INFORMATION SECURITY MANAGEMENT SYSTEM AND DIGITAL FORENSIC ANALYSIS

被引:0
|
作者
Holoska, Jiri [1 ]
Doucek, Petr [1 ]
机构
[1] Univ Econ, W Churchill Sq 4, Prague 13067 3, Czech Republic
关键词
information security management systems; security incidents; digital forensic analysis;
D O I
暂无
中图分类号
F [经济];
学科分类号
02 ;
摘要
Information security became the leading topic in IS/ICT in the last period. There are two ways how to reach the higher level of corporate IS/ICT security the first one is applying international standards, the second one is based on correct evaluation of security incidents. Basic tool for security incidents evaluation and/or for its prevention is digital forensic analysis. This contribution offers general concept of the master level course "Digital Forensic Analysis" as it is taught on Faculty of Informatics and Statistics, University of Economics, Prague. It presents a short description of course's topics and overview of competences that should dispose graduates of it. The purpose of digital forensic class at University of Economics, Prague is to provide the state of art of methodologies in data acquisition and OS level artifacts analysis which would allow students to interpret process and user action on examined evidence. With limited time given to the lectures, students will be exposed with complex techniques for data acquisition and basic analysis of the NTFS file system architecture, data recovery, data carving, binary file identification, Windows registry parsing, Windows log parsing, data de-duplication and document indexing. Each lecture will consist of theoretical background and case study. Case studies scenarios representing simplified real scenarios from authors past experience in digital forensic institute.
引用
收藏
页码:27 / 34
页数:8
相关论文
共 50 条
  • [1] Digital Forensic Analysis for Enhancing Information Security
    Adebayo, Ojeniyi Joseph
    Suleiman, Idris
    Ade, Abdulmalik Yunusa
    Ganiyu, S. O.
    Alabi, I. O.
    [J]. 2015 INTERNATIONAL CONFERENCE ON CYBERSPACE (CYBER-ABUJA), 2015, : 38 - 44
  • [2] Analysis of Computer Information Management System Security
    Shi, Xiaoling
    Shi, Xiaoping
    Zhang, Zhitian
    [J]. PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON MATERIAL, MECHANICAL AND MANUFACTURING ENGINEERING, 2015, 27 : 1575 - 1578
  • [3] Digital forensic readiness as a component of information security best practice
    Grobler, C. P.
    Louwrens, C. P.
    [J]. NEW APPROACHES FOR SECURITY, PRIVACY AND TRUST IN COMPLEX ENVIRONMENTS, 2007, 232 : 13 - +
  • [4] An Information Security Management for Socio-Technical Analysis of System Security
    Huynen, Jean-Louis
    Lenzini, Gabriele
    [J]. INFORMATION SYSTEMS SECURITY AND PRIVACY, 2018, 867 : 222 - 251
  • [5] Overview of System Wide Information Management and Security Analysis
    Qi Ming
    Lu Songtao
    [J]. 2017 IEEE 13TH INTERNATIONAL SYMPOSIUM ON AUTONOMOUS DECENTRALIZED SYSTEMS (ISADS 2017), 2017, : 191 - 194
  • [6] The Analysis on an Information Security Management System Based on the Management Function and Crisis Management
    Sun, Y. L.
    [J]. INTERNATIONAL CONFERENCE ON ADVANCED MANAGEMENT SCIENCE AND INFORMATION ENGINEERING (AMSIE 2015), 2015, : 132 - 138
  • [7] The architecture of a digital forensic readiness management system
    Reddy, K.
    Venter, H. S.
    [J]. COMPUTERS & SECURITY, 2013, 32 : 73 - 89
  • [8] Design and application research on management information system security architecture in digital campus
    Long, Xin-Zheng
    Xing, Cheng-Jie
    Ouyang, Rong-Bin
    Wang, Qian-Yi
    Li, Li
    Liu, Yun-Feng
    [J]. Tongxin Xuebao/Journal on Communications, 2014, 35 : 178 - 184
  • [9] The Information Security Analysis of Digital Library
    Hao, Tingting
    [J]. PROCEEDINGS OF 8TH INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTATION TECHNOLOGY AND AUTOMATION (ICICTA 2015), 2015, : 983 - 984
  • [10] Analysis on Security Management Strategy of Computer and Internet Information System
    Chen, Yuan
    [J]. PROCEEDINGS OF THE 2016 2ND WORKSHOP ON ADVANCED RESEARCH AND TECHNOLOGY IN INDUSTRY APPLICATIONS, 2016, 81 : 109 - 113