Knowing which standards apply to specific situations
Rainbow Series
IA Standards
?
Separation (of domains)
Isolation
Encapsulation
Least Privilege
Simplicity (of design)
Minimization (of implementation)
Fail Safe Defaults/Fail Secure
Modularity
Layering
Least Astonishment
Open Design
Usability
Fundamental Security Design Principles
Yes
Learning Outcomes
Students shall be able to discuss the rules, laws, policies, and procedures that affect digital forensics
Students shall be able to use one or more common DF tools, such as EnCase, FTK, ProDiscover, Xways, SleuthKit.
Students will be able to describe the steps in performing digital forensics from the initial recognition of an incident through the steps of evidence gathering, preservation and analysis, through the completion of legal proceedings.
Students will be able to describe what can/cannot be retrieved from various OSes.
Students will be able to describe the methodologies used in host forensics.
Students will be able to describe methods and approaches for forensic analysis on specified media.
NICE Competency: Computer Forensics
NICE Competency: Computer Network Defense
NICE Competency: Criminal Law
NICE Competency: Encryption
NICE Competency: Forensics
NICE Competency: Hardware
NICE Competency: Incident Management
NICE Competency: Information Assurance
NICE Competency: Legal, Government, and Jurisprudence