Gerald M. Santoro, Ph.D. College of Information Sciences and Technology The Pennsylvania State University University Park, PA 16802 (slides.

Slides:



Advertisements
Similar presentations
The American Distance Education Consortium 65 U.S. State Universities and Land Grant Colleges.
Advertisements

Designing Educational Opportunities for the Hazard Manager of the 21 st Century Deborah Thomas Dept. of Geography & Env. Sciences University of Colorado.
DHS, National Cyber Security Division Overview
Information Security and Assurance Center 1 Address: 615 McCallie Avenue Phone: Chattanooga TN 37403
Information Assurance & Network Security Certificate Prof. Rafael M. Rivera Universidad del Turabo School of Engineering Institute of Telecommunications.
Security Controls – What Works
OPM Cybersecurity Competencies by Occupation (Technical Competencies) Information Technology Management Series Electronics Engineering.
IT Security Essential Body of Knowledge (EBK): A Competency and Functional Framework for IT Security Workforce Development EDUCAUSE Live! November 14,
Cybersecurity Summit 2004 Andrea Norris Deputy Chief Information Officer/ Director of Division of Information Systems.
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline Qualitative.
IS 380 OME 1 Fall 2010 Class 1. Administrative Roster Syllabus Review Class overview 10 domains overview.
Information Systems Security Officer
CSCD 434 Spring 2011 Lecture 1 Course Overview. Contact Information Instructor Carol Taylor 315 CEB Phone: Office.
Security Offering. Cyber Security Solutions 2 Assessment Analysis & Planning Design & Architecture Development & Implementation O&M Critical Infrastructure.
Mohammad Alshayeb 19 May Agenda Update on Computer Science Program Assessment/Accreditation Work Update on Software Engineering Program Assessment/Accreditation.
Security Certification
The College of Information Sciences and Technology ist.psu.edu.
UMUC HS-EM Graduate Programs Competency Based Model A Work in Progress June 2014 CHDS – EMI Higher Ed Irmak Renda-Tanali, D.Sc. Collegiate Professor Director,
Introduction to Computer Forensics Fall Computer Crime Computer crime is any criminal offense, activity or issue that involves computers (
COEN 252 Computer Forensics Introduction to Computer Forensics  Thomas Schwarz, S.J w/ T. Scocca.
Chapter 2 Careers in Fraud Examination and Financial Forensics.
Chao-Hsien Chu, Ph.D. College of Information Sciences and Technology The Pennsylvania State University University Park, PA About.
Ferst Center Incident Incident Identification – Border Intrusion Detection System Incident Response – Campus Executive Incident Response Team Incident.
Overview of the Environmental Immigrant Bridging Pilot Program.
Chao-Hsien Chu, Ph.D. Abdullah Konak, Ph.D. College of Information Sciences and Technology The Pennsylvania State University University Park, PA
A First Course in Information Security
Whitacre College of Engineering Panel Interdisciplinary Cybersecurity Education Texas Tech University NSF-SFS Workshop on Educational Initiatives in Cybersecurity.
SEC835 Database and Web application security Information Security Architecture.
BA 378: Accounting Information Systems Instructor: Dr. James R. Coakley.
Communication Degree Program Outcomes
Computer Science and Engineering 1 Csilla Farkas Associate Professor Center for Information Assurance Engineering Dept. of Computer Science and Engineering.
University of Tulsa - Center for Information Security Center for Information Security: An Overview October 4th, 2002.
LEFIS W2 Posgraduate Workshop 1 LEFIS, WG 2 Postgraduate studies Meeting, Rotterdam.
WELCOME TO IST 420 Systems and Enterprise Integration Dr. Chao-Hsien Chu 301K IST Building Tel/Fax: / WWW: net1.ist.psu.edu/chu/
Whitacre College of Engineering Panel Interdisciplinary Cybersecurity Education Texas Tech University NSF-SFS Workshop on Educational Initiatives in Cybersecurity.
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #6 Forensics Services September 10, 2007.
Resources to Support Training Programs for CSIRTs.
The Next Step in Digital Literacy IC3 and Critical Thinking:
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 1 – Overview.
Informatics Institute 6/19/081 A Draft Plan for the Informatics Institute (Graduate Program) Informatics Institute A Draft Plan for the Informatics Institute.
Undergraduate Technology Programs John Baker Johns Hopkins University Carey Business School
Texas Tech University NSF-SFS Workshop on Educational Initiatives in Cybersecurity for Critical Infrastructure Workshop Summary May 3, 2013 Support for.
What is Information Systems (IS)? Information systems (IS) consist of networks of hardware and software, people, and telecommunications that organizations.
The Role of Libraries Special Committee Robert Morris University
Security Management Chao-Hsien Chu, Ph.D.
COEN 252 Computer Forensics Introduction to Computer Forensics  Thomas Schwarz, S.J
Security is not just… 1 A Compliance Exercise Certification and Accreditation FISMA.
℠ Pryvos ℠ Computer Security and Forensic Services May 27, 2015 Copyright © 2015 Pryvos, Inc. 1.
COEN 252 Computer Forensics Introduction to Computer Forensics  Thomas Schwarz, S.J
Emergency Management Training and Education System Protection and National Preparedness National Preparedness Directorate National Training and Education.
Converting Policy to Reality Designing an IT Security Program for Your Campus 2 nd Annual Conference on Technology and Standards May 3, 2005 Jacqueline.
Center for Cybersecurity Research and Education (CCRE)
AUB Department of Electrical and Computer Engineering Imad H. Elhajj American University of Beirut Electrical and Computer Engineering
E NGINEERING STUDIES IN T ELECOMMUNICATIONS S ECURITY School of Communication Engineering.
SecSDLC Chapter 2.
Critical Security Controls & Effective Cyber Defense Hasain “The Wolf”
Technology Plan SMITA PIMPLAPURE Final Project Technology and Educational Restructuring December 11, 2003.
ONLINE COURSES - SIFS FORENSIC SCIENCE PROGRAMME - 2 Our online course instructors are working professionals handling real-life cases related to various.
Information Security tools for records managers Frank Rankin.
Interdisciplinary MS in Information Assurance Jim Wolfe Computer Science Department Indiana University of Pennsylvania EPASEC 2006.
HSEP B.A. William W. Newmann, Ph.D William W. Newmann, Ph.D Program in Homeland Security and Emergency Preparedness (HSEP) Program in Homeland Security.
CDIO: Overview, Standards, and Processes (Part 2) Doris R. Brodeur, November 2005.
Donald JG Chiarella, PhD, CISM, CDMP, PEM, CHS-CIA, MBA.
Business Intelligence Minor
Associate Degree in Cyber security
AFRICAN UNION- 23RD-27TH July 2018 PRESENTER: Mr. Nawa J.T Samatebele
Information Assurance & Network Security Certificate
1 Advanced Cyber Security Forensics Training for Law Enforcement Building Advanced Forensics & Digital Evidence Human Resource in the Law Enforcement sector.
Cybersecurity Threat Assessment
Unit # 1: Overview of the Course Dr. Bhavani Thuraisingham
Presentation transcript:

Gerald M. Santoro, Ph.D. College of Information Sciences and Technology The Pennsylvania State University University Park, PA (slides developed by Prof. Chao-Hsien Chu) IST 454 Computer and Cyber Forensics Learning by Doing Theory  Practice

The Needs for Digital Forensics Incident handling Identifying policy violations. Auditing. Investigating crimes. Reconstructing computer security incidents. Troubleshooting operational problems. Log monitoring. Recovering from accidental system damage. Acquiring and retaining data for future use. Exercising due diligence / regulatory compliance. …

Personnel Security Physical and Environmental Security Procurement Regulatory and Standards Risk Management Strategic Management System and Application Security Data Security Digital Forensics Enterprise Continuity Incident Management IT Security Training and Awareness IT Systems Operations and Maintenance Network Security and Telecommunications IT Security EBK: 14 Competency Areas

IT Security EBK: Model

Knowledge and Skills Needed Critical thinking and judgment. 69% Communications (verbal and written). 68% Technical knowledge. 66% Teamwork and collaboration. 52% Ability to lead change. 52% Business knowledge/acumen. 40% Cross functional influence. 35% Influence. 33% Facilitation. 24% Mentoring and coaching. 19% Strategic business planning. 22% Industry participation. 13% SANS Institute 2005 Survey

PredictionDetectionForensicsResponse Defense In Depth of Security Feedback IST 451 SRA 111SRA 468 IST 451: Network Security IST 452: Legal & Regulatory Issues IST 453: Computer Forensics Law IST 454: Computer & Cyber Forensics IST 456: Security & Risk Management SRA 111: Security & Risk Analysis SRA 211:Threats of Crime & Terrorism SRA 221: Overview of Information Security SRA 231: Decision Theory SRA 311: Risk Management SRA 472: Integration of Privacy & Security SRA 468: Visual Analytics for Intelligence & Security IST 453 IST 454IST 456 IST 452 SRA 472 Policy/Regulation Firewall/DMZ Access Control/VPN … Qualitative models Quantitative models … Prevention Plans Risk analysis … Scanner IDS Data mining … SRA 311SRA 221 SRA 211SRA 231 Computer crime Economic crime Policies violation …

SRA Core Curriculum 111 Intro Security & Risk Analysis 211 Threat of Terrorism & Crime 231 Decision Theory & Analysis Emergency Planning Crisis Management Internship, Guest, & field Experience International Culture Foreign Language (Threats) (Modeling, Analysis) (Problem Solving) Information, People & Technology 200 Statistics (Vulnerabilities) (Techniques) Risk Management: Assessment & Mitigation 311 Legal, Ethical, and Regulatory Issues Overview of Information Security 110

SRA Major - Cyber Security Option (Elective) Support Intro Security & Risk Analysis Intro People, Information & Tech Statistics Intro Overview of Information Security Threat of Terrorism & Crime Decision Theory & Analysis Core Risk Management: Assessment & Mitigation Legal, Ethical, and Regulatory Issues Core Junior Option Networking & Telecommunications Computer & Cyber Forensics Security & Risk Management Network Security Emergency Planning Crisis Management Internship, Guest, & field Experience International Culture Foreign Language Capstone

SRA Minor (21 cr.) SRA 111: Intro Security & Risk Analysis IST 110: Intro People, Information & Tech Stat 200: Statistics Intro SRA 221: Overview of Information Security SRA 211: Threat of Terrorism & Crime Core IST 452: Legal, Ethical, & Regulatory Issues IST 220: Networking & Telecommunications IST 451: Network Security IST 454: Computer & Cyber Forensics IST 453: Cyber Forensics Laws SRA 231: Decision Theory & Analysis SRA 311: Risk Mgmt: Assessment & Mitigation IST 456: Security & Risk Management IST 402: Wireless Design & Security Electives (6 cr.) Cyber SecurityDigital Forensics Risk Management

The Center for Information Assurance at the Pennsylvania State University, through its curricula, certify that Your Name Here has acquired the knowledge and skills that meet the National Training Standard NSTISSI-4011 for the Information Systems Security (INFOSEC) Professionals, established by the Committee on National Security Systems (CNSS) and the National Security Agency (NSA), on December 2005 Dr. Hank Foleys, Dean College of Information Sciences and Technology Certificate of Accomplishment Dr. Chao H. Chu, Executive Director Center for Information Assurance

IST 454 focuses on computer and cyber forensics. Students will learn different aspects of computer and cyber crime and ways in which to uncover, protect, exploit, and document digital evidence. Students will be exposed to different types of tools (both software and hardware), techniques and procedure, and be able to use them to perform rudimentary forensic investigations.

Course Objectives  Understand the different aspects of computer and cyber crime.  Understand the basic concepts and issues of computer forensics  Understand what tools and techniques to use in computer and cyber crime investigations  Perform basic computer and cyber forensic investigations  Understand the documentation need in performing forensic investigations

Terminology Computer Forensics Computer and Network Forensics Computer and Cyber Forensics Cyber Forensics Digital Forensics Digital Forensic Sciences Forensic Sciences

Modules Digital / Computer / Cyber Forensics Context of Computer Forensics Knowledge and Skills Needed Data Acquisition – Imaging / Tools Data Authentication / Tools Data Search & Analysis / Tools Forensic Policies and Procedures Operating Systems / File Structure Investigating Window Systems Investigating Linux Systems Data Hiding Techniques / Steganography Overview of Web Forensics Spam, Phishing, Tracing PDA Forensics Intrusion Detection Honeynet / Network Monitoring Worm Forensics Legal and Ethical Issues Criminal Justice Systems Expert Witness Overview Search, Seizure & Investigation Media & File Systems Analysis Web / Internet Forensics Network & Malware Forensics Legal & Criminal Justice Systems 8 Hands-on Exercises 18 Readings 11 Quizzes / Assignments Term Project: Report & Presentation 1-3 Guess Lectures

Theory and Practice 3Problem Solving Skills 3Interpersonal Skills 3Team Work 3Managerial Issues TheoryPractice Hand-on Experience Learning By Doing 3Programming Skills 3Information Technology 3Technical Issues 3Emerging Information Technologies

Learning By Doing I Hear and I Forget ! I see and I Remember ! I Do and I Understand ! Confucius (Kung Chiu) 5th - 6th Century, B. C. Chinese Philosopher

Albert Einstein Imagination is more important than Knowledge

? ? ? Learning Capability is more important than Knowledge

Teaching Philosophy and Principles 3Bridging the gaps between theory and practice 3Learning by doing (hand-on experience) 3Learning capability is more important than knowledge 3Covering both technical and managerial aspects

Teamwork - The Key to Winning

We Are All in the Same Boat