Building Open Education Resources for Digital Forensics Programmes



Similar documents
Developing a Repository of Digital Forensics Case Studies to Provide Flexible Learning Environment Syed Naqvi, Ali Abdallah

DATA RECOVERY SOLUTIONS EXPERT DATA RECOVERY SOLUTIONS FOR ALL DATA LOSS SCENARIOS.

Capacity Building in Cyber Security Literacy: An Inter-disciplinary Approach

Certified Cyber Security Analyst VS-1160

70250 Graduate Certificate in Digital Forensics

Designing a Data Solution with Microsoft SQL Server 2014

Breakfast Meeting: Securing your Secured Data Digital Forensics, Fraud and Forensic Advancements

National Initiative for Cybersecurity Education

Hands-On How-To Computer Forensics Training

Introduction to Data Forensics. Jeff Flaig, Security Consultant January 15, 2014

BDO CONSULTING FORENSIC TECHNOLOGY SERVICES

How To Write An Article On The European Cyberspace Policy And Security Strategy

High End Information Security Services

Cyber Security and Digital Forensics Training Platform

Partnership for Cyber Resilience

Impact of Digital Forensics Training on Computer Incident Response Techniques

CYBER FORENSICS (W/LAB) Course Syllabus

Computer Hacking Forensic Investigator v8

Learning and Development Programme

C HFI C HFI. EC-Council. EC-Council. Computer Hacking Forensic Investigator. Computer. Computer. Hacking Forensic INVESTIGATOR

OFFICE OF ENTERPRISE TECHNOLOGY SERVICES QUARTERLY REPORT ON

Cyber Threat Intelligence Move to an intelligencedriven cybersecurity model

C HFI C HFI. EC-Council. EC-Council. Computer Hacking Forensic Investigator. Computer. Computer. Hacking Forensic INVESTIGATOR

POLICIES TO MITIGATE CYBER RISK

Cybersecurity in an All-IP World Are You Prepared?

Financial Sector Cybersecurity: who s in charge? Aquiles A. Almansi Lead Financial Sector Specialist WBG-Finance & Markets

CCE Certification Competencies

BlacKnight. Cyber Security international A BUSINESS / MARKETING PRESENTATION

Below is a summary of the development that each unit undergoes. Beyond that is a more detailed description of each step of the process.

INTERNATIONAL ASSOCIATION OF CHIEFS OF POLICE. Guiding Principles on Cloud Computing in Law Enforcement

Rethinking Information Security for Advanced Threats. CEB Information Risk Leadership Council

Jyväskylä Cyber Security Ecosystem

Introduction to Cyber Security / Information Security

Certified Cyber Security Analyst VS-1160

Course Content Summary ITN 267 Legal Topics in Network Security (3 Credits)

Walden University s Guide for Information Systems and

NEW IMPROVEMENT IN DIGITAL FORENSIC STANDARD OPERATING PROCEDURE (SOP)

Northrop Grumman Cybersecurity Research Consortium

Protecting against cyber threats and security breaches

How To Create A Data Science System

NICF Cyber Security Operations Specialist DigiSAFE Cyber Security Centre ST Electronics (Info-Security) Pte Ltd

Course 20465C: Designing a Data Solution with Microsoft SQL Server

The Case for Support: The Center for Cyber Security Studies at the U. S. Naval Academy

The International MBA in Corporate Security Management (IMBASM) Distance Learning

Master of Science in Healthcare Informatics and Analytics Program Overview

Deployment Topologies - DPAdmin An isoagroup Product

Cybersecurity: What In-House Counsel Needs to Know

20465: Designing a Data Solution with Microsoft SQL Server

Strategy and Resources to Strengthen IT Programs. Academic Leadership Conference May 28, 2015

GEARS Cyber-Security Services

Key Stage 4 Programme of Study mapping against GCSE ICT Short Course

This course is intended for database professionals who need who plan, implement, and manage database solutions. Primary responsibilities include:

Enterprise Security Platform for Government

Entrust IdentityGuard Comprehensive

Smart Open Services for European Patients Open ehealth initiative for a European large scale pilot of patient summary and electronic prescription

OWG 60 IT Backend Systems Approved Recommendations

Bellevue University Cybersecurity Programs & Courses

CYBER SECURITY TRAINING SAFE AND SECURE

The Proper Acquisition, Preservation, & Analysis of Computer Evidence: Guidelines & Best-Practices

Spark use case at Telefonica CBS

Data Security Breach. How to Respond

Testimony of Eunice Santos. House Oversight and Government Affairs Committee Subcommittee on Information Technology

IBM Social Media Analytics

INTERNATIONAL ASSOCIATION OF CHIEFS OF POLICE. Guiding Principles on Cloud Computing in Law Enforcement

Securing your IT infrastructure with SOC/NOC collaboration

The Advanced Attack Challenge. Creating a Government Private Threat Intelligence Cloud

THE ANTE-MORTEM/ POST-MORTEM DATABASE AN INFORMATION MANAGEMENT APPLICATION FOR FORENSIC DATA IN BRIEF

How To Protect Your Business

Table of Contents. June 2010

Designing a Data Solution with Microsoft SQL Server 2014

CYBERSECURITY IN FINANCIAL SERVICES POINT OF VIEW CHALLENGE 1 REGULATORY COMPLIANCE ACROSS GEOGRAPHIES

August Investigating an Insider Threat. A Sensage TechNote highlighting the essential workflow involved in a potential insider breach

Cyber Security Response to Physical Security Breaches

The European Platform in Network and Information Security (NIS) Fabio Martinelli

How To Understand And Understand The European Priorities In Information Security

What is Digital Forensics?

Security Intelligence Services. Cybersecurity training.

Designing a Data Solution with Microsoft SQL Server

Woodcock-Johnson and Woodcock-Muñoz Language Survey Revised Normative Update Technical and Data Security Overview

Introduction. IMF Conference September 2008

Course 20465: Designing a Data Solution with Microsoft SQL Server

Redefining Incident Response

Designing a Data Solution with Microsoft SQL Server

CHAPTER SIX DATA. Business Intelligence The McGraw-Hill Companies, All Rights Reserved

For Your ediscovery... Software

Honours Degree (top-up) Computing Abbreviated Programme Specification Containing Both Core + Supplementary Information

Jet Enterprise Frequently Asked Questions Pg. 1 03/18/2011 JEFAQ - 02/13/ Copyright Jet Reports International, Inc.

Guide to advanced ediscovery solutions

Bachelor programs and minors at Dutch UoAS s in the field of digital safety and security

Master of Education Degree in Curriculum and Instruction in Peace Education

University of Maryland University College: Master of Science in Digital Forensics and Cyber Investigation

Cybersecurity Converged Resilience :

IBM Social Media Analytics

COMPUTER FORENSICS (EFFECTIVE ) ACTIVITY/COURSE CODE: 5374 (COURSE WILL BE LISTED IN THE CATE STUDENT REPORTING PROCEDURES MANUAL)

Using Actian PSQL as a Data Store with VMware vfabric SQLFire. Actian PSQL White Paper May 2013

From Chaos to Clarity.

FRD506. Financial investigation and Forensic Accounting - 30 hours. Objectives

Practice Exercise March 7, 2016

Hosted by Lunarline: School of Cyber Security

Transcription:

Building Open Education Resources for Digital Forensics Programmes Syed Naqvi, Ali Abdallah Centre for Cyber Security & Forensics

Outline Introduction Open Educational Resources Digital Forensics Case Studies Summary & Perspectives 2

Project ConSoLiDatE Multi-disciplinary Cooperation for Cyber Security, Legal and Digital Forensics Education Objectives: Development of educational resources conveying: essential cyber security knowledge essential digital forensic investigations essential legal principles Provision of educational audio-visual resources that facilitate active student learning, debate, critical thinking and classroom engagement. Development of strong links between theory and practice through consolidation of student s understanding of principles by examining applicability to carefully constructed practical scenarios. 3

Project ConSoLiDatE Practice Advocacy Expert witness Psychology Case Studies Best practices Law Criminology Investigations Technology 4

Open Educational Resources Cybersecurity Essentials Includes Digital Forensics Case-studies Modern legal briefs Technical challenges Expert industrial input Discussion activities Sustainable Pedagogy Videos 5

Multidisciplinary DF Education Scenario-based learning (SBL) Learning best takes place in the context where it is going to be used. It involves students working their way through a storyline, usually based around a real-life case study. Students are encouraged to play active role by using their subject knowledge, critical thinking and problem solving skills in real-world environment. SBL in the area of digital forensics Set of scenarios to cover various stages of digital forensic analysis from evidence collection to the events correlation. Legal dimension: Chain of custody, paperwork, evidence handling, etc. Technical dimension: Imaging, password extraction, pin code, device connectors, etc. 6

Digital Forensic Case Studies 7

1. Forensic Soundness When HD can t be removed Device needs to be powered on 8

1. Forensic Soundness When HD can t be removed Device needs to be powered on Video of imaging and processing Integrity of the video MD5/SHA1 9

2. Logical Images When Physical image of a HD (.E01) cannot be taken 10

2. Logical Images When Physical image of a HD (.E01) cannot be taken Make Logical image (.L01) Recovery from Unallocated clusters, deleted files, Product Support! 11

3. Cloud Forensics http://www.sueblimely.com/images/posts/2008/shout.jpg When dispute-related data entirely resides in a fraction of machines 12

3. Cloud Forensics 13

4. Virtual Machine Forensics.lnk files.dll files 14

Conclusions 15

Summary Repository of real life case studies Flexible learning environment Better student experience Higher employability prospects Future directions Available to the students of other HEI More sophisticated scenarios (e.g. ICS Forensics) 16

Perspectives We need to work on the harmonisationof digital forensic analysis methodologies and the governing policies Scenarios-based testing Identification of grey areas Mutual validations Legislations Sandbox Technology Investigations 17