BUILDING A DIGITAL EVIDENCE CLASSIFICATION MODEL

Size: px
Start display at page:

Download "BUILDING A DIGITAL EVIDENCE CLASSIFICATION MODEL"

Transcription

1 DFIR Summit Prague 2018 BUILDING A DIGITAL EVIDENCE CLASSIFICATION MODEL Copyright 2018 Jason Jordaan, All Right Reserved

2 INTRODUCTION While digital forensics plays a key role in cybersecurity, it is also a recognised and developing forensic science discipline As a forensic science discipline it needs to comply with established forensic science principles to continue to justify its place as a forensic science The development of scientifically validated models can assist in this 2

3 INMAN-RUDIN PARADIGM Considered the core of forensic science: Transfer (Locard Exchange Principle) Identification (Placing Objects in a Class) Individualisation (Narrowing the Class to One) Association (Linking a Person with the Event) Reconstruction (Understanding the Sequence of Past Events) 3

4 THE NEED FOR A DIGITAL EVIDENCE CLASSIFICATION MODEL Classification is a core part of the Identification principle in the Inman-Rudmin Paradigm Having a clear classification model can help investigators and legal practitioners better understand the digital evidence at a conceptual level V1 of the model published in 2014 Scientific validation identified shortcomings in the V1 model V2 model developed based on validation findings 4

5 5

6 Logical Digital Evidence Trace Digital Evidence Transmission Digital Evidence 6

7 Logical Digital Evidence Trace Digital Evidence Transmission Digital Evidence User Created Application Operating System File System 7

8 Logical Digital Evidence Trace Digital Evidence Transmission Digital Evidence User Created Logical User Created Application Logical Application Operating System Logical Operating File System Logical File System 8

9 Logical Digital Evidence Trace Digital Evidence Transmission Digital Evidence User Created Logical User Created Trace User Created Application Logical Application Trace Application Operating System Logical Operating Trace Operating System File System Logical File System Trace File System and Protocol 9

10 Logical Digital Evidence Trace Digital Evidence Transmission Digital Evidence User Created Logical User Created Reconstructed User Created Trace User Created Application Logical Application Reconstructed Application Trace Application Operating System Logical Operating Reconstructed Operating System Trace Operating System File System Logical File System Reconstructed File System Trace File System and Protocol 10

11 Logical Digital Evidence Trace Digital Evidence Transmission Digital Evidence User Created Logical User Created Reconstructed User Created Trace User Created Data Packets Containing User Created Data Application Logical Application Reconstructed Application Trace Application Application Data Packets Operating System Logical Operating Reconstructed Operating System Trace Operating System Operating System Data Packets File System Logical File System Reconstructed File System Trace File System and Protocol File System Data Packets 11

12 FUTURE WORK Validation testing of V2 model Publication of peer reviewed paper in reputable and widely read academic journal Acceptance of the model by the broader forensic science community 12

13 SANS DFIR RESOURCES AND CONTACT INFORMATION PRESENTER CONTACT Jason Jordaan SANS INSTITUTE 8120 Woodmont Ave., Suite 310 Bethesda, MD SANS(7267) DFIR RESOURCES digital-forensics.sans.org SANS GENERAL INQUIRIES: REGISTRATION: TUITION: PRESS/PR: 13

NoSQL Injection SEC642. Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques S

NoSQL Injection SEC642. Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques S SEC642 Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques S NoSQL Injection Copyright 2012-2018 Justin Searle and Adrien de Beaupré All Rights Reserved Version D01_01 About

More information

INTERNATIONAL BOARD OF FORENSIC ENGINEERING SCIENCES Stirling Road, Hollywood, FL Re-certification Application IDENTIFICATION

INTERNATIONAL BOARD OF FORENSIC ENGINEERING SCIENCES Stirling Road, Hollywood, FL Re-certification Application IDENTIFICATION 2870 Stirling Road, Hollywood, FL 33020 IDENTIFICATION DATE Full Name: Last First Middle City State/Province Country Postal Code Citizenship Social Security (Identification) Number: ( ) ( ) ( ) Home Phone

More information

Continuous Opportunity: DevOps & Security

Continuous Opportunity: DevOps & Security August 2017 August 15, 2017 Continuous Opportunity: DevOps & Security 2016-2017 SANS Institute All Rights Reserved Introduction Ben Allen Security Engineer at SANS Institute Operations Engineer, Developer

More information

Organization of Scientific Area Committees for Forensic Science (OSAC)

Organization of Scientific Area Committees for Forensic Science (OSAC) Stetson University College of Law Essentials in Forensic Science and the Law Webinar Series Organization of Scientific Area Committees for Forensic Science (OSAC) Mark D. Stolorow Director for OSAC Affairs

More information

Certification. Forensic Certification Management Board. Robert J. Garrett, Director

Certification. Forensic Certification Management Board. Robert J. Garrett, Director Certification Forensic Certification Management Board Robert J. Garrett, Director Crime Lab Accreditation and Certification Essentials National Clearinghouse for Science, Technology, and the Law What is

More information

Categories of Digital Investigation Analysis Techniques Based On The Computer History Model

Categories of Digital Investigation Analysis Techniques Based On The Computer History Model DIGITAL FORENSIC RESEARCH CONFERENCE Categories of Digital Investigation Analysis Techniques Based On The Computer History Model By Brian Carrier, Eugene Spafford Presented At The Digital Forensic Research

More information

Digital Forensics as a Big Data Challenge

Digital Forensics as a Big Data Challenge Digital Forensics as a Big Data Challenge Bruxelles, October 23rd 2013 Alessandro Guarino CEO, StudioAG Slide 1 of 20 Digital Forensics 1 DFRWS definition 2001 Digital Forensics is the use of scientifically

More information

ILIA STATE UNIVERSITY LIBRARY GUIDE. Ilia State University Library

ILIA STATE UNIVERSITY LIBRARY GUIDE. Ilia State University Library ILIA STATE UNIVERSITY LIBRARY GUIDE Library Home Page > E-Library > Scientific Databases Scientific Database > Access Type The Basic Search Form Basic Search Tips Search across all ProQuest platform databases

More information

Android Forensics Concept

Android Forensics Concept Android Forensics Concept Written by Zlatko Jovanovic Widely use of personal handheld devices, opened the new area in computer forensics field, called phone, cell, or mobile forensics. In the last few

More information

Chartered Membership: Professional Standards Framework

Chartered Membership: Professional Standards Framework Chartered Membership: Professional Standards Framework Foreword The Chartered Institute of Architectural Technologists (CIAT) is the lead professional body for Architectural Technology and the UK Competent

More information

UCD Centre for Cybersecurity & Cybercrime Investigation

UCD Centre for Cybersecurity & Cybercrime Investigation UCD Centre for Cybersecurity & Cybercrime Investigation Formally established in 2006 Assist in the fight against cybercrime Capacity Building with international organisations Extensive global stakeholder

More information

A Road Map for Digital Forensic Research

A Road Map for Digital Forensic Research 1 Outline of Today s Lecture! A Road Map for Digital Forensic Research o Report from the 1 st Digital Forensic Research Workshop (DFRWS) 2001! Defining Digital Forensic Examination and Analysis Tools o

More information

Educating Judges, Prosecutors and Lawyers in the Use of Digital Forensic Experts

Educating Judges, Prosecutors and Lawyers in the Use of Digital Forensic Experts Educating Judges, Prosecutors and Lawyers in the Use of Digital Forensic Experts Dr. Hans Henseler, University of Applied Sciences Leiden Sophie van Loenhout M.Sc., Netherlands Register of Court Experts

More information

Computer Forensics US-CERT

Computer Forensics US-CERT Computer Forensics US-CERT Overview This paper will discuss the need for computer forensics to be practiced in an effective and legal way, outline basic technical issues, and point to references for further

More information

Services to Make Sense of Data. Patricia Cruse, Executive Director, DataCite Council of Science Editors San Diego May 2017

Services to Make Sense of Data. Patricia Cruse, Executive Director, DataCite Council of Science Editors San Diego May 2017 Services to Make Sense of Data Patricia Cruse, Executive Director, DataCite Council of Science Editors San Diego May 2017 How many journals make data sharing a requirement of publication? https://jordproject.wordpress.com/2013/07/05/going-back-to-basics-reusing-data/

More information

Session 4.07 Accountability for Use or Disclosure of a Patient s Electronic Record

Session 4.07 Accountability for Use or Disclosure of a Patient s Electronic Record Session 4.07 Accountability for Use or Disclosure of a Patient s Electronic Record Requirements for a Security and Privacy Audit System Presented By: John Travis, CPA, MSA, CHFP Director, Solution Management

More information

Cybersecurity Auditing in an Unsecure World

Cybersecurity Auditing in an Unsecure World About This Course Cybersecurity Auditing in an Unsecure World Course Description $5.4 million that s the average cost of a data breach to a U.S.-based company. It s no surprise, then, that cybersecurity

More information

When Recognition Matters WHITEPAPER CLFE CERTIFIED LEAD FORENSIC EXAMINER.

When Recognition Matters WHITEPAPER CLFE CERTIFIED LEAD FORENSIC EXAMINER. When Recognition Matters WHITEPAPER CLFE www.pecb.com CONTENT 3 4 5 6 6 7 7 8 8 Introduction So, what is Computer Forensics? Key domains of a CLFE How does a CLFE approach the investigation? What are the

More information

BACHELOR OF SCIENCE IN INFORMATION TECHNOLOGY

BACHELOR OF SCIENCE IN INFORMATION TECHNOLOGY Bachelor of Science in Information Technology BACHELOR OF SCIENCE IN INFORMATION TECHNOLOGY Description and Outcomes The objective of the Bachelor of Science in Information Technology program is to help

More information

A Functional Reference Model of Passive Network Origin Identification

A Functional Reference Model of Passive Network Origin Identification DIGITAL FORENSIC RESEARCH CONFERENCE A Functional Reference Model of Passive Network Origin Identification By Thomas Daniels Presented At The Digital Forensic Research Conference DFRWS 2003 USA Cleveland,

More information

Introduction. IP Datagrams. Internet Service Paradigm. Routers and Routing Tables. Datagram Forwarding. Example Internet and Conceptual Routing Table

Introduction. IP Datagrams. Internet Service Paradigm. Routers and Routing Tables. Datagram Forwarding. Example Internet and Conceptual Routing Table Introduction Datagram Forwarding Gail Hopkins Service paradigm IP datagrams Routing Encapsulation Fragmentation Reassembly Internet Service Paradigm IP Datagrams supports both connectionless and connection-oriented

More information

National Certificate in Public Sector Compliance Operations (Level 4) with an optional strand in Investigations

National Certificate in Public Sector Compliance Operations (Level 4) with an optional strand in Investigations NZQF NQ Ref 1665 Version 2 Page 1 of 7 National Certificate in Public Sector Compliance Operations (Level 4) with an optional strand in Investigations Level 4 Credits 64 This qualification has been reviewed.

More information

The Use of Technology to Enhance Investigation

The Use of Technology to Enhance Investigation The Use of Technology to Enhance Investigation Of High Profile Corruption Cases. Centre for Socio-Legal Studies Objectives By the end of this keynote, participants will be knowledgeable on: 1. Open Source

More information

Team Science in mhealth Research

Team Science in mhealth Research Team Science in mhealth Research Sherry Pagoto, PhD Co-Founder, UMass Center of mhealth and Social Media Associate Professor of Medicine Division of Preventive and Behavioral Medicine University of Massachusetts

More information

Bridges to the Internet, January 2012, Page 1 of 5

Bridges to the Internet, January 2012, Page 1 of 5 Indiana Department of Education Academic Course Framework BRIDGES TO THE INTERNET Bridges to the Internet focuses on learning the fundamentals of networking, routing, switching and related protocols. In

More information

Chapter 4 After Incident Detection

Chapter 4 After Incident Detection Chapter 4 After Incident Detection Ed Crowley Spring 10 1 Topics Incident Response Process SANs Six Step IR Process 1. Preparation 2. Identification 3. Containment 4. Eradication 5. Recovery 6. Lessons

More information

Short courses presented by the NWU Programme in Forensic Accountancy

Short courses presented by the NWU Programme in Forensic Accountancy Short courses presented by the NWU Programme in Forensic Accountancy Certificate in: Commercial Forensic Accounting Commercial Forensic Law Commercial Forensic Investigation Commercial Forensic Information

More information

ACCA Practice And Revision Kit: Financial Management Level 3. 2 (ACCA Practice & Revision Kit) By Association of Chartered Certified Accountants

ACCA Practice And Revision Kit: Financial Management Level 3. 2 (ACCA Practice & Revision Kit) By Association of Chartered Certified Accountants ACCA Practice And Revision Kit: Financial Management Level 3. 2 (ACCA Practice & Revision Kit) By Association of Chartered Certified Accountants ACCA - CAT Paper - T7 Plan., Cont. and Perf. Management

More information

Curriculum Vitae Jason S. Hale Digital Forensic Examiner

Curriculum Vitae Jason S. Hale Digital Forensic Examiner Curriculum Vitae Jason S. Hale Digital Forensic Examiner One Source Discovery E-Mail: jhale [at] onesourcediscovery [dot] com Education M.S. Digital Forensics University of Central Florida December 2013

More information

Financial Forensic Accounting

Financial Forensic Accounting Financial Forensic Accounting Qualification Scope of Content Version: as at 02 March 2018 6. SCOPE OF CONTENT 1. Digital forensics overview 1.1. History of digital forensics 1.2. Sources of electronic

More information

FPA CONTINUING PROFESSIONAL DEVELOPMENT POLICY. Updated: February 2019

FPA CONTINUING PROFESSIONAL DEVELOPMENT POLICY. Updated: February 2019 FPA CONTINUING PROFESSIONAL DEVELOPMENT POLICY Updated: February 2019 FPA CONTINUING DEVELOPMENT POLICY Contents 1. Purpose... 3 2. Summary of requirements... 4 3. Acceptable CPD Content... 6 a. CPD Hours...

More information

ADMISSIBILITY OF TRACE EVIDENCE: A WHOLELISTIC APPROACH-DESPITE DAUBERT. Kenneth E. Melson

ADMISSIBILITY OF TRACE EVIDENCE: A WHOLELISTIC APPROACH-DESPITE DAUBERT. Kenneth E. Melson ADMISSIBILITY OF TRACE EVIDENCE: A WHOLELISTIC APPROACH-DESPITE DAUBERT Kenneth E. Melson TWO LEADING JUDICIAL TESTS: 1) FRYE GENERAL ACCEPTANCE COUNTING SCIENTIFIC NOSES ADMISSIBILITY OF EXPERT OPINIONS

More information

A Novel Approach of Mining Write-Prints for Authorship Attribution in Forensics

A Novel Approach of Mining Write-Prints for Authorship Attribution in  Forensics DIGITAL FORENSIC RESEARCH CONFERENCE A Novel Approach of Mining Write-Prints for Authorship Attribution in E-mail Forensics By Farkhund Iqbal, Rachid Hadjidj, Benjamin Fung, Mourad Debbabi Presented At

More information

Programme Specification

Programme Specification Programme Specification BSc Honours Forensic Computing 1. Awarding institution Middlesex University 2. Teaching institution Middlesex University 3. Programme accredited by 4. Final qualification BSc Honours

More information

Canada's Anti-Spam Legislation

Canada's Anti-Spam Legislation Canada's Anti-Spam Legislation Purpose: To support employees understanding and implementation of Canada s Anti-Spam Legislation ( CASL ). Specifically, this Procedure outlines which electronic communications

More information

Skills Academy. Forensic Studies Courses

Skills Academy. Forensic Studies Courses Skills Academy Forensic Studies Courses www.skillsacademy.co.za Forensic Science Programmes Forensic Science Studies is for the person who wants to work in a laboratory or as a crime scene technician and

More information

EXPERT WITNESS: Completion of a perfect circle

EXPERT WITNESS: Completion of a perfect circle An Agency Under MOSTI EXPERT WITNESS: Completion of a perfect circle Cyber Forensics Workshop, Doha,Qatar February 21, 2008 By R.Azrina R.Othman CyberSecurity Malaysia Copyright 2008 CyberSecurity Malaysia

More information

Chapter 7 Forensic Duplication

Chapter 7 Forensic Duplication Chapter 7 Forensic Duplication Ed Crowley Spring 11 Topics Response Strategies Forensic Duplicates and Evidence Federal Rules of Evidence What is a Forensic Duplicate? Hard Drive Development Forensic Tool

More information

The Trustworthiness of Digital Records

The Trustworthiness of Digital Records The Trustworthiness of Digital Records International Congress on Digital Records Preservation Beijing, China 16 April 2010 1 The Concept of Record Record: any document made or received by a physical or

More information

1.2 What Spotlight and Strata users can expect

1.2 What Spotlight and Strata users can expect 1 About 5 About 1.1 What is? is a set of integrated modules that enables your institution to make evidence-based strategic decisions. consists of four modules: Overview - Get an overview of the research

More information

ISO/IEC Solution Brief ISO/IEC EventTracker 8815 Centre Park Drive, Columbia MD 21045

ISO/IEC Solution Brief ISO/IEC EventTracker 8815 Centre Park Drive, Columbia MD 21045 Solution Brief 8815 Centre Park Drive, Columbia MD 21045 About delivers business critical software and services that transform high-volume cryptic log data into actionable, prioritized intelligence that

More information

BHConsulting. Your trusted cybersecurity partner

BHConsulting. Your trusted cybersecurity partner Your trusted cybersecurity partner BH Consulting Securing your business BH Consulting is an award-winning, independent provider of cybersecurity consulting and information security advisory services. Recognised

More information

Finding and using databases

Finding and using databases Finding and using databases While Library Search is a good starting point for finding information, some topics require comprehensive or specialised information that is only available within the Library

More information

Taming the Data Breach Beast... because we all know it will happen. John Tomaszewski Seyfarth Shaw January 2015

Taming the Data Breach Beast... because we all know it will happen. John Tomaszewski Seyfarth Shaw January 2015 Taming the Data Breach Beast... because we all know it will happen John Tomaszewski Seyfarth Shaw January 2015 Data Breaches Scope of the Problem 2015 Seyfarth Shaw LLP 2 What Causes Breaches? Glitch or

More information

New York Cybersecurity. New York Cybersecurity. Requirements for Financial Services Companies (23NYCRR 500) Solution Brief

New York Cybersecurity. New York Cybersecurity. Requirements for Financial Services Companies (23NYCRR 500) Solution Brief Publication Date: March 10, 2017 Requirements for Financial Services Companies (23NYCRR 500) Solution Brief EventTracker 8815 Centre Park Drive, Columbia MD 21045 About EventTracker EventTracker s advanced

More information

Assignment front sheet

Assignment front sheet Criteria reference To achieve the criteria the evidence must show that the student is able to: Task no. Page numbers P1 Outline the web architecture and components which enable internet and web functionality.

More information

Interpreting INAB Scopes of Accreditation.

Interpreting INAB Scopes of Accreditation. Accreditation The accreditation process determines, in the public interest, the technical competence and integrity of organisations offering testing, examination, verification, inspection, calibration

More information

Review Article A Comprehensive Review on Adaptability of Network Forensics Frameworks for Mobile Cloud Computing

Review Article A Comprehensive Review on Adaptability of Network Forensics Frameworks for Mobile Cloud Computing e Scientific World Journal, Article ID 547062, 27 pages http://dx.doi.org/10.1155/2014/547062 Review Article A Comprehensive Review on Adaptability of Network Forensics Frameworks for Mobile Cloud Computing

More information

PROFESSIONAL ERGONOMIST CERTIFICATION BY THE ERGONOMICS SOCIETY OF SOUTH AFRICA

PROFESSIONAL ERGONOMIST CERTIFICATION BY THE ERGONOMICS SOCIETY OF SOUTH AFRICA PROFESSIONAL ERGONOMIST CERTIFICATION BY THE ERGONOMICS SOCIETY OF SOUTH AFRICA II CERTIFICATION OF ERGONOMICS PROFESSIONALS (CHARTER) From 24 November 2014 II.1 Objective II.1.1 II.1.2 II.1.3 II.1.4 II.1.5

More information

Basic knowledge requirements include: general biology, genetics, molecularbiology, statistics and informatics.

Basic knowledge requirements include: general biology, genetics, molecularbiology, statistics and informatics. Règlement pour l'obtention du titre de "Forensic geneticist SSML" Reglement über die Verleihung eines Titels "Forensische/r Genetiker/inSGRM " Guidelines for obtaining the title "Forensic Geneticist SSLM

More information

Beyond Google Other Good Search Engines Directories Web Page Evaluation Checklist

Beyond Google Other Good Search Engines Directories Web Page Evaluation Checklist Beyond Google Other Good Search Engines Directories Web Page Evaluation Checklist Part 2 of Research Quality Web Searching The Teaching Library, Spring 2007 University of California, Berkeley OTHER QUALITY

More information

SANS Institute 2003, All Rights Reserved.

SANS Institute 2003, All Rights Reserved. INCIDENT FORM CHECKLIST Form Completed Date Completed Initials 1. Incident Contact List YES NO -Intellectual Property Owner Contacts YES NO -Intellectual Property Owner Local Contacts YES NO -Suspect Local

More information

City University of Hong Kong. Course Syllabus. offered by Department of Computer Science with effect from Semester A 2017/18

City University of Hong Kong. Course Syllabus. offered by Department of Computer Science with effect from Semester A 2017/18 City University of Hong Kong offered by Department of Computer Science with effect from Semester A 2017/18 Part I Course Overview Course Title: Computer Networks and Internets Course Code: CS5222 Course

More information

Forensic Analysis Approach Based on Metadata and Hash Values for Digital Objects in the Cloud

Forensic Analysis Approach Based on Metadata and Hash Values for Digital Objects in the Cloud Forensic Analysis Approach Based on Metadata and Hash Values for Digital Objects in the Cloud Ezz El-Din Hemdan 1, Manjaiah D.H 2 Research Scholar, Department of Computer Science, Mangalore University,

More information

COMPUTER FORENSICS (CFRS)

COMPUTER FORENSICS (CFRS) Computer Forensics (CFRS) 1 COMPUTER FORENSICS (CFRS) 500 Level Courses CFRS 500: Introduction to Forensic Technology and Analysis. 3 credits. Presents an overview of technologies of interest to forensics

More information

REACH-IT Stakeholder Workshop. REACH-IT Architecture

REACH-IT Stakeholder Workshop. REACH-IT Architecture REACH-IT Stakeholder Workshop REACH-IT Architecture Aims of the presentation Introduce to the architecture of the REACH-IT application from different, complementary angles Functional [ Use Case and Logical

More information

How to apply for professional membership and registration. 22 October 2018 Terry Winter Membership Manager

How to apply for professional membership and registration. 22 October 2018 Terry Winter Membership Manager How to apply for professional membership and registration 22 October 2018 Terry Winter Membership Manager Contents / Topics 1 About us 2 Benefits of gaining professional recognition 3 Membership journey

More information

Search Tips for EBSCO CINAHL Plus Full-text

Search Tips for EBSCO CINAHL Plus Full-text Search Tips for EBSCO CINAHL Plus Full-text Demo Example: You are interested in finding information on the role of nurse practitioners in rural, remote or northern regions. 1. Identify concepts present

More information

C A S E S T U D Y D E C E M B E R P R E P A R E D B Y : Iftah Bratspiess

C A S E S T U D Y D E C E M B E R P R E P A R E D B Y : Iftah Bratspiess FINANCIAL INSTITUTES PENETRATION INTO A BANK NETWORK USING TRANSPARENT NETWORK DEVICES C A S E S T U D Y P R E P A R E D B Y : Iftah Bratspiess 2018 Sepio Systems www.sepio.systems US: 11810 Grand Park

More information

Digital Forensics Practicum CAINE 8.0. Review and User s Guide

Digital Forensics Practicum CAINE 8.0. Review and User s Guide Digital Forensics Practicum CAINE 8.0 Review and User s Guide Ana L. Hernandez Master of Science in Cybersecurity Digital Forensics Concentration University of South Florida 12-8-2017 Table of Contents

More information

Introduction to UKAS Accreditation Fire Scene Development Programme. David Compton November 2017

Introduction to UKAS Accreditation Fire Scene Development Programme. David Compton November 2017 Introduction to UKAS Accreditation Fire Scene Development Programme David Compton November 2017 What is UKAS Accreditation? Procedure by which an authoritative body gives formal recognition that a body

More information

H. W. Wilson OmniFile Full Text Mega Edition Database

H. W. Wilson OmniFile Full Text Mega Edition Database H. W. Wilson OmniFile Full Text Mega Edition Database (http://vnweb.hwwilsonweb.com/hww/jumpstart.jhtml)* Wilson OmniFile Full Text, Mega Edition provides electronic access to full-text articles, page

More information

PCI DSS Compliance and the Cloud

PCI DSS Compliance and the Cloud PCI DSS Compliance and the Cloud Daniel Farr, Managing Consultant CyberSecurity Consulting PCI & Compliance Services DF&IR Risk Reduction Solutions www.foregenix.com A Brief History of Foregenix Foregenix

More information

National Diploma in Building Control Surveying (Small Buildings) (Level 5)

National Diploma in Building Control Surveying (Small Buildings) (Level 5) National Diploma in Building Control Surveying (Small Buildings) (Level 5) This qualification has been reviewed. The last date to meet the requirements is 31 December 2019. This qualification has been

More information

CyberSecurity Training and Capacity Building: A Starting Point for Collaboration and Partnerships. from the most trusted name in information security

CyberSecurity Training and Capacity Building: A Starting Point for Collaboration and Partnerships. from the most trusted name in information security CyberSecurity Training and Capacity Building: A Starting Point for Collaboration and Partnerships About SANS The SANS (SysAdmin, Audit, Network, Security) Institute Established in 1989 Cooperative research

More information

Certification, Registration and Education of Digital Forensic Experts

Certification, Registration and Education of Digital Forensic Experts Digital Evidence 2008 26-27 27 June 2008 Certification, Registration and Education of Digital Forensic Experts Peter Sommer London School of Economics peter@pmsommer.com p.m.sommer sommer@lse.ac..ac.uk

More information

COE589: Digital Forensics

COE589: Digital Forensics COE589: Digital Forensics Research in Digital Forensics Dr. Ahmad Almulhem KFUPM - Fall 2012 (T121) COE589 - Ahmad Almulhem 1 Outline Re-Visit to Course Syllabus What is (not) Research? Research Agenda

More information

Intrusion prevention systems are an important part of protecting any organisation from constantly developing threats.

Intrusion prevention systems are an important part of protecting any organisation from constantly developing threats. Network IPS Overview Intrusion prevention systems are an important part of protecting any organisation from constantly developing threats. By using protocol recognition, identification, and traffic analysis

More information

CE4024 and CZ 4024 Cryptography and Network Security

CE4024 and CZ 4024 Cryptography and Network Security CE4024 and CZ 4024 Cryptography and Network Security Academic s AY1819 Semester 2 CE/CZ4024 Cryptography and Network Security CE3005 Computer Networks OR CZ3006 Net Centric Computing Lectures 26 TEL Tutorials

More information

English 2 students: Welcome to the Library! Electronic Resources & Instruction Librarian

English 2 students: Welcome to the Library! Electronic Resources & Instruction Librarian English 2 students: Welcome to the Library! Electronic Resources & Instruction Librarian Stephanie Tetter These Slides are available online! http://www.mpcfaculty.net/stephanie_tetter Click on teach classes

More information

A Decision Support Framework for Extension of Time Claims

A Decision Support Framework for Extension of Time Claims A Decision Support Framework for Extension of Time Claims Hendrik F. Prinsloo, Ph.D., Pr. CPM and Tinus J. Maritz, Ph.D., AArbSA University of Pretoria Pretoria, South Africa Delays to contractors progress,

More information

Management System Auditors Criteria. CRT 6.7 Quality Management System Auditor

Management System Auditors Criteria. CRT 6.7 Quality Management System Auditor Management System Auditors Criteria CRT 6.7 Quality Management System Auditor Revision 8 Issue Date 2018-03-01 Application Date Effective 2018-03-01 Transition period Refer to the transition section of

More information

Software System For Automatic Reaction To Network Anomalies And In Real Time Data Capturing Necessary For Investigation Of Digital Forensics

Software System For Automatic Reaction To Network Anomalies And In Real Time Data Capturing Necessary For Investigation Of Digital Forensics Software System For Automatic Reaction To Network Anomalies And In Real Time Data Capturing Necessary For Investigation Of Digital Forensics Mladen Vukašinović Faculty of Information Technology Mediterranean

More information

A Software System for automatic reaction to network anomalies and in Real Time Data Capturing necessary for investigation of digital Forensics

A Software System for automatic reaction to network anomalies and in Real Time Data Capturing necessary for investigation of digital Forensics A Software System for automatic reaction to network anomalies and in Real Time Data Capturing necessary for investigation of digital Forensics Mladen Vukašinović Abstract Digital forensics has a technical

More information

Column: Putting the Science in Digital Forensics

Column: Putting the Science in Digital Forensics Journal of Digital Forensics, Security and Law Volume 6 Number 1 Article 1 2011 Column: Putting the Science in Digital Forensics Fred Cohen California Sciences Institute, Fred Cohen & Associates Follow

More information

Inter American Accreditation Cooperation. IAAC, IAF and ILAC Resolutions Applicable to IAAC MLA Peer Evaluations

Inter American Accreditation Cooperation. IAAC, IAF and ILAC Resolutions Applicable to IAAC MLA Peer Evaluations IAAC, IAF and ILAC Resolutions Applicable to IAAC MLA Peer Evaluations CLASSIFICATION This document is classified as an IAAC Mandatory Document. AUTHORIZATION Issue Nº: 07 Prepared by: MLA Committee and

More information

EU GDPR & NEW YORK CYBERSECURITY REQUIREMENTS 3 KEYS TO SUCCESS

EU GDPR & NEW YORK CYBERSECURITY REQUIREMENTS 3 KEYS TO SUCCESS EU GDPR & NEW YORK CYBERSECURITY REQUIREMENTS 3 KEYS TO SUCCESS MEET THE EXPERTS DAVID O LEARY Director, Forsythe Security Solutions THOMAS ECK Director, Forsythe Security Solutions ALEX HANWAY Product

More information

Cyber Semantic Landscape Ontology and Taxonomy

Cyber Semantic Landscape Ontology and Taxonomy The Cyber Semantic Landscape Ontology and Taxonomy (CSLOT) provides a structured approach to the dynamic needs of the Cyber security concepts, theories, standards, and compliance issues facing the 21st

More information

International Journal of Advance Engineering and Research Development. Simulation Based Improvement Study of Overprovisioned IP Backbone Network

International Journal of Advance Engineering and Research Development. Simulation Based Improvement Study of Overprovisioned IP Backbone Network Scientific Journal of Impact Factor (SJIF): 4.72 International Journal of Advance Engineering and Research Development Volume 4, Issue 8, August -2017 e-issn (O): 2348-4470 p-issn (P): 2348-6406 Simulation

More information

The Forensic Chain-of-Evidence Model: Improving the Process of Evidence Collection in Incident Handling Procedures

The Forensic Chain-of-Evidence Model: Improving the Process of Evidence Collection in Incident Handling Procedures The Forensic Chain-of-Evidence Model: Improving the Process of Evidence Collection in Incident Handling Procedures Atif Ahmad Department of Information Systems, University of Melbourne, Parkville, VIC

More information

Fourteenforty Research Institute, Inc.

Fourteenforty Research Institute, Inc. Monthly Research Consideration and evaluation of using fuzzy hashing Fourteenforty Research Institute, Inc. FFRI, Inc http://www.ffri.jp Ver2.00.01 Agenda Background and purpose Basis of fuzzy hashing

More information

Comprehensive Search Sustain Cited Search

Comprehensive Search Sustain Cited Search Comprehensive Search Sustain Cited Search Learning outcomes By the end of this workshop you should be able to: 1. Systematically search the literature by formulating effective search statements - using

More information

National Diploma in Building Control Surveying (Medium and Large Buildings) (Level 6)

National Diploma in Building Control Surveying (Medium and Large Buildings) (Level 6) National Diploma in Building Control Surveying (Medium and Large Buildings) (Level 6) This qualification has been reviewed and replaced by the New Zealand Diploma in Building Surveying (Level 6) [Ref:

More information

Automated Identification of Installed Malicious Android Applications

Automated Identification of Installed Malicious Android Applications DIGITAL FORENSIC RESEARCH CONFERENCE Automated Identification of Installed Malicious Android Applications By Mark Guido, Justin Grover, Jared Ondricek, Dave Wilburn, Drew Hunt and Thanh Nguyen Presented

More information

Question: 1 DES - Data Encryption standard has a 128 bit key and is very difficult to break.

Question: 1 DES - Data Encryption standard has a 128 bit key and is very difficult to break. 1 ISC - SSCP System Security Certified Practitioner (SSCP) Question: 1 DES - Data Encryption standard has a 128 bit key and is very difficult to break. Question: 2 What is the main difference between computer

More information

FORENSICS CYBER-SECURITY

FORENSICS CYBER-SECURITY FORENSICS CYBER-SECURITY MEIC, METI 2016/2017 1 st Semester 1 st Exam January 10, 2017 Duration: 2h00 - Use a pen only; no extra material is allowed, such as calculator, scratch paper, etc. - Write your

More information

Programme title: BSc (Hons) Forensic Archaeology and Anthropology

Programme title: BSc (Hons) Forensic Archaeology and Anthropology Faculty of Life Sciences Programme Specification Programme title: BSc (Hons) Forensic Archaeology and Anthropology Academic Year: 2017-18 Degree Awarding Body: Partner(s), delivery organisation or support

More information

SYLLABUS POSTGRADUATE TRAINING FOR NORDIC COMPUTER FORENSIC INVESTIGATORS. Module 3E Windows Forensics 10 ECTS

SYLLABUS POSTGRADUATE TRAINING FOR NORDIC COMPUTER FORENSIC INVESTIGATORS. Module 3E Windows Forensics 10 ECTS SYLLABUS POSTGRADUATE TRAINING FOR NORDIC COMPUTER FORENSIC INVESTIGATORS Module 3E Windows Draft for the Board at NPUC 2 December2015 (5 November) 1. Introduction Personal computing has for years been

More information

Global Cybercrime Certification

Global Cybercrime Certification Global Cybercrime Certification Yves Vandermeer ECTEG chair yves.vandermeer@ Way to a new IT crime ecosystem Standard Operation Procedures and Education docs ACPO - Good Practice Guide For Digital Evidence

More information

DIGITAL FORENSICS FORENSICS FRAMEWORK FOR CLOUD COMPUTING

DIGITAL FORENSICS FORENSICS FRAMEWORK FOR CLOUD COMPUTING 17.09.24 DIGITAL FORENSICS FORENSICS FRAMEWORK FOR CLOUD COMPUTING FORENSICS FRAMEWORK FOR CLOUD COMPUTING OUTLINE Abstract Introduction Challenges in cloud forensics Proposed solution Conclusion Opinion

More information

Getting Acquainted with PsycINFO (EBSCOhost)

Getting Acquainted with PsycINFO (EBSCOhost) Getting Acquainted with PsycINFO (EBSCOhost) Online at: http://support.ebsco.com/knowledge_base/detail.php?id=2564 The PsycINFO database contains more than 2.3 million references to psychological literature

More information

Incident Response & Forensic Best Practice. Cyber Attack!

Incident Response & Forensic Best Practice. Cyber Attack! Incident Response & Forensic Best Practice Cyber Attack! Overview Incident Response Forensic Requirement / Evidence Handling Investigative Steps Log Interpretation Advanced Correlation For Traceability

More information

Network Forensics Framework Development using Interactive Planning Approach

Network Forensics Framework Development using Interactive Planning Approach Network Forensics Framework Development using Interactive Planning Approach Missi Hikmatyar Department of Informatics Universitas Islam Indonesia Yogyakarta, Indonesia Yudi Prayudi Department of Informatics

More information

Advanced Certificate for ECF on Anti-Money Laundering and Counter-Financing of Terrorism (AML / CFT)

Advanced Certificate for ECF on Anti-Money Laundering and Counter-Financing of Terrorism (AML / CFT) Advanced Certificate for ECF on Anti-Money Laundering and Counter-Financing of Terrorism (AML / CFT) # Professional Certificate for ECF on Anti-Money Laundering and Counter- Financing of Terrorism

More information

Network Forensics and Covert Channels Analysis in Internet Protocols

Network Forensics and Covert Channels Analysis in Internet Protocols School of Computer Science North Haugh KY16 9SX Scotland, UK Network Forensics and Covert Channels Analysis in Internet Protocols #1 Covert Channels in Internet Protocols PhD Student Email david@dcs.st-andrews.ac.uk

More information

THEHIVE, CORTEX & MISP

THEHIVE, CORTEX & MISP SANS DFIR SUMMIT PRAGUE / 2017-10-08 TLP:WHITE THEHIVE, CORTEX & MISP UNSHACKLING CTI AND DFIR Saâd Kadhi TheHive Project Leader WHAT S WRONG? OBSERVATIONS STATING THE OBVIOUS CTI DETECT REACT PREVENT

More information

Last minute advice for registrants Essential information for successful registration

Last minute advice for registrants Essential information for successful registration Last minute advice for registrants Essential information for successful registration 8 March 2018 11.00 12.00 Helsinki time Kristiina Laitinen, ECHA Outline Data requirements Preparing a registration dossier

More information

You, Me, Them, Everybody*: OERs and the politics of web annotation

You, Me, Them, Everybody*: OERs and the politics of web annotation You, Me, Them, Everybody*: OERs and the politics of web annotation John Casey 1, Trevor Collins 2 1. City of Glasgow College 2. The Open University *Everybody Needs Somebody to Love (Burke, Berns & Wrexler).

More information

Chapter 7 Forensic Duplication

Chapter 7 Forensic Duplication Chapter 7 Forensic Duplication Ed Crowley Spring 10 Topics Response Strategies Forensic Duplicates and Evidence Federal Rules of Evidence What is a Forensic Duplicate? Hard Drive Development Forensic Tool

More information

DALA Project: Digital Archive System for Long Term Access

DALA Project: Digital Archive System for Long Term Access 2010 International Conference on Distributed Framework for Multimedia Applications (DFmA) DALA Project: Digital Archive System for Long Term Access Mardhani Riasetiawan 1,2, Ahmad Kamil Mahmood 2 1 Master

More information