ELECTRONIC EVIDENCE EXAMINER EEE"

Transcription

1 INSTITUTE OF FORENSIC SCIENCE GUJARAT FORENSIC SCIENCES UNIVERSITY IFS-GFSU CERTIFIED ELECTRONIC EVIDENCE EXAMINER EEE

2 IFS$GFSUCertification#18001 ElectronicEvidenceExaminer AnIFS(GFSUCertifiedElectronicEvidenceExaminer isequippedwithspecializedknowledgeandskillsin collecting,examining,analyzingandreportingof electronicevidenceandcybertrails. DATESFOR2014EXAMS The exam for the IFS(GFSU Certification #18001ElectronicEvidenceExaminerwill be conductedonthefollowingdatesin2014: Sunday19 th January,2014 Sunday20 th April,2014 Sunday20 th July,2014 Sunday19 th October,2014 Registration for the exam closes 30 days priortotheexamdate. SUMMARYOFEXAMINFORMATION ExamDuration:3hours PassingMarks:70% One(timeregistrationfees:Rs1,000 ExamFees:Rs4,500forstudents ExamFees:Rs10,000forothers ABOUTIFS$GFSU This certification is provided by Institute of Forensic Science, Gujarat Forensic Sciences University (IFS(GFSU). The Government of Gujarat, under the flagship of the Home Department of the Government of Gujarat, has established GFSU. GFSU is the only university across the world, dedicated to Forensic&InvestigativeScience. ABOUTTHISDOCUMENT Thisdocumentisissuedinpursuanceofthe IFS(GFSUCertificationPolicy. This document is issued as a guide to candidates pursuing an IFS(GFSU certification. IFS(GFSU does not make any representationsorwarrantiesthattheuseof this document will assure candidates of passinganyifs(gfsucertification. 2013InstituteofForensicScience,Gujarat Forensic Sciences University. All rights reserved. GujaratForensicSciencesUniversity DFSHeadQuarters,Sector18(A, NearPoliceBhavan, Gandhinagar(382007, Gujarat(India 1

3 QuickGuidetoEarning&maintainingyourIFS$GFSUcertification ObtainPRN Applyfor Exam Preparefor Exam Passthe exam Earnthe certiaication EarnCEUs Obtainyourone(timePermanentRegistrationNumber. 1 2 Applyfortheexamination. PreparefortheexambystudyingthereferencematerialcomprisingtheIFS(GFSU 3 CommonBodyofKnowledgeforElectronicEvidenceExamination(CBOK(EEE). 4 Appearforthecertificationexamandobtain70%ineachsection. 5 Earnyourcertification.EarntherighttouseEEE.GetupgradedtoEEE+after6years. 6 Earn120ContinuingEducationUnits(CEUs)every3yearsandsubmitproofofthesame. 2

4 TableofContents A.BenefitsofIFS$GFSUCertifications...4 A1.Benefitstoindividuals...4 A2.Benefitstoorganizations...5 B.AbouttheCertification...6 B1.AboutElectronicEvidenceExamination...6 B2.Requiredcompetence...6 B3.Abilities...6 B4.Prerequisites...6 B5.CodeofProfessionalEthics...7 B6.Criteriaforinitialcertification...7 B7.Criteriaforrenewalofcertification...7 B8.Groundsforsuspendingandwithdrawingcertification...7 B9.ExamOverview...8 B10.Developmentoftheexam...8 B11.SubjectMatterExperts...8 B12.Typeofquestions...10 B13.PreparationfortheExam...10 B14.CommonBodyofKnowledgeforElectronicEvidenceExamination(CBOKEEE)...10 B15.AdministrationoftheExam...10 AdmissionPass...10 Entrytotheexamcentre...11 SpecialArrangements...11 Whattocarryintotheexamcentre...11 WhatNOTtocarryintotheexamcentre...11 Malpracticeorcheating...11 B16.Fees...11 B17.ExamDuration...12 B18.PassingScore...12 B19.Dates...12 B20.OverviewofExaminationSyllabus...12 B21.DetailedExaminationSyllabus...12 C.TheIFS$GFSUContinuousEducationProgram...18 D.AboutGFSU...19 E.ApplicationFormforPermanentRegistrationNumberforIFS$GFSU CertificationPrograms

5 A.BenefitsofIFS/GFSUCertifications A1.Benefitstoindividuals Achieveahigherposition,raise,and promotionfaster 1 Becomemoreemployable 2 Affirmyourprofessionalexpertise 3 Increasejobsecurity Demonstratethatyoupossess essentialdomainknowledge Boostrelevancebystayingcurrent intheprofessionwithcontinuing educationrequirements. Advanceyourcareerpotentialdue torecognitionasacertified professional Recognitionofprofessional competencebyprofessionalpeers andmanagement Increaseyourvalueandincome Keepupwithever(changing standardsandtechnologies Validateyourknowledge Differentiateyourselffromyour peers Boostyourconfidence 1Salary surveys show that the majority of hiring managers consider certifications a factor in hiring decisions, and that obtaining relevant certifications oftenleadstoasalaryincrease. 2According to an IDC white paper, "63% of hiring managers believe certified individuals are more productivethantheirnon(certifiedcounterparts." 3Your employer, clients, employees and peers will recognizeyourgfsucredentialasanindicationofthe skills and knowledge you ve gained through certification. Showthatyouknowthemost currentprinciplesandpracticesof yourfield Personalsatisfactionof accomplishingamilestoneinyour career Standoutagainstotherapplicantsin atoughjobmarket. Getpreparedforgreateron(the(job responsibilities Potentiallyearnhigherincomefor beingformallyrecognizedasa certifiedprofessional DemonstrateYourCommitment Buildandenhanceyourcredibility Build&ShowcaseYourSkills Becomemoremarketablewhenyou competefortoppositions Raiseyourprestigeamongyour staffandyourpeers Improveoverallperformance, removeuncertaintyandwiden marketopportunities Ensureyouarecontinually improvingandrefiningyour activities Becomepartofaprofessional network Enjoybettercareerflexibility Berecognizedasbeing knowledgeableandskilled Openthedoorsofopportunity; enhanceyourcareer 4

6 A2.Benefitstoorganizations Benchmark With GFSU certifications, your organization will have a benchmark to compensate, measure and evaluate employees skills for roles within the organization. GFSU certifications also provide a recognized benchmark of skills that can be aligned to organisationalskillsframeworks. Consistency WithGFSUcertifications,yourteamsaretrainedtoconsistentskilllevels. Staffmotivation The regular assessment process will improve staff responsibility, commitment and motivationandensurecompetentemployees. IncreasedProductivity GFSU certified professionals are typically more productive and work to consistent standards. Assurance GFSUcertificationsassurethatthecertifiedprofessionalhastheknowledgeandskills neededtoperformtheallottedtasks. Performance$relatedpay GainingGFSUcertificationscanbealignedtoperformance(relatedpay. Customersatisfaction GFSU certifications can ensure greater customer satisfaction (internal and external customers). Employeesatisfaction GFSU certifications provide professional development, advancement and recognition opportunitiesforstaff.thiscanalsoleadtolowerstaffturnover. Higherquality GFSUcertificationsleadtomorereliable,higherqualityresultsproducedwithincreased efficiencyandconsistencybyprofessionalswhouseindustrystandardtechniques. Cultureoflearning GFSU certifications empower a culture of learning and improvement that increases returnoninvestment. Increasedcredibility GFSU certifications demonstrate to customers, competitors, suppliers, staff and investorsthatyouuseindustry(standardpractices. Stakeholdersatisfaction GFSU certifications demonstrate to your stakeholders that your business is run effectively. 5

7 B.AbouttheCertification B1.AboutElectronicEvidenceExamination An Electronic Evidence Examiner (EEE) is skilled in collecting, examining, analyzing and reportingofelectronicevidenceandcybertrails.morespecifically,aneee: 1. Performsforensicanalysisofdigitalinformationusingstandardcomputerforensics& evidencehandlingtechniques. 2. Uses forensically sound procedures to identify network computer intrusion evidence andidentifiesperpetrators. 3. Employsforensictoolsandtechniquestoidentifyandexaminemaliciousfiles. 4. Employsforensictoolsandtechniquestocrackfileandsystempasswords. 5. Detects steganography and recovers deleted, fragmented and corrupted data from digitalmediaofalltypes. 6. Observesproperevidencecustodyandcontrolprocedures. 7. Documents procedures and findings in a manner suitable for courtroom presentation andpreparescomprehensivewrittennotesandreports. Thiselectronicevidencemaybefoundincomputers,laptops,servers,cellphones,tablets,pen drives,digitalcameras,cds,dvds,computernetworks,theinternetetc. Electronic evidence can be hidden in pictures (steganography), encrypted files, password protectedfiles,deletedfiles,formattedharddisks,deleted s,chattranscriptsetc. Electronicevidencecanrelatetoonlinebankingfrauds,onlinesharetradingfraud,sourcecode theft, credit card fraud, tax evasion, virus attacks, cyber sabotage, phishing attacks, hijacking, denial of service, hacking, divorce cases, murder cases, organized crime, terrorist operations,defamation,pornography,extortion,smugglingetc. B2.Requiredcompetence Toearnthiscertification,candidatesmusttakethecertificationexamandobtainaminimumof 70%marks. B3.Abilities Candidate svision,hearing,mobilityandotherabilitiesmustbesuchthatwouldpermithimto workefficientlyinelectronicevidenceexaminationinanorganizationalenvironment. B4.Prerequisites ThecandidatemustbeagraduateinanystreamfromarecognizedUniversity. 6

8 B5.CodeofProfessionalEthics AllIFS(GFSUcertifiedprofessionalsshould: 1. Encourageimplementationofmeasuresforcontrolofcorporatecrime. 2. Performdutiestothebestoftheirknowledge,skillsandcapabilities. 3. Maintainhighstandardsofmoralcharacter. 4. Preserve the privacy and confidentiality of information obtained in the course of professionalassignments,subjecttoregulatoryrequirements. 5. Ensurecompliancewithregulatoryandlegalframework. Failure to comply with this Code of Professional Ethics may result in suspension and subsequentwithdrawalofcertification. B6.Criteriaforinitialcertification 1. Demonstrating mastery of IFS(GFSU Common Body of Knowledge for Electronic Evidence Examination by successfully taking the certification exam with a score of at least70%. 2. Being a graduate in any stream from a recognized University. Students pursuing graduationmayappearforthecertificationexamandonsuccessfullypassingtheexam willbeissuedaprovisionalcertificate.suchapplicantswillbecertifiedonsubmitting proofofgraduation. 3. AcceptingtheIFS(GFSUCodeofProfessionalEthics. B7.Criteriaforrenewalofcertification 1. Earn120CEUs(ContinuingEducationUnits)every3years. 2. SubmitdocumentaryevidenceinrespectofCEUsearned. 3. SubmitadministrativefeeofRs.2,000plusapplicabletaxes(every3years). 4. CompliancewithIFS(GFSUCodeofProfessionalEthics. B8.Groundsforsuspendingandwithdrawingcertification The Certification Management Committee, Institute of Forensic Science, Gujarat Forensic Sciences University (IFS(GFSU) may suspend and withdraw a certification for any of the followingreasons: 1. ViolationofthetermsofanyundertakingmadetoIFS(GFSU. 2. FailuretoobtaintherequiredCEUs(ContinuingEducationUnits)every3years. 3. Failuretosubmitdocumentaryevidenceevery3yearsofCEUsearnedalongwiththe applicableadministrativefee. 4. ViolatinganyprovisionoftheIFS(GFSUCodeofProfessionalEthics. 5. ProvidinganyfalseinformationtoIFS(GFSU. 7

9 B9.ExamOverview TheElectronicEvidenceExaminer(EEE)certificationfromInstituteofForensicScience,Gujarat ForensicSciencesUniversity(IFS(GFSU)provesspecialistlevelexpertiseinelectronicevidence examination. B10.Developmentoftheexam The Certification Management Committee of IFS(GFSU is responsible for operational policies and procedures, implementation of the policies and procedures, resources for certification activities (personnel, outsourcing, premises, including examination sites, equipment and resources for carrying out certification activities), assessment activities, decisions on certification,includingthegranting,maintaining,recertifying,expanding,reducing,suspending or withdrawing of the certification, contractual arrangements. The Certification Development Committee of IFS(GFSU is responsible for development and maintenance of the certification schemes.subjectmatterexpertscomeunderthecertificationdevelopmentcommittee. B11.SubjectMatterExperts Subject Matter Experts for certification programs conducted by Institute of Forensic Science, GujaratForensicSciencesUniversityadviseinthedevelopmentandreviewofthecertification scheme 4. The Subject Matter Experts for IFS7GFSU Certification #18001 Electronic Evidence Examinerare(inalphabeticalorder): DebasisNayak,DirectorAsianSchoolofCyberLaws DebasisNayakisDirectorandco(founderofAsianSchoolofCyberLaws.Heisalsothemanaging partner, Techjuris Law Consultants. He has also been involved in the activity of framing draft rules and regulations under the Information Technology Act, 2000 for the Department of InformationTechnology,GovernmentofIndia. He is a visiting faculty on cyber law and cyber crime investigation at the National Police Academy,Hyderabad.HehastaughtcyberlawatnumerouseducationalinstitutionsacrossIndia. He has trained various law enforcement agencies in cyber crime investigation including personnelfromgovernmentsofmalaysiaandmauritius.hisotherareasofinterestincludethe legalregimeregulatingonlinegaming,copyrightissuesrelatingtosoftware,implementationof publickeyinfrastructureandcyberforensics.heisaconsultanttocorporateorganizations,law enforcementagenciesandgovernmentsontheseissues. JimmyMate,AssistantManager,EY With over 7 years of experience in Forensic Technology, he currently holds the position of Assistant Manager with a Big4. His expertise covers Digital Forensic Data Analysis, Computer Forensics,FraudInvestigationsalongwithevaluatingdesign&operatingefficienciesofinternal controlsattheentity&processlevelandidentifyingareasofimprovement&costsavings. He has addressed various sectors like Cement Manufacturing, Apparels & Footwear, Pharmaceutical, Information Technology, Automotive, Micro Finance, Consumer Electronic manufacturing,media&entertainment,hospitality,business&technologyservices,insurance 4Thisincludescriteriaforinitialcertificationandrecertification;curriculumforcertificationexaminationsandtests; assessment methods for initial certification and recertification; surveillance methods and criteria (if applicable); criteria for suspending and withdrawing certification; criteria for changing the scope or level of certification (if applicable);submittingquestionsforinclusioninthecertificationexaminationsandtests(optional). 8

10 andsteelmanufacturing.hehasalsoworkedondesigning&executionoftrainingmodulesinthe areaofforensictechnologyforgovernmentorganizations&corporates. RVittalRajFCA,CISA,CGEIT,CISM,CRISC,CISSP,CIA,CFE Hehas25+yearsofexperienceindirecting,managingprojectsinInformationSecurity,ISAudit, ITGovernance. RamGopalSoni,AssociateVP$SecurityConsulting,ControlCaseInternationalPvt.Ltd. Ram Gopal Soni is an Information Security Graduate with strong cognition and industry experienceininformationsecurityimplementation,assessment,auditandinformationsecurity Management. He is working as QSA / Associate VP ( Security Consulting with ControlCase International Pvt. Ltd and is currently focused on Information Security Compliance Audit and Certification including PCI(DSS, PA(DSS and Computer Forensics, Fraud Investigation and Risk Assessment. He is also involved in execution and management of Technical Risk Assessment includingapplicationsecurity,penetrationtestingandbusinessdevelopmentactivities. RavindranathPatil,AssociateDirector,RiskConsulting,KPMG He is a former IPS officer having over 9 years of experience in cyber and fraud investigation pertaining to industries such as Infrastructure, Liquor, FMCG, Telecommunication, IT, Engineering Goods, Automobile and Micro Finance. He has worked as an Assistant Director GeneralofForeignTrade,MinistryofCommerce,GovernmentofIndia.Heisavisitingfacultyon cybercrimeinvestigationatnationalpoliceacademy,nationalacademyofdirecttaxesandthe Centre for Police Research. He is a research fellow of Centre for Police Research on Mobile Technology. SethuSRaman,VicePresident&ChiefRiskOfficer,MphasiSanHPCompany SethuSRamanisanex(defenceofficerpresentlyworkingastheChiefRiskOfficerwithanMNC IT services company. He is a senior risk management professional with a strong academic background(mba,bal[law],crma,cpp,cbcp,cisa,cissp)and21yearsofversatileexperience inmanagingriskinits manifoldmanifestation especiallyinbankinganditindustries. S.P.Srivastava,formerDirectorGeneralofUPPoliceandformerJointDirectorofCentralBureau ofinvestigation(cbi) Shri S. P. Srivastava is a retired Director General of Police, Uttar Pradesh and former Joint Director(Delhi,Mumbai),CentralBureauofInvestigation(CBI).Duringhisillustriouscareerin the Indian Police Service, he has held the following posts: Director General, U.P. Police Head Quarters, JointDirector(Delhi,Mumbai),CentralBureauof Investigation, Govt. of India, Crime Branch, U.P., Criminal Investigation Department / Intelligence Department, Chief Security Commissioner(NER,CR),IndianRailways,JointManager(Vigilance)/RegionalManager,Food CorporationofIndia,SuperintendentofPolice,StateVigilanceEstablishment. He has developed an IT tool for investigation of disproportionate asset cases enabling law enforcementagenciestolaunchsuccessfulprosecutionagainstcorruptaccusedpersons.hehas alsodevelopedanin(housetoolforscientificallocationofbudgettofieldunitsenablingoptimal utilizationandmaximumyield(uppolicehasannualbudgetaryoutlayofapprox.6000croresand approximately2lakhpolicepersonnel). WhileworkinginCBI,NewDelhi,hehelpedsolveahighprofileandsensitivemurdercasewith thehelpofscientifictoolsandutmostregardtohumanrights.accusedpersonswerefoundguilty by the trial court and severe punishment awarded, making it a landmark investigation. While workingincbi,mumbaialargeamountofblackmoney(oneofthelargest)wasunearthedfroma seniorgovernmentofficial,whichbecamealandmarkhaulofhardcashstashedinthehouse. 9

11 HehasbeenengagedactivelyindevelopmentofITtoolstocombatcybercrimeandanintegrated application for holistic police functioning. His educational qualifications include B.Sc. (Physics, Chemistry Mathematics), BCA, M.Sc. Physics (Electronics). He is a published author and has writtenmanyarticlesoncontemporarytopicsincludingcorruptioninnationaldailynewspapers. SzabolcsHallai,CISO,CISA,CISM,CITRM,C CISO Szabolcssprimarygoalasanauditorand/orconsultantistoreconciletheeverlastingdilemma of an IT/ITSEC being a business based function inside of a non(it core business entity. By becoming a skilled expert of both worlds ( business and information technology he tries to discovercontrolandsystemerrorsandtohelpthemcorrectthebestpossibleway.workingasa team player he never lost his individual skills. Experienced in governmental / multinational / equity / financials / banking environments, multitasking, with high communication skills on senior level and with end(users. Specialities: Expertise on the field of IT Auditing, QA and Consultancy,RiskManagement,PolicyCompliance,ISO27001/17799/BS7799,ITIL,COBIT,AML, MiFID,GeneralInternalAudit,Duediligence,ITSecurity,Legislationcompliance,ITgovernance B12.Typeofquestions TheexaminationwillconsistprimarilyofCaseStudyBased(Problem(Based)questions.These questions consist of a practical problem followed by several options. Candidates must apply theirknowledgeandskillstochoosethemostappropriateoption.ifs(gfsucertificationsuse thistypeofquestionsastheyallowcandidatestodemonstratetheirpracticalunderstandingof thetopicratherthanrequiringthemtomemoriseinformation.suchquestionsfocusontestinga candidate s skill development, require thinking and do not focus on purely theoretical knowledge. B13.PreparationfortheExam CaseStudyBased(Problem(Based)questionsrequirecandidatestostudythereferencematerial thoroughly and ensure understanding of how the information can be applied in real(life practical situations. On registering for the certification exam, you will be provided comprehensivereferencematerialandtheifs(gfsuguidetothecommonbodyofknowledge forelectronicevidenceexamination(cbok(eee)inelectronicform. B14.CommonBodyofKnowledgeforElectronicEvidenceExamination(CBOK/EEE) The IFS(GFSU Common Body of Knowledge for Electronic Evidence Examination (CBOK(EEE) establishesabaselineforthebodyofknowledgeforelectronicevidenceexamination.cbok( EEE is a comprehensive description of the sum of knowledge and professional practices and techniquesthataregenerallyacceptedwithintheelectronicevidenceexaminationprofession. CBOKEEE is not static and will be constantly evolving as the field of Electronic Evidence Examinationdevelops. B15.AdministrationoftheExam AdmissionPass Approximatelyoneweekpriortotheexamdate,registeredcandidateswillbe ed an electronic Admission Pass containing the date, time and exact venue of the examination.youmustcarryaprintoutofthisadmissionpassalongwithagovernment issuedphoto(identitycard(e.g.pancard,driverslicense,passport,etc.). 10

12 Entrytotheexamcentre Registeredcandidatesmustentertheexamcentre30minutespriortothestartofthe exam.anycandidatewhoislatewillbedeniedentrytotheexamcentreandwillnotbe permittedtotaketheexam.theexamfeespaidbysuchacandidatewillbeforfeited. SpecialArrangements Nofoodordrinkispermittedattheexamcentre.Anexceptioncanbemadeincaseof medicalreasonsprovidedtheregisteredcandidateshowsadoctor scertificatetothis effect. Whattocarryintotheexamcentre Suitable pencils, eraser, sharpener, a printout of your Admission Pass and a valid Governmentissuedphoto(identitycard. WhatNOTtocarryintotheexamcentre Anyreferencematerials,paper,books,calculator,cell(phone,laptop,tablet,etc.Donot carryanyfoodordrinksunlessyouhaveadoctor scertificateprovingtheneedforit. Malpracticeorcheating The following activities will constitute malpractice and may result in the candidate beingdebarredfromallfutureexamsaswellasprosecutedunderthelaw: 1. carryinganyreferencematerialintotheexamcentre; 2. attemptingtotaketheexamforanotherperson; 3. usinganyreferencematerial; 4. assistinganothercandidateinattemptingtheexam; 5. usinganycommunicationdevice; 6. leavingorenteringtheexamcentrewithoutauthorizationfromtheexaminer; 7. carryingthequestionbookletoranswersheetsoutsidetheexamcentre; 8. disturbingtheothercandidatesduringtheexamination; B16.Fees Ff Particulars Fee One(timePermanentRegistrationFee 1,000 ExamFees(Forstudentspursuinggraduation) 4,500 ExamFees(Forothers) 10,000 Note: 1. Incasearegistrantfailsthecertificationexam,he/shewillberequiredtopay50%of thecurrentexamfeesforsubsequentattempts. 2. Nofeerefundswillbemadetoanyregistrant. 3. On registering for a certification, the registrant shall be provided the list of recommendedreferencematerial. 4. Nocontactlecturesorclassesshallbeprovided. 11

13 B17.ExamDuration Thecertificationexamhasalengthof3hours. B18.PassingScore Topass,acandidatemustobtainaminimumof70%ineachofthesectionsoftheexam. B19.Dates Examdate Sunday19 th January,2014 Sunday20 th April,2014 Sunday20 th July,2014 Sunday19 th October,2014 Registrationcloseson 19 th December, th March, th June, th September,2014 B20.OverviewofExaminationSyllabus Thisexaminationisdividedintothefollowingsections: 1. PerformingTheForensicProcess 2. FileForensics 3. OperatingSystemsForensics 4. NetworkForensics 5. ApplicationForensics 6. InternetForensics 7. MobileForensics 8. PracticalForensics 9. Legal&DocumentationIssues B21.DetailedExaminationSyllabus 1. PERFORMINGTHEFORENSICPROCESS 1.1 DataCollection,Examination,Analysis&Reporting 1.2 BestPractices&InternationalStandards SWGDEModelStandardOperationProceduresforComputerForensics ENFSIGuidelinesforBestPracticeintheForensicExaminationofDigitalTechnology CIGIEQualityStandardsforDigitalForensics GoodPracticeGuideforComputer(BasedElectronicEvidencebyAssociationofChief PoliceOfficers(ACPO),UK BestPracticesForSeizingElectronicEvidencebytheUnitedStatesSecretService InvestigationsInvolvingtheInternetandComputerNetworksbytheUSDepartment ofjustice CyberCrimeInvestigationManualbyAsianSchoolofCyberLaws ISO/IEC27037:2012[Informationtechnology(Securitytechniques(Guidelinesfor identification,collection,acquisitionandpreservationofdigitalevidence] 12

14 1.2.9 InternationalStandardISO/TR15801:2009(Documentmanagement(Information storedelectronically(recommendationsfortrustworthinessandreliability ISO/IECTR18044:2004Informationtechnology(Securitytechniques(Information securityincidentmanagement RelevantNISTRecommendations&Guidelines 2. FILEFORENSICS 2.1 FileBasics FileStorageMedia Filesystems(FAT16,FAT32,NTFS,HPFS,ext2fs,ext3fs,ReiserFS,HFS,HFSPlus,UFS, CDFS,UDF,ISO9660,Joliet OtherDataonMedia(DeletedFiles,SlackSpace,FreeSpace,AlternateDataStreams 2.2 CollectingFiles CopyingFilesfromMedia LogicalBackup,BitstreamImaging DataFileIntegrity writeblocker,hash,messagedigest FileModification,Access,andCreationTimes,Metadata TechnicalIssues wiping,demagnetizing,hiddendata 2.3 ExaminingFiles LocatingtheFiles hexeditors,slackrecoverytools ExtractingtheData fileheaders,filesignatures,encryption(symmetric,asymmetric Cryptography,Fileencryption,Diskencryption,Fulldiskencryption),SSL, encryption),steganography,digitalwatermarks,keyloggers,passwords UsingaForensicToolkit fileviewers,uncompressingfiles,graphicallydisplaying directorystructures,identifyingknownfiles,performingstringsearchesandpattern matches,accessingfilemetadata Analysis 3. OPERATINGSYSTEMSFORENSICS 3.1 OSBasics Non(VolatileData Configurationfiles(usersandgroups,passwordfiles,scheduled jobs),logs(systemevents,auditrecords,applicationevents,commandhistory,recently accessedfiles),applicationfiles,datafiles,swapfiles,dumpfiles,hibernationfiles, Temporaryfiles,InterruptRequestLine,Hotkeys VolatileData Slackspace,Freespace,Networkconfiguration(NICdrivers,IP addresses,virtualprivatenetworks),networkconnections,runningprocesses,open files,loginsession,operatingsystemtime 3.2 CollectingOSData CollectingVolatileOSData(Contentsofmemory,Networkconfiguration,Network connections,runningprocesses,openfiles,loginsessions,operatingsystemtime CollectingNon(VolatileOSData Usersandgroups,Passwords,Networkshares,Logs TechnicalIssueswithCollectingData OSaccess(biometricbasedauthentication, autorunfeature),logmodification,harddriveswithflashmemory,keyremapping,os data 3.3 ExaminingandAnalyzingOSData 13

15 3.4 WindowsForensics WindowsDisks,FilesandPartitions WindowsBootSequence ForensicIssues(Recyclebinforensics,hiberfil.sys,logsfiles,pagingfiles,thumbs.db files,registryanalysis 3.5 LinuxForensics Linuxdisks,partitionsandthefilesystem TheLinuxbootsequence Linuxcommands ForensicIssues(Includedforensictools,Determiningthestructureofthedisk, Creatingaforensicimageofthesuspectdisk,Mountingarestoredimage,Mounting theimageusingtheloopbackdevice,filehash,makingalistofallfiles,makingalistof filetypes,viewingfiles,searchingunallocatedandslackspacefortext,handlinglarge disks,preparingadiskforthesuspectimage,obtainingdiskinformation,dd,splitting filesandimages,compressiononthefly,datacarving,carvingpartitions,determining thesubjectdiskfilesystemstructure 3.6 MacForensics Filesystems,operatingsystems,datafiles Bootprocess Technologies(Bonjour,FileVault,Spotlight,DiskArbitration,Activate/Deactivate DiskArbitration,TargetDiskMode,TargetDiskModeProcedure ForensicIssues ImagingatargetMacintosh,Diskstructure,FilevaultandMacOSX security,diskutility&dmgfiles,spotlight,userhomedirectorystructure,user LibraryFolder,Applications,.MacandRelatedEvidence,iChat,andInstantMessaging Applications,MacOSXLogFiles,MacOSX plist Files,SleepandSafeSleep,Apple BootKeyCombos 4. NETWORKFORENSICS 4.1 TCP/IPBasics ApplicationLayer DNS,HTTP,SMTP,FTP,SNMP TransportLayer TCP,UDP,packetsandpayload,DHCP, InternetProtocolLayer ICMP,IGMP,IPv6,ESP HardwareLayer Ethernet,Routersandfirewalls,EtherTypevalue SignificanceofTCP/IPlayersinNetworkForensics 4.2 NetworkTrafficDataSources FirewallsandRouters Privateaddresses,Publicaddresses,Proxies,NAT,VPN PacketSniffersandProtocolAnalyzers(Promiscuousmode,Capturefiles IntrusionDetectionSystems NetworkIDs,HostIDs,IDSsensors,Bufferoverflow RemoteAccess RemoteAccessServers,VPNGateways,Modemservers,Packet filtering SecurityEventManagementSoftware NetworkForensicAnalysisTools OtherSources DHCPservers,Networkmonitoringsoftware,ISPrecords,client/ serverapplications,hosts networkconfigurationsandconnections 4.3 CollectingNetworkTrafficData LegalConsiderations TechnicalIssues Datastorage,Encryptedtraffic(IPSEC,SSH,SSL),Servicesrunning onunexpectedports,alternateaccesspoints,monitoringfailures 14

16 4.4 ExaminingandAnalyzingNetworkTrafficData IdentifyinganEventofInterest ExaminingDataSources DataSourceValue(IDSsignatures,IDSsoftware,SEMsoftware,NFATsoftware (trafficreconstructionandvisualization),firewalls,routers,proxyservers&remote accessservers,dhcpservers,packetsniffers,networkmonitoring,isprecords. Examination&AnalysisTools blindsearch,covertchannels,visualizationtools DrawingConclusions AttackerIdentification spoofedipaddresses,manysourceipaddresses,validityofip address(anonymizers),whois,dnsrecords,tracking&tracing s,analyzing serverlogs, 5. APPLICATIONFORENSICS 5.1 ApplicationComponents Configurationsettings Configurationfile,run7timeoptions,batchfiles,addedto sourcecode Authentication Externalauthentication,Proprietaryauthentication,Pass7through authentication,host/userenvironment Logs Event,Audit,Error,Installation,Debugging Data Genericdataformats,Proprietarydataformats,Databases,Temporaryfiles, Datafiletemplates,Sampledatafiles,Documents SupportingFiles Documentation,Links,Graphics ApplicationArchitecture Local,Client/server,Peer7to7peer 5.2 TypesofApplications E(mail POP3,IMAP WebUsage InteractiveCommunications Groupchat(InternetRelayChat),InstantMessaging Applications,AudioandVideo(VOIP,H.323,SessionInitiationProtocol) FileSharing Client/server(NFS,AFP,SMB,SFTP),Peer7to7peer DocumentUsage Wordprocessors,Spreadsheet,Presentation,PersonalDatabase software SecurityApplications DataConcealmentTools Systemclean7uptools 5.3 CollectingApplicationData Filesystems,VolatileOSdata,Networktraffic 5.4 ExaminingandAnalyzingApplicationData 6. INTERNETFORENSICS 6.1 FacebookForensics FacebookProtocolFormat ForensicsonCommonFacebookActivities FacebookForensicsinVirtualEnvironment FacebookForensicsinMobileDevices 6.2 BrowserForensics InternetExplorerForensics FirefoxForensics ChromeForensics 15

17 6.2.4 SafariForensics OperaForensics 6.3 ForensicsWebServices 7. MOBILEFORENSICS 7.1 ipad&iphoneforensics 7.2 BlackberryForensics 7.3 AndroidForensics 7.4 WindowsMobileForensics 7.5 SymbianForensics 8. PRACTICALFORENSICS 8.1 SoftwareToolsforForensics CloudForensics(InternetEvidenceFinder DeletedFileRecovery Autopsy,BelkasoftEvidenceCenter,ILooKIX,P2Commander, TheSleuthKit,X7WaysForensics DiskImaging(ParabenForensicReplicator,ILookIXimager,MacQuisition,X7Ways Forensics,X7WaysImager Parsing(Aid4Mail,BelkasoftEvidenceCenter,BlackLight,ParabenE7mail Examiner,InternetEvidenceFinder,ParabenNetworkE7mailExaminer GraphicalForensics(LiveView HashAnalysis(Autopsy,MareswareHash InstantMessenger BlackLight,InternetEvidenceFinder MediaSanitization/DriveRe(use(X7WaysForensics/WinHex MemoryCaptureandAnalysis(BelkasoftLiveRAMCapturer,MacMemoryReader, WindowsMemoryReader,ILookIXimager,InternetEvidenceFinder,MacQuisition MobileDeviceAcquisitionandAnalysis(ElcomsoftBlackberryBackupExplorer, ElcomsoftiOSForensicToolkit,Lantern3,iXam,SIMiFOR,XAMN,XRY P2PAnalysis(BelkasoftEvidenceCenter,eMuleReader,InternetEvidenceFinder,P2P Marshal SocialMedia(BelkasoftFacebookProfileSaver,InternetEvidenceFinder SoftwareWriteBlock(SAFEBlockVista/2008,SAFEBlockWin7/2008R2,SAFEBlock XP/2003,SoftBlock Steganalysis(SteganographyAnalyzerArtifactScanner(StegAlyzerAS), SteganographyAnalyzerFieldScanner(StegAlyzerFS),SteganographyAnalyzerReal7 TimeScanner(StegAlyzerRTS),SteganographyAnalyzerSignatureScanner (StegAlyzerSS) StringSearch(Autopsy,BlackLight,dtSearch,X7WaysForensics WebBrowserForensics(BlackLight,InternetEvidenceFinder WindowsRegistryAnalysis(BlackLight,RegistryRecon 8.2 PasswordBreaking Passwareproductline Elcomsoftproductline 9. LEGAL&DOCUMENTATIONISSUES 9.1 InformationTechnologyAct 9.2 IndianPenalCode 16

18 9.3 CodeofCriminalProcedure 9.4 IndianEvidenceAct 9.5 DocumentationIssues FirstInformationReport,PropertySearch&SeizureForm,Final Form/Report,Relevantchecklists,Relevantreports 17

19 C.TheIFS/GFSUContinuousEducationProgram The IFS(GFSU Continuous Education Program (CEP) is designed to keep your expertise and skillsupdated.youarerequiredtoobtain120ceus(continuingeducationunits)every3years tomaintainyourgfsucertification. Youarerequiredtosubmitdocumentaryevidenceevery3yearsofCEUsearnedbyyou.Enclose administrativefeeofrs2,000plustaxesalongwiththedocumentaryevidenceofceus. # Activity 1 Teaching,training orinstructingina relevantfield 2 Deliveringan Industry Presentationina relevantfield 3 Participationina GFSUapproved IndustryEvent, Seminar,Workshop orconference CEUsearned 3CEUsperhourofactual teaching,trainingor instructing 3CEUsperhourofactual presentation 1CEUforeachhour spentinarelevant session 4 WorkExperience 1CEUforeachmonthina relevantprofile 5 Publishingofa relevant professionalarticle, WhitePaperor Book 6 Activemembership ofagfsuapproved relevantcommittee /Board/Chapter/ Association 4CEUsperarticleor whitepaper; 20CEUsperpublished book 0.25CEUforeachmonth ofmembership Documentary Evidence to be submitted 1.Descriptionofcontent covered 2.Deliverydate(s) 3.Numberofattendees 1.Descriptionofcontent covered 2.Deliverydate(s) 3.Numberofattendees 4.Copyofpresentation 1.Thetypeofactivityattended (event,seminar,workshopor conference) 2.Descriptionoftheactivity 3.DateofActivity 4.Proofofcompletionprovided byactivityhost(where applicable) Followingdetailsonemployer letterhead: 1.Currentjobtitle 2.Briefdescriptionofwork profile 3.Durationinthisjob(startand enddates) 4.Confirmationbyemployer thatthecandidateismeeting theexpectations 5.Signatureofthecandidates supervisor Descriptionofthecontent covered Linktoorcopyofthepublished work 1.Committee/Board/Chapter /Associationdetails 2.Proofofmembership 3.Timeframeofactive membership Maximum CEUs in a 3 yearperiod 42CEUs 42CEUs 42CEUs 36CEUs 42CEUs 9CEUs 18

20 D.AboutGFSU ThiscertificationisprovidedbyInstituteof ForensicScience,GujaratForensicSciences University(GFSU). GFSU is established by the Government of Gujarat, under the flagship of the Home Department(GovernmentofGujarat. The GFSU is a highly specialized higher education institution that came into existencethroughanact:no.17,passedby the Gujarat State Legislative Assembly, datedthe30thofseptember2008. The University runs in parallel association with the Directorate of Forensic Science (DFS) ( Gujarat State, to provide hands(on training. DFS ( Gujarat State is a state(of(the(art; NABL accredited; ISO(IEC 17025:2005 certified laboratory, maintaining international standards in terms of infrastructure and facilities for Computer Forensics, Narco(analysis and Polygraph Examination, Brain Electrical Oscillation SignatureProfiling. ItalsohasSuspectDetectionSystem(SDS), Audio Video Tape Authentication System, VoiceSpectrograph,SpeechLab,Integrated Ballistics Identification System, Computerized Petroleum Testing Facilities, FullyAutomatedAlcoholEstimationSystem (GC(HS)FT(Raman,LC(MS,GC(MS,FT(IRfor Narcotic/Explosive/Poisons Analysis, ComputerizedPhotographicImageAnalysis System, Video Spectral Comparator for Document Examination, Accredited Cow( meat testing mobile laboratories, Accredited Mobile Investigation Vans, Ballistics Data Acquisition System (Computerizedfiringrange)andAutomated FingerprintIdentificationSystem. GFSU is the only university across the world, dedicated to Forensic & InvestigativeScience. TheGFSUhasanultramoderncampus,near the DFS premises, on a government allocatedlandof50,000squaremeters. The University is headed by its Director General Dr. J. M. Vyas (M.Sc., Ph.D., LL.B.). Dr.MohinderSinghDahiya(M.Sc.,Ph.D.)is the Director for the Institute of Forensic Science, Gujarat Forensic Sciences University. Shri Mehul K. Dave is the first Registrar of the Gujarat Forensic Sciences University. Theuniversityhasbeengrantedrecognition by the University Grants Commission wide its letter no. F.9(7/2011 (CPP(I/PU) dated 16 th May

21 E.ApplicationFormforPermanent RegistrationNumberforIFS/GFSU CertificationPrograms To, Director, InstituteofForensicScience, GujaratForensicSciencesUniversity, Gandhinagar I am desirous of appearing for IFS(GFSU (Institute of Forensic Science, Gujarat Forensic Sciences University) certifications and therefore request for allotment of Permanent Registration Number. My personalinformationisasunder: Pleasepasteyourrecent A. NAME First Middle Last B. DATEOFBIRTH C.OCCUPATION DayMonthYear D. GENDER FemaleMale E. ADDRESSFORCOMMUNICATION Apartment/HouseNumber&theNameoftheBuilding Street/Road/Boulevard Town/City State Country PINCode/ZIP Address passportsizecolour photographinthisbox. DONOTSTAPLE (Incaseyouareastudent,mentiondetailssuchas College,course,yearetc.) Cell/Mobilenumber Phonenumber(withISD/STDcode) 20

22 F.FEEDETAILS BankDraftnumber Dated forrs.1,000(non(refundable) BankName Branch Favoring:"TheRegistrar,GujaratForensicSciencesUniversity PayableatGandhinagar,Gujarat G.ADDITIONALQUALIFICATIONS(IFANY) H.DOCUMENTS Pleaseencloseself$signedphotocopiesofthefollowingdocuments: 1.Proofofidentity:(anyone) Drivinglicense Passport PANCard CollegeIDcard 2.Proofofeducationalqualification(anyone) Marksheet Degree Other(plspecify) I.ADDITIONALINFORMATION HaveyoueverbeenconvictedofacognizableoffenceoraCourtMartialinmilitaryservice? Ifyes,providedetails. Haveyoueverhadaprofessionallicense,certification,membershiporregistrationrevoked? Ifyes,providedetails. The Application Form, duly completed, is submitted along with the relevant fee and supporting documents. All the information provided is true to the best of my knowledge and belief. Please acknowledgereceiptofthesameandconfirmmyregistration. Regards, (Applicant ssignature) Date 21

23 UNDERTAKING 1. IFS(GFSUmay,atitssolediscretion,makeinquiryofpersonsordocumentsdirectlyorindirectly referenced in this application to verify the accuracy and completeness of the information provided by me. I agree to cooperate in any such investigation by IFS(GFSU regarding the informationihaveprovided. 2. I understand that my non(cooperation in such investigation or my providing any information thatisfraudulent,misleadingorfalsemayresultintherefusalofifs(gfsutoissueacredential tome.itmayalsoleadtomybeingbarredfromeverholdingaifs(gfsucredential. 3. IundertaketoinformIFS(GFSU,withoutdelay,ofmattersthatcanaffectmycapabilitytofulfil the certification requirements. I shall comply with the relevant provisions of the certification scheme. 4. Iundertakenottoreleaseconfidentialexaminationmaterialsorparticipateinfraudulenttest( takingpractices. 5. Iagreetocomplywiththecertificationrequirementsandtosupplyanyinformationneededfor theassessment. 6. In the event of suspension of my certification, I shall refrain from further promotion of the certificationwhileitissuspended.intheeventofwithdrawalofmycertification,ishallrefrain fromuseofallreferencestoacertifiedstatus. 7. Ishallmakeclaimsregardingcertificationonlywithrespecttothescopeforwhichcertification hasbeengranted. 8. IshallnotusethecertificationinsuchamannerastobringIFS(GFSUintodisrepute,andshallnot to make any statement regarding the certification, which IFS(GFSU considers misleading or unauthorized. 9. IshalldiscontinuetheuseofallclaimstocertificationthatcontainanyreferencetoIFS(GFSUor certificationuponsuspensionorwithdrawalofcertification,andtoreturnanycertificatesissued byifs(gfsu. 10. Ishallnotusethecertificateinamisleadingmanner. 11. I understand that any action arising out of any application, examination, certification, etc. conductedbyifs(gfsuissubjecttothecourtsofgandhinagar,gujarat,india. Ihavereadandunderstoodthestatementsaboveandagreetobelegallyboundbythem. Regards, (Signature) Date Submitthefilled$inapplicationform,bankdraftanddocumentsto: Dr.MSDahiya, Director,InstituteofForensicScience, GujaratForensicSciencesUniversity, DFSHeadQuarters,Sector18(A NearPoliceBhavan,Gandhinagar( Gujarat(India Phone:(079)

INSTITUTE OF FORENSIC SCIENCE GUJARAT FORENSIC SCIENCES UNIVERSITY ONLINE CERTIFICATE DIPLOMA IN CYBER SECURITY

INSTITUTE OF FORENSIC SCIENCE GUJARAT FORENSIC SCIENCES UNIVERSITY ONLINE CERTIFICATE DIPLOMA IN CYBER SECURITY INSTITUTE OF FORENSIC SCIENCE GUJARAT FORENSIC SCIENCES UNIVERSITY ONLINE CERTIFICATE DIPLOMA IN CYBER SECURITY CS OnlineCertificateDiplomain CyberSecurity DATESFOR2013>14BATCHES Batch:CS>1 Starts:1 st

More information

INSTITUTE OF FORENSIC SCIENCE GUJARAT FORENSIC SCIENCES UNIVERSITY ONLINE CERTIFICATE DIPLOMA IN COMPUTER FORENSICS

INSTITUTE OF FORENSIC SCIENCE GUJARAT FORENSIC SCIENCES UNIVERSITY ONLINE CERTIFICATE DIPLOMA IN COMPUTER FORENSICS INSTITUTE OF FORENSIC SCIENCE GUJARAT FORENSIC SCIENCES UNIVERSITY ONLINE CERTIFICATE DIPLOMA IN COMPUTER FORENSICS CF OnlineCertificateDiplomain ComputerForensics DATESFOR2013=14BATCHES Batch:CF=1 Starts:1

More information

INSTITUTE OF FORENSIC SCIENCE GUJARAT FORENSIC SCIENCES UNIVERSITY ONLINE CERTIFICATE DIPLOMA IN CYBER CRIME INVESTIGATION CCI

INSTITUTE OF FORENSIC SCIENCE GUJARAT FORENSIC SCIENCES UNIVERSITY ONLINE CERTIFICATE DIPLOMA IN CYBER CRIME INVESTIGATION CCI INSTITUTE OF FORENSIC SCIENCE GUJARAT FORENSIC SCIENCES UNIVERSITY ONLINE CERTIFICATE DIPLOMA IN CYBER CRIME INVESTIGATION CCI OnlineCertificateDiplomain CyberCrimeInvestigation DATESFOR2013A14BATCHES

More information

INSTITUTE OF FORENSIC SCIENCE GUJARAT FORENSIC SCIENCES UNIVERSITY IFS-GFSU CERTIFIED INFORMATION SECURITY PROFESSIONAL ISP

INSTITUTE OF FORENSIC SCIENCE GUJARAT FORENSIC SCIENCES UNIVERSITY IFS-GFSU CERTIFIED INFORMATION SECURITY PROFESSIONAL ISP INSTITUTE OF FORENSIC SCIENCE GUJARAT FORENSIC SCIENCES UNIVERSITY IFS-GFSU CERTIFIED INFORMATION SECURITY PROFESSIONAL ISP IFS$GFSUCertification#14001 InformationSecurityProfessional An#objective#of#the#Indian#National#Cyber#Security#Policy#

More information

South Australia Police POSITION INFORMATION DOCUMENT

South Australia Police POSITION INFORMATION DOCUMENT South Australia Police POSITION INFORMATION DOCUMENT Stream : Administrative Services Career Group : Financial Related Discipline : Financial Services Classification : ASO-7 Service : Crime Service Position

More information

South Australia Police POSITION INFORMATION DOCUMENT

South Australia Police POSITION INFORMATION DOCUMENT South Australia Police POSITION INFORMATION DOCUMENT Stream : Administrative Services Career Group : Financial Related Discipline : Financial Services Classification : ASO-6 Service : Crime Service Position

More information

EC-Council Ethical Hacking and Countermeasures

EC-Council Ethical Hacking and Countermeasures EC-Council Ethical Hacking and Countermeasures Description This class will immerse the students into an interactive environment where they will be shown how to scan, test, hack and secure their own systems.

More information

Industry Oriented Training and Capacity Building Program on Cyber Crimes, Ethical hacking, Cyber Security, Forensics and Cyber Laws

Industry Oriented Training and Capacity Building Program on Cyber Crimes, Ethical hacking, Cyber Security, Forensics and Cyber Laws Industry Oriented Training and Capacity Building Program on Cyber Crimes, Ethical hacking, Cyber Security, Forensics and Cyber Laws IEEE Gujarat Section In association with CLS- Cyberra Legal Services

More information

EXAM PREPARATION GUIDE

EXAM PREPARATION GUIDE EXAM PREPARATION GUIDE PECB Certified ISO/IEC 27001 Lead Auditor The objective of the Certified ISO/IEC 27001 Lead Auditor examination is to ensure that the candidate has the knowledge and the skills to

More information

Managing Cyber Risk through Insurance

Managing Cyber Risk through Insurance Managing Cyber Risk through Insurance Eric Lowenstein Aon Risk Solutions This presentation has been prepared for the Actuaries Institute 2015 ASTIN and AFIR/ERM Colloquium. The Institute Council wishes

More information

NSW Government Digital Information Security Policy

NSW Government Digital Information Security Policy NSW Government Digital Information Security Policy Version: 2.0 Date: April 2015 CONTENTS PART 1 PRELIMINARY... 3 1.1 Scope... 3 1.2 Application... 3 1.3 Objectives... 3 PART 2 POLICY STATEMENT... 4 Core

More information

Chapter 7 Securing Information Systems

Chapter 7 Securing Information Systems 1 Chapter 7 Securing Information Systems LEARNING TRACK 3: COMPUTER FORENSICS For thirty years, a serial murderer known as the BTK killer (standing for bind, torture, and kill) remained at large in Wichita,

More information

Nettitude Ltd. (FHEQ) level 7] MSc Postgraduate Diploma Postgraduate Certificate. British Computer Society (BCS) Master s Degree in Computing

Nettitude Ltd. (FHEQ) level 7] MSc Postgraduate Diploma Postgraduate Certificate. British Computer Society (BCS) Master s Degree in Computing Faculty of Engineering and Informatics Programme Specification Programme title: MSc Cyber Security Academic Year: 2015/16 Degree Awarding Body: Partner(s), delivery organisation or support provider (if

More information

Certified Cyber Security Analyst VS-1160

Certified Cyber Security Analyst VS-1160 VS-1160 Certified Cyber Security Analyst Certification Code VS-1160 Vskills certification for Cyber Security Analyst assesses the candidate as per the company s need for cyber security and forensics. The

More information

Legal Framework to Combat Cyber Crimes in the Region: Qatar as a Model. Judge Dr. Ehab Elsonbaty Cyber Crime expert ehabelsonbaty@hotmail.

Legal Framework to Combat Cyber Crimes in the Region: Qatar as a Model. Judge Dr. Ehab Elsonbaty Cyber Crime expert ehabelsonbaty@hotmail. Legal Framework to Combat Cyber Crimes in the Region: Qatar as a Model Judge Dr. Ehab Elsonbaty Cyber Crime expert [email protected] Why should we care about CYBER CRIME & CYBER SECURITY? Clarification

More information

FINAL May 2005. Guideline on Security Systems for Safeguarding Customer Information

FINAL May 2005. Guideline on Security Systems for Safeguarding Customer Information FINAL May 2005 Guideline on Security Systems for Safeguarding Customer Information Table of Contents 1 Introduction 1 1.1 Purpose of Guideline 1 2 Definitions 2 3 Internal Controls and Procedures 2 3.1

More information

Document Reference APMG 15/015

Document Reference APMG 15/015 Information technology service management Requirements for bodies providing audit and certification of IT service management systems under the APMG Certification Scheme Document Reference APMG 15/015 Introduction

More information

Scientific Working Group on Digital Evidence (SWGDE)

Scientific Working Group on Digital Evidence (SWGDE) Scientific Working Group on Digital Evidence (SWGDE) Position on the National Research Council Report to Congress Strengthening Forensic Science in the United States: A Path Forward In the National Research

More information

Voluntary Certification Scheme for Traditional Health Practitioner

Voluntary Certification Scheme for Traditional Health Practitioner ANNEX-3 Voluntary Certification Scheme for Traditional Health Practitioner 0. Introduction 0.1 This document defines the criteria to be followed by the bodies certifying persons against specific requirements,

More information

INDUSTRIAL VISIT (DIRECTORATE OF FORENSIC SCIENCE AND BISAG, GANDHINAGAR) REPORT

INDUSTRIAL VISIT (DIRECTORATE OF FORENSIC SCIENCE AND BISAG, GANDHINAGAR) REPORT INDUSTRIAL VISIT (DIRECTORATE OF FORENSIC SCIENCE AND BISAG, GANDHINAGAR) REPORT Class: 5 th Information Technology Engineering Date : 12-10-11 Contact Person Name (DFS): Mr. R.M.Gunna (Deputy Registrar)

More information

CHECKLIST ISO/IEC 17021:2011 Conformity Assessment Requirements for Bodies Providing Audit and Certification of Management Systems

CHECKLIST ISO/IEC 17021:2011 Conformity Assessment Requirements for Bodies Providing Audit and Certification of Management Systems Date(s) of Evaluation: CHECKLIST ISO/IEC 17021:2011 Conformity Assessment Requirements for Bodies Providing Audit and Certification of Management Systems Assessor(s) & Observer(s): Organization: Area/Field

More information

Law Enforcement Analyst Certification Standards

Law Enforcement Analyst Certification Standards DEPARTMENT OF JUSTICE Global Justice Information Sharing Initiative United States Department of Justice Law Enforcement Analyst Certification Standards Based on the Law Enforcement Analytic Standards About

More information

TEMPLE UNIVERSITY POLICIES AND PROCEDURES MANUAL

TEMPLE UNIVERSITY POLICIES AND PROCEDURES MANUAL TEMPLE UNIVERSITY POLICIES AND PROCEDURES MANUAL Title: Computer and Network Security Policy Policy Number: 04.72.12 Effective Date: November 4, 2003 Issuing Authority: Office of the Vice President for

More information

Cyber Security, Cyber Crimes and Cyber Laws

Cyber Security, Cyber Crimes and Cyber Laws Continuing Education Programme on Cyber Security, Cyber Crimes and Cyber Laws Name of the Proposer: Anil K. Roy and Manik Lal Das Other Instructors: arranged by CLS, Ahmedabad Course Objectives: Information

More information

Digital Forensics: The aftermath of hacking attacks. AHK Committee Meeting April 19 th, 2015 Eng. Jamal Abdulhaq Logos Networking FZ LLC

Digital Forensics: The aftermath of hacking attacks. AHK Committee Meeting April 19 th, 2015 Eng. Jamal Abdulhaq Logos Networking FZ LLC Digital Forensics: The aftermath of hacking attacks AHK Committee Meeting April 19 th, 2015 Eng. Jamal Abdulhaq Logos Networking FZ LLC Topics Digital Forensics: Brief introduction Case Studies Case I:

More information

BDO NORDIC. Investigation, fraud prevention and computer forensics. You can guess. You can assume. Or you can know. And knowing is always better.

BDO NORDIC. Investigation, fraud prevention and computer forensics. You can guess. You can assume. Or you can know. And knowing is always better. BDO NORDIC Investigation, fraud prevention and computer forensics You can guess. You can assume. Or you can know. And knowing is always better. CONTENT OUR SERVICES 3 Investigation - Identifying the facts

More information

DIGITAL FORENSICS SPECIALIZATION IN BACHELOR OF SCIENCE IN COMPUTING SCIENCE PROGRAM

DIGITAL FORENSICS SPECIALIZATION IN BACHELOR OF SCIENCE IN COMPUTING SCIENCE PROGRAM DIGITAL FORENSICS SPECIALIZATION IN BACHELOR OF SCIENCE IN COMPUTING SCIENCE PROGRAM Proposed Program Title: Bachelor of Science in Computing Science- Specialization in Digital Forensics Specialization

More information

Westpac Merchant. A guide to meeting the new Payment Card Industry Security Standards

Westpac Merchant. A guide to meeting the new Payment Card Industry Security Standards Westpac Merchant A guide to meeting the new Payment Card Industry Security Standards Contents Introduction 01 What is PCIDSS? 02 Why does it concern you? 02 What benefits will you receive from PCIDSS?

More information

Chapter 15. Conducting Investigations and Report Writing

Chapter 15. Conducting Investigations and Report Writing Chapter 15 Conducting Investigations and Report Writing 1 Learning Objectives Understand the circumstances that may necessitate an internal investigation. Identify who should be part of a fraud examination

More information

Computer Hacking Forensic Investigator v8

Computer Hacking Forensic Investigator v8 CÔNG TY CỔ PHẦN TRƯỜNG CNTT TÂN ĐỨC TAN DUC INFORMATION TECHNOLOGY SCHOOL JSC LEARN MORE WITH LESS! Computer Hacking Forensic Investigator v8 Course Description: EC-Council releases the most advanced Computer

More information

Regulations for certification of quality management systems

Regulations for certification of quality management systems Regulations for certification of quality management systems 00 24/04/2013 Annulla e sostituisce il documento Regulations for certification of quality management systems in rev. 14 SG DIR AD Rev. Data Descrizione

More information

Professional Ethics for Computer Science. Lecture 2: Ethics for IT Professionals and IT Users

Professional Ethics for Computer Science. Lecture 2: Ethics for IT Professionals and IT Users Professional Ethics for Computer Science Lecture 2: Ethics for IT Professionals and IT Users Klaus Mueller Computer Science Department Stony Brook University Objectives What key characteristics distinguish

More information

Whitepaper on AuthShield Two Factor Authentication with ERP Applications

Whitepaper on AuthShield Two Factor Authentication with ERP Applications Whitepaper on AuthShield Two Factor Authentication with ERP Applications By INNEFU Labs Pvt. Ltd Table of Contents 1. Overview... 3 2. Threats to account passwords... 4 2.1 Social Engineering or Password

More information

(Instructor-led; 3 Days)

(Instructor-led; 3 Days) Information Security Manager: Architecture, Planning, and Governance (Instructor-led; 3 Days) Module I. Information Security Governance A. Introduction to Information Security Governance B. Overview of

More information

CISM ITEM DEVELOPMENT GUIDE

CISM ITEM DEVELOPMENT GUIDE CISM ITEM DEVELOPMENT GUIDE TABLE OF CONTENTS CISM ITEM DEVELOPMENT GUIDE Content Page Purpose of the CISM Item Development Guide 2 CISM Exam Structure 2 Item Writing Campaigns 2 Why Participate as a CISM

More information

University of Pennsylvania Handbook for Faculty and Academic Administrators 2015 Version

University of Pennsylvania Handbook for Faculty and Academic Administrators 2015 Version University of Pennsylvania Handbook for Faculty and Academic Administrators 2015 Version V.D. Closed Circuit Television Monitoring and Recording of Public Areas for Safety and Security Purposes (Source:

More information

Access Control Policy

Access Control Policy Version 3.0 This policy maybe updated at anytime (without notice) to ensure changes to the HSE s organisation structure and/or business practices are properly reflected in the policy. Please ensure you

More information

Surveillance Equipment

Surveillance Equipment University of North Dakota Loss Control Committee Standard Practice 240 Surveillance Equipment Effective 12/2005 Revised 10/07 I. Purpose The purpose of this standard practice is to regulate the use of

More information

Industry Oriented Training and Capacity Building Program on Cyber Crimes, Cyber Security, Forensics and Cyber Laws

Industry Oriented Training and Capacity Building Program on Cyber Crimes, Cyber Security, Forensics and Cyber Laws Industry Oriented Training and Capacity Building Program on Cyber Crimes, Cyber Security, Forensics and Cyber Laws IEEE Gujarat Section In association with CLS- Cyberra Legal Services announces Training

More information

Newcastle University Information Security Procedures Version 3

Newcastle University Information Security Procedures Version 3 Newcastle University Information Security Procedures Version 3 A Information Security Procedures 2 B Business Continuity 3 C Compliance 4 D Outsourcing and Third Party Access 5 E Personnel 6 F Operations

More information

Third Party Security Requirements Policy

Third Party Security Requirements Policy Overview This policy sets out the requirements expected of third parties to effectively protect BBC information. Audience Owner Contacts This policy applies to all third parties and staff, including contractors,

More information

e-discovery Forensics Incident Response

e-discovery Forensics Incident Response e-discovery Forensics Incident Response NetSecurity Corporation 21351 Gentry Drive Suite 230 Dulles, VA 20166 VA DCJS # 11-5605 Phone: 703.444.9009 Toll Free: 1.866.664.6986 Web: www.netsecurity.com Email:

More information

CONTENT. King Hussein Faculty of Computing Sciences

CONTENT. King Hussein Faculty of Computing Sciences CONTENT About Mission, Vision & Goals Computing Sciences Faculty Computing Sciences Resources Bachelors Degree Programs B. Sc. Program in Computer Science B. Sc. Program in Software Engineering B. Sc.

More information

Certified Cyber Security Analyst VS-1160

Certified Cyber Security Analyst VS-1160 VS-1160 Certified Cyber Security Analyst Certification Code VS-1160 Vskills certification for Cyber Security Analyst assesses the candidate as per the company s need for cyber security and forensics. The

More information

Cyber Security and Information Assurance Controls Prevention and Reaction NOVEMBER 2013

Cyber Security and Information Assurance Controls Prevention and Reaction NOVEMBER 2013 Cyber Security and Information Assurance Controls Prevention and Reaction 1 About Enterprise Risk Management Capabilities Cyber Security Risk Management Information Assurance Strategic Governance Regulatory

More information

Accounting and Auditing Careers, Jobs, Training and Employment Information

Accounting and Auditing Careers, Jobs, Training and Employment Information www.careersinghana.com Email : [email protected] Tel: +233 245649846 Accounting and Auditing Careers, Jobs, Training and Employment Information Accounting Career Overview A bachelor's degree is the

More information

Faculty of Economic and Management Sciences

Faculty of Economic and Management Sciences Faculty of Economic and Management Sciences The Unit for Forensic Accounting In The Department of Auditing POSTGRADUATE DIPLOMA IN INVESTIGATIVE AND FORENSIC ACCOUNTING (Web-supported) This programme will

More information

MIT s Information Security Program for Protecting Personal Information Requiring Notification. (Revision date: 2/26/10)

MIT s Information Security Program for Protecting Personal Information Requiring Notification. (Revision date: 2/26/10) MIT s Information Security Program for Protecting Personal Information Requiring Notification (Revision date: 2/26/10) Table of Contents 1. Program Summary... 3 2. Definitions... 4 2.1 Identity Theft...

More information

MEDICAL UNIVERSITY OF SOUTH CAROLINA DEPARTMENT OF PUBLIC SAFETY

MEDICAL UNIVERSITY OF SOUTH CAROLINA DEPARTMENT OF PUBLIC SAFETY MEDICAL UNIVERSITY OF SOUTH CAROLINA DEPARTMENT OF PUBLIC SAFETY SUBJECT: Training EFFECTIVE DATE: 1 January 1999 PAGE 1 OF 14 REVIEW DATE: 30 November 2015 APPROVED: CHANGE DATE: 20 May 2013 THE POLICIES

More information

Information Security Management System Policy

Information Security Management System Policy Information Security Management System Policy Public Version 3.3 Issued Document Name Owner P079A ISMS Security Policy Information Security Security Policies, Standards and Procedures emanate from the

More information

Monitoring and Logging Policy. Document Status. Security Classification. Level 1 - PUBLIC. Version 1.0. Approval. Review By June 2012

Monitoring and Logging Policy. Document Status. Security Classification. Level 1 - PUBLIC. Version 1.0. Approval. Review By June 2012 Monitoring and Logging Policy Document Status Security Classification Version 1.0 Level 1 - PUBLIC Status DRAFT Approval Life 3 Years Review By June 2012 Owner Secure Research Database Analyst Change History

More information

Masters in Applied Cyber Security Upskilling Existing Employees

Masters in Applied Cyber Security Upskilling Existing Employees Masters in Applied Cyber Security Upskilling Existing Employees Origination The Masters in Applied Cyber Security (MACS) emerged from discussions at the Steering Group of ICT Ireland Skillnet where companies

More information

Information, Network & Cyber Security

Information, Network & Cyber Security School COMSC Information, Network & Cyber Security Information security officers are faced with strategic decisions on a daily basis, and are required to make informed decisions on the security options

More information

National Home Inspector Certification Council. Policy & Procedures Manual

National Home Inspector Certification Council. Policy & Procedures Manual National Home Inspector Certification Council Policy & Procedures Manual INTRODUCTION The National Home Inspector Certification Council (NHICC) accreditation is an objective and reliable verification.

More information

Information Security Management System Information Security Policy

Information Security Management System Information Security Policy Management System Policy Version: 3.4 Issued Document Name: Owner: P079A - ISMS Security Policy Classification: Public Security Policies, Standards and Procedures emanate from the Policy which has been

More information

EXAMINATION INFORMATION FOR PROSPECTIVE TEXAS CPA APPLICANTS

EXAMINATION INFORMATION FOR PROSPECTIVE TEXAS CPA APPLICANTS EXAMINATION INFORMATION FOR PROSPECTIVE TEXAS CPA APPLICANTS This brochure contains current information relative to applying for the Uniform CPA Examination under the jurisdiction of the Texas State Board

More information

10- Assume you open your credit card bill and see several large unauthorized charges unfortunately you may have been the victim of (identity theft)

10- Assume you open your credit card bill and see several large unauthorized charges unfortunately you may have been the victim of (identity theft) 1- A (firewall) is a computer program that permits a user on the internal network to access the internet but severely restricts transmissions from the outside 2- A (system failure) is the prolonged malfunction

More information

Information Technology Audit & Forensic Techniques. CMA Amit Kumar

Information Technology Audit & Forensic Techniques. CMA Amit Kumar Information Technology Audit & Forensic Techniques CMA Amit Kumar 1 Amit Kumar & Co. (Cost Accountants) A perfect blend of Tax, Audit & Advisory services Information Technology Audit & Forensic Techniques

More information

CERTIFIED PUBLIC ACCOUNTANT (CPA)

CERTIFIED PUBLIC ACCOUNTANT (CPA) CERTIFIED PUBLIC ACCOUNTANT (CPA) Certified Public Accountant (CPA) is the highest accounting qualification in the United States of America. One has to pass the Uniform CPA Examination conducted by the

More information

Contact: Henry Torres, (870) 972-3033

Contact: Henry Torres, (870) 972-3033 Information & Technology Services Management & Security Principles & Procedures Executive Summary Contact: Henry Torres, (870) 972-3033 Background: The Security Task Force began a review of all procedures

More information

The FBI and the Internet

The FBI and the Internet The FBI and the Internet Special Agent Robert Flaim Federal Bureau of Investigation Presentation Goals To give you a better understanding of: The FBI Cyber Division, its priorities, and its mission The

More information

Faculty of Economic and Management Sciences

Faculty of Economic and Management Sciences Faculty of Economic and Management Sciences The Unit for Forensic Accounting In The Department of Auditing MPHIL FRAUD RISK MANAGEMENT (Web-supported) Managing the risks of fraud in organisations Fraud

More information

State of West Virginia Office of Technology Policy: Information Security Audit Program Issued by the CTO

State of West Virginia Office of Technology Policy: Information Security Audit Program Issued by the CTO Policy: Information Security Audit Program Issued by the CTO Policy No: WVOT-PO1008 Issue Date: 08.01.09 Revised: Page 1 of 12 1.0 PURPOSE The West Virginia Office of Technology (WVOT) will maintain an

More information

SAFE HARBOR PRIVACY NOTICE EFFECTIVE: July 1, 2005 AMENDED: July 15, 2014

SAFE HARBOR PRIVACY NOTICE EFFECTIVE: July 1, 2005 AMENDED: July 15, 2014 SAFE HARBOR PRIVACY NOTICE EFFECTIVE: July 1, 2005 AMENDED: July 15, 2014 This Notice sets forth the principles followed by United Technologies Corporation and its operating companies, subsidiaries, divisions

More information

Information Security Program CHARTER

Information Security Program CHARTER State of Louisiana Information Security Program CHARTER Date Published: 12, 09, 2015 Contents Executive Sponsors... 3 Program Owner... 3 Introduction... 4 Statewide Information Security Strategy... 4 Information

More information

Information Security Basic Concepts

Information Security Basic Concepts Information Security Basic Concepts 1 What is security in general Security is about protecting assets from damage or harm Focuses on all types of assets Example: your body, possessions, the environment,

More information

micros MICROS Systems, Inc. Enterprise Information Security Policy (MEIP) August, 2013 Revision 8.0 MICROS Systems, Inc. Version 8.

micros MICROS Systems, Inc. Enterprise Information Security Policy (MEIP) August, 2013 Revision 8.0 MICROS Systems, Inc. Version 8. micros MICROS Systems, Inc. Enterprise Information Security Policy (MEIP) Revision 8.0 August, 2013 1 Table of Contents Overview /Standards: I. Information Security Policy/Standards Preface...5 I.1 Purpose....5

More information

Certified Information Systems Auditor (CISA)

Certified Information Systems Auditor (CISA) Certified Information Systems Auditor (CISA) Course Introduction Course Introduction Module 01 - The Process of Auditing Information Systems Lesson 1: Management of the Audit Function Organization of the

More information

http://www.bls.gov/oco/ocos001.htm Accountants and Auditors

http://www.bls.gov/oco/ocos001.htm Accountants and Auditors http://www.bls.gov/oco/ocos001.htm Accountants and Auditors * Nature of the Work * Training, Other Qualifications, and Advancement * Employment * Job Outlook * Projections Data * Earnings * OES Data *

More information

Information Security Specialist Training on the Basis of ISO/IEC 27002

Information Security Specialist Training on the Basis of ISO/IEC 27002 Information Security Specialist Training on the Basis of ISO/IEC 27002 Natalia Miloslavskaya, Alexander Tolstoy Moscow Engineering Physics Institute (State University), Russia, {milmur, ait}@mephi.edu

More information

https://agency.governmentjobs.com/dakota/job_bulletin.cfm?jobid=1017820

https://agency.governmentjobs.com/dakota/job_bulletin.cfm?jobid=1017820 Page 1 of 5 DAKOTA COUNTY Employee Relations Administration Center, 1590 Highway 55 Hastings, MN 55033-2372 651.438.4435 http://www.dakotacounty.us INVITES APPLICATIONS FOR THE POSITION OF: Electronic

More information

Bellevue University Cybersecurity Programs & Courses

Bellevue University Cybersecurity Programs & Courses Undergraduate Course List Core Courses: CYBR 250 Introduction to Cyber Threats, Technologies and Security CIS 311 Network Security CIS 312 Securing Access Control CIS 411 Assessments and Audits CYBR 320

More information

COMMUNITY ASSOCIATIONS INSTITUTE PROFESSIONAL MANAGER CODE OF ETHICS

COMMUNITY ASSOCIATIONS INSTITUTE PROFESSIONAL MANAGER CODE OF ETHICS The Manager Shall: COMMUNITY ASSOCIATIONS INSTITUTE PROFESSIONAL MANAGER CODE OF ETHICS 1. Comply with current bylaws, standards and practices as may be established from time to time by CAI subject to

More information

Sensitive Incident Investigations. Digital Risk Management. Forensics Testing.

Sensitive Incident Investigations. Digital Risk Management. Forensics Testing. Sensitive Incident Investigations. Digital Risk Management. Forensics Testing. 2009 Innovation Award Winner Austin Chamber of Commerce 2010 Innovation Award Finalist Austin Chamber of Commerce Only private

More information

information security and its Describe what drives the need for information security.

information security and its Describe what drives the need for information security. Computer Information Systems (Forensics Classes) Objectives for Course Challenges CIS 200 Intro to Info Security: Includes managerial and Describe information security and its critical role in business.

More information

Domain 1 The Process of Auditing Information Systems

Domain 1 The Process of Auditing Information Systems Certified Information Systems Auditor (CISA ) Certification Course Description Our 5-day ISACA Certified Information Systems Auditor (CISA) training course equips information professionals with the knowledge

More information

How To Get A Computer Hacking Program

How To Get A Computer Hacking Program CHFI v8(computer Hacking Forensics Investigator) Course Description & Overview Overview CHFIv8 Course Description EC-Council releases the brand new Version 8 of the Computer Hacking Forensics Investigator

More information

CERTIFICATION Through

CERTIFICATION Through CERTIFICATION Through PORTFOLIO general handbook ANCC CErTIFICATIoN general TESTINg AND renewal handbook 1 EFFECTIVE DATE: August 6, 2013 ANCC 2012. ALL rightsreser VED. CONTENTS ABOUT THIS HANDBOOK...3

More information

Programme Specification: MSc Audit Management and Consultancy

Programme Specification: MSc Audit Management and Consultancy Programme Specification: MSc Audit Management and Consultancy NOTE: This specification provides a concise summary of the main features of the course and the learning outcomes that a typical student might

More information

JOINT EXPLANATORY STATEMENT TO ACCOMPANY THE CYBERSECURITY ACT OF 2015

JOINT EXPLANATORY STATEMENT TO ACCOMPANY THE CYBERSECURITY ACT OF 2015 JOINT EXPLANATORY STATEMENT TO ACCOMPANY THE CYBERSECURITY ACT OF 2015 The following consists of the joint explanatory statement to accompany the Cybersecurity Act of 2015. This joint explanatory statement

More information

Computer Crime & Security Survey

Computer Crime & Security Survey 4 th Japan & US Computer Crime & Security Survey Katsuya Uchida Professor, Ph. D. Institute of Information Security [email protected] Graduate School of Information Security 1 Respondents by Number of

More information

Unit 3 Cyber security

Unit 3 Cyber security 2016 Suite Cambridge TECHNICALS LEVEL 3 IT Unit 3 Cyber security Y/507/5001 Guided learning hours: 60 Version 1 September 2015 ocr.org.uk/it LEVEL 3 UNIT 3: Cyber security Y/507/5001 Guided learning hours:

More information

Automated Regional Justice Information System (ARJIS) Acceptable Use Policy for Facial Recognition

Automated Regional Justice Information System (ARJIS) Acceptable Use Policy for Facial Recognition Automated Regional Justice Information System (ARJIS) Acceptable Use Policy for Facial Recognition Revised: 02/13/2015 A. STATEMENT OF PURPOSE The purpose of this document is to outline the responsibilities

More information

Gaming System Monitoring and Analysis Effort

Gaming System Monitoring and Analysis Effort for the Gaming System Monitoring and Analysis Effort DHS/S&T/PIA-025 October 11, 2012 Contact Point Douglas Maughan DHS S&T Cyber Security Division 202-254-6145 Reviewing Official Jonathan R. Cantor Acting

More information

Catalyst Consulting & Events (CCE) takes seriously its commitment to preserve the privacy of the personal information that we collect.

Catalyst Consulting & Events (CCE) takes seriously its commitment to preserve the privacy of the personal information that we collect. PRIVACY POLICY 1. Introduction Catalyst Consulting & Events (CCE) takes seriously its commitment to preserve the privacy of the personal information that we collect. We will only collect information that

More information

Service Schedule for CLOUD SERVICES

Service Schedule for CLOUD SERVICES Service Schedule for CLOUD SERVICES This Service Schedule is effective for Cloud Services provided on or after 1 September 2013. Terms and Conditions applicable to Cloud Services provided prior to this

More information

How To Defend Yourself Against Cyber Attacks

How To Defend Yourself Against Cyber Attacks Overview of Cyber Security: Our daily life, economic vitality, and national security depend on a stable, safe, and resilient cyberspace. We rely on this vast array of networks to communicate and travel,

More information

CERTIFIED SECURITY PROJECT MANAGER

CERTIFIED SECURITY PROJECT MANAGER YOUR PASSPORT TO SUCCESS, RECOGNITION AND EXCELLENCE... CERTIFIED SECURITY PROJECT MANAGER www.securitylearningnetwork.com What is CSPM? The Certified Security Project Manager (CSPM) Program promotes the

More information

How to Protect Intellectual Property While Offshore Outsourcing?

How to Protect Intellectual Property While Offshore Outsourcing? WHITE PAPER [Type text] How to Protect Intellectual Property While Offshore Outsourcing? In an era of increasing data theft, it is important for organizations to ensure that the Intellectual Property related

More information

IAC 7/2/08 Nursing Board[655] Ch 2, p.1. CHAPTER 2 NURSING EDUCATION PROGRAMS [Prior to 8/26/87, Nursing Board[590] Ch 2]

IAC 7/2/08 Nursing Board[655] Ch 2, p.1. CHAPTER 2 NURSING EDUCATION PROGRAMS [Prior to 8/26/87, Nursing Board[590] Ch 2] IAC 7/2/08 Nursing Board[655] Ch 2, p.1 CHAPTER 2 NURSING EDUCATION PROGRAMS [Prior to 8/26/87, Nursing Board[590] Ch 2] 655 2.1(152) Definitions. Approval means recognition status given to nursing education

More information

IT General Controls Domain COBIT Domain Control Objective Control Activity Test Plan Test of Controls Results

IT General Controls Domain COBIT Domain Control Objective Control Activity Test Plan Test of Controls Results Acquire or develop application systems software Controls provide reasonable assurance that application and system software is acquired or developed that effectively supports financial reporting requirements.

More information

Cyber Warfare. Global Economic Crime Survey. Causes of Cyber Attacks. David Childers, CEO Compli Vivek Krishnamurthy, Foley Hoag LLP. Why Cybercrime?

Cyber Warfare. Global Economic Crime Survey. Causes of Cyber Attacks. David Childers, CEO Compli Vivek Krishnamurthy, Foley Hoag LLP. Why Cybercrime? Cyber Warfare David Childers, CEO Compli Vivek Krishnamurthy, Foley Hoag LLP Global Economic Crime Survey Cyber crime is the fastest growing economic crime up more than 2300% since 2009 1 in 10 companies

More information

Franchise Data Compromise Trends and Cardholder. December, 2010

Franchise Data Compromise Trends and Cardholder. December, 2010 Franchise Data Compromise Trends and Cardholder Security Best Practices December, 2010 Franchise Data Security Agenda Cardholder Data Compromise Overview Breach Commonalities Hacking Techniques Franchisee

More information