MSc Forensic Computing Project Proposal from Richard Howley



Similar documents
Fostering Incident Response and Digital Forensics Research

Mitigating and managing cyber risk: ten issues to consider

ITIL applied to Network Operations

Mike Smart Cyber Strategist & Enterprise Security Solutions, EMEA. Cyber: The Catalyst to Transform the Security Program

Edinburg Napier University. Cloud-based Digital Forensics Evaluation Test (D-FET) Platform

Analyzing HTTP/HTTPS Traffic Logs

1. Understanding Big Data

Cyber Security Evolved

Close the security gap with a unified approach. Detect, block and remediate risks faster with end-to-end visibility of the security cycle

G-Cloud II Services Service Definition Accenture Cloud SaaS Implementation Services Google Apps

A NEW APPROACH TO CYBER SECURITY

Industry. Head of Research Service Desk Institute

How to gather and evaluate information

Landscape Ecology with Geographical Information Systems PGCert/PGDip/MSc

1. Implementation of a testbed for testing Energy Efficiency by server consolidation using Vmware

Implementing Digital Forensic Readiness for Cloud Computing Using Performance Monitoring Tools

CYBER SECURITY TRAINING SAFE AND SECURE

Cyber Security and Privacy Services. Working in partnership with you to protect your organisation from cyber security threats and data theft

Hands-On How-To Computer Forensics Training

BIG DATA TRIAGE & DIGITAL FORENSICS

Cyber threat intelligence and the lessons from law enforcement. kpmg.com.au

CFIR - Finance IT 2015 Cyber security September 2015

ASSUMING A STATE OF COMPROMISE: EFFECTIVE DETECTION OF SECURITY BREACHES

Advanced Digital Forensics ITP 475 (4 Units)

MASTER OF SCIENCE IN INFORMATION ASSURANCE PROGRAM DEPARTMENT OF COMPUTER SCIENCE HAMPTON UNIVERSITY

Implementing a CMS. First Steps. A Case Study by. Raymond Sneddon, National Australia Group September Version: 1.

Programme Specification

Cyber Security focus in ABB: a Key issue. 03 Luglio 2014, Roma 1 Conferenza Nazionale Cyber Security Marco Biancardi, ABB SpA, Power System Division

BA (Honours) PSYCHOLOGY

IT Security Risk Management Model for Cloud Computing: A Need for a New Escalation Approach.

Terms of Reference for the Review of the OECD Guidelines for the Security of Information Systems and Networks

Security Intelligence Services. Cybersecurity training.

Programme Specification for the. Cardiff Metropolitan University. Master of Science (MSc) in Information Technology

HIPAA CRITICAL AREAS TECHNICAL SECURITY FOCUS FOR CLOUD DEPLOYMENT

Psychology. Undergraduate

KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES.

CIBECS / IDG Connect DATA LOSS SURVEY. The latest statistics and trends around user data protection for business.

Cyber Security and Digital Forensics Training Platform

McAfee Security Architectures for the Public Sector

What is Cloud Computing? First, a little history. Demystifying Cloud Computing. Mainframe Era ( ) Workstation Era ( ) Xerox Star 1981!

Addressing Cyber Risk Building robust cyber governance

Guideline: Medical supervision of Diabetes Registered Nurse Prescribing 2014

Michelle Govan & Anand Philip Network & Security Engineering

Course Bachelor of Information Technology majoring in Network Security or Data Infrastructure Engineering

Breach Found. Did It Hurt?

Exemplars. Research Report

Cyber Security and the Impact on Banks in China

Guidelines on continuing professional development

Workforce Planning & Development Model

Paper E ? Appendix 1 Annex A

White Paper: Cloud Security. Cloud Security

TMMi Case Study. Methodology. Scope. Use TMMi to do a gap analysis for an independent

Qi Liu Rutgers Business School ISACA New York 2013

British Dental Association. Strategy

Overview of Computer Forensics

Ten Deadly Sins of Computer Forensics

CSN08101 Digital Forensics. Module Leader: Dr Gordon Russell Lecturers: Robert Ludwiniak

[INSERT NAME OF SCHOOL] BUSINESS CONTINUITY PLAN

The Changing IT Risk Landscape Understanding and managing existing and emerging risks

GRADUATE CERTIFICATE IN ORGANISATIONAL DEVELOPMENT

Cornwall Therapy Partnership. Graduate Certificate in Integrated Humanistic Psychotherapy

Professional Marketing Qualifications

CAPABILITY STATEMENT LEGAL TECHNOLOGIES AND COMPUTER FORENSICS. DECEMBER 2013

Nottingham Trent University Course Specification

IBM G-Cloud Application Systems Management as a Service

The Internal Audit fraud challenge Prevention, protection, detection

Master of Science. Public Health Nutrition

The big data dilemma an inquiry by the House of Commons Select Committee on Science and Technology

Cloud Computing Security Considerations

What happens when you sign up to the ZoneFox Service?

How management accountants can grow their influence to drive business performance

Secure your cloud applications by building solid foundations with enterprise (security ) architecture

Cyber Security - What Would a Breach Really Mean for your Business?

MSc Management (Marketing) Programme Design. Academic Year

IT SECURITY POLICY (ISMS 01)

2015 NETWORK SECURITY & CYBER RISK MANAGEMENT: THE FOURTH ANNUAL SURVEY OF ENTERPRISE-WIDE CYBER RISK MANAGEMENT PRACTICES IN EUROPE

CESG Certification of Cyber Security Training Courses

AUSTRALIAN ENGINEERING COMPETENCY STANDARDS STAGE 2 -

Qualifications for the Fire Sector

Transcription:

Suggested title: MSc Forensic Computing Project Proposal from Richard Howley Forensic Tools and Techniques: A critical review of current and future professional practice. Digital forensics (DF) is a new profession that has developed rapidly over the last decade. It is presumed that this growth is a consequence of several related factors, such as: 1. Increased reliance on data and data processing systems 2. Increased provision for, and access to, computer/internet resources 3. Greater awareness of opportunities for abuse/misuse 4. Portability of digital resources and access 5. Etc. Responding to DF incidents has been largely reactive and localised. Digital forensic practitioners, usually from an IT security background, have bought with them the tools and techniques of IT security and applied them to DF. As yet no one has mapped the UK DF landscape with regard to who does what?, how and why'? This project seeks to address this knowledge gap.

Suggested title: MSc Forensic Computing Project Proposal from Richard Howley Open source.v. proprietary: A theoretical and practical evaluation. DF practitioners make extensive use of open source and self-developed tools to support their DF practise. At the same time as this there are a large number of propriety tools available in the market place that claim to provide a solution to our DF needs. By undertaking original empirical research this project will identify patterns of current practice in the UK DF field with regard to: 1. Who uses what and why? 2. Attitudes to open source and propriety DF software 3. How comprehensive are proprietary tools and what OS tools are used to plug identified gaps in coverage? 4. What are the most/least popular tools and why? 5. How are DF tools tested and verified within organisations? 6. Evaluating the effectiveness of current testing and verification strategies. 7. Etc. Software evaluation needed This project is likely to require a thorough review of the literature on software evaluation followed by the design of software testing lab experiments.

Suggested title: MSc Forensic Computing Project Proposal from Richard Howley Memory dump analysis: Techniques and practices and a template for improvement. As memory increases in size and the ability to acquire it as part of a DF investigation becomes normal we need to be able to explore and interpret memory data in a fast and reliable manner. Memory analysis is still regarded as relatively new and difficult to harvest meaningful information from. This project will: 1. Review current recommended (in the literature) strategies for acquiring and interpreting memory data. 2. Design and undertake original empirical research into current practices in memory forensics. 3. Examine the extent to which current professional practice matches (or not) the recommended strategies found in the literature. 4. Propose a template or set of analytical procedures to improve the process of memory analysis. These procedures must be grounded in your research finding and fully tested using a lab experimental design process. It is also expected that this project will involve primary research methods to collect and analyse data from individuals and lab experiments as a research process. A complete research report and associated research instruments. It is quite likely that this

MSc Forensic Computing Project Proposal from Richard Howley Suggested title: The practice of digital investigations a critical review and proposed improvements. We are a new profession and as such many of our procedures and practices are relatively new and are still evolving. This project seeks to establish current practices in the field of DF and to identify what the major challenges are expected to be in the next five years. It is also expected that current practitioners in DF will be able to offer an anticipated response to those challenges if and when they materialise.

MSc Forensic Computing Project Proposal from Richard Howley Suggested title: An empirical investigation into the role and place of forensic triage in IR. Triage is widely acknowledged today as a way of dealing with large data sets and limited time to acquire and analyse it which characterise modern incident response. There is, however, very little literature on what triage is, what tools can be used and how they are being used at present. This project addresses this knowledge gap. This project will also discover and document the attitudes and concerns of those responsible for, or currently considering, using triage as part of their IR procedures.

MSc Forensic Computing Project Proposal from Richard Howley Suggested title: Virtual forensics What are the challenges and are we ready? Virtualisation is widely seen as a technology with huge potential to transform the way we work with computers and as such the DF challenges are already being noted. Some toolkits already provide the means to acquire live and or deleted virtual machines and to analyse them in the same way we do ordinary machines, but it is expected that once larger virtual structures become commonplace the DF challenges will grow rapidly. This project will: 1. Map out the anticipated demand for and usage of virtualisation in organisations. 2. Identify the main security risks and DF responses that have been identified. 3. Evaluate the tools and techniques currently available in the DF field and assess the extent to which they will support us in facing the challenges of virtualisation. 4. Propose and validate new tools and procedures to better support the DF process in virtual environments.

Suggested title: MSc Forensic Computing Project Proposal from Richard Howley Windows live forensics: Best practice in tools and techniques. The importance of Windows as a platform cannot be overstated and as such there are a wide range of tools and techniques available to support Windows Live Forensics (WLF). The project will identify current professional practices in WLF, identify the range of tools used and document the rationale behind the use of certain tools. Once the most widely used tools and procedures are identified these will then be tested in a set of lab based experiments to ascertain whether the claims made for them, or the anticipated benefits are real.

MSc Forensic Computing Project Proposal from Richard Howley Suggested title: A critical review of [digital forensics] OR [Security] in the cloud. It is anticipated that the cloud is about to roll over us all and radically change the way we work and in particular the way we engage with data. This project will: 1. Identify, through a literature review and primary research, the perceived DF/Sec threats posed by the cloud. 2. Discover and document the preparation companies are putting into place in preparation for the cloud. 3. Identify and assess the changes that will need to be made to DF/Sec procedures to accommodate data processing in the cloud. 4. Propose a set of practices and procedures that will better support organisation meet the DF/Sec challenges faced when working in the cloud.